BACK-END CONSTRAINED DELEGATION MODEL
    1.
    发明公开
    BACK-END CONSTRAINED DELEGATION MODEL 有权
    DELEGATIONSMODELL MITEINGESCHRÄNKTEMBACK-END

    公开(公告)号:EP2643766A4

    公开(公告)日:2017-08-09

    申请号:EP11842889

    申请日:2011-11-14

    IPC分类号: H04L29/06 H04L9/32

    摘要: A client can communicate with a middle tier, which can then, in turn, communicate with a back end tier to access information and resources on behalf of the client within the context of a system that can scale well. Each individual back end can establish a policy that defines which computing device can delegate to that back end. That policy can be enforced by a domain controller within the same administrative domain as the particular back end. When a middle tier requests to delegate to a back end, the domain controller to which that request was directed can either apply the policy, or, if the domain controller is in a different domain than the targeted back end, it can direct the middle tier to a domain controller in a different domain and can sign relevant information that the middle tier can utilize when communicating with that different domain controller.

    摘要翻译: 客户端可以与中间层进行通信,中间层然后可以与后端层进行通信,以代表客户在可以很好扩展的系统环境中访问信息和资源。 每个单独的后端都可以建立一个策略,以定义哪个计算设备可以委托给该后端。 该策略可以由与特定后端相同的管理域内的域控制器强制执行。 当中间层请求委派到后端时,该请求所针对的域控制器可以应用该策略,或者,如果域控制器与目标后端位于不同的域中,则可以指引中间层 到不同域中的域控制器,并且可以签署中间层在与该不同域控制器通信时可以利用的相关信息。

    USER MAPPING INFORMATION EXTENSION FOR PROTOCOLS
    4.
    发明公开
    USER MAPPING INFORMATION EXTENSION FOR PROTOCOLS 有权
    用户信息用于说明PROTOCOLS延长

    公开(公告)号:EP1902539A4

    公开(公告)日:2016-11-23

    申请号:EP06800057

    申请日:2006-07-12

    摘要: A hint containing user mapping information is provided in messages that may be exchanged during authentication handshakes. For example, a client may provide user mapping information to the server during authentication. The hint (e.g., in the form of a TLS extension mechanism) may be used to send the domain/user name information of a client to aid the server in mapping the user's certificate to an account. The extension mechanism provides integrity and authenticity of the mapping data sent by the client. The user provides a hint as to where to find the right account or domain controller (which points to, or otherwise maintains, the correct account). Based on the hint and other information in the certificate, the user is mapped to an account. The hint may be provided by the user when he logs in. Thus, a certificate is mapped to an identity to authenticate the user. A hint is sent along with the certificate information to perform the binding. Existing protocols may be extended to communicate the additional mapping information (the hint) to perform the binding. A vendor specific extension to Kerberos is defined to obtain the authorization data based on an X.509 certificate and the mapping user name hint.