Abstract:
Techniques to authenticate user requests involving multiple applications are described. An apparatus may comprise a logic circuit, and a user interface component operative on the logic circuit to present to a user content from a primary application, handle user commands directed to the primary application, and verify the user to a secondary application using an identifier value that is generated by the primary application for authenticating the user. In one embodiment, the user interface component submits the identifier value to the secondary application in a request for certain content. After determining whether the identifier value is valid, the secondary application provides the requested content or deny the user's request. Other embodiments are described and claimed.
Abstract:
Techniques to facilitate communication across domains are described. An apparatus may comprise a logic circuit, and a user interface component operative on the logic circuit to present to enable cross-origin communication between applications in different domains by processing a message directed towards an application to verify an origin of the message. If the origin is trusted, user interface component transforms the message into a request indicating a trusted domain and communicates the request to the application. The application performs various tasks in accordance with the request and returns a response to the user interface component. Other embodiments are described and claimed.
Abstract:
Techniques to facilitate communication across domains are described. A secondary web server in a second domain provides content to be loaded into a user interface element of a web page provided by a primary web server in a first domain. A user interface component operates as an intermediary for the secondary web server and/or reverse proxy between user interface elements of the different domains. The user interface component processes a message from the secondary web server to verify an origin of the message. If the origin is trusted, the user interface component transforms the message into a request indicating a trusted domain and communicates the request to the first domain.
Abstract:
Techniques to identify user interface elements associated with model violation events. These techniques may involve a user interface component configured to perform client-side validation of data objects that are generated by an application running on a client device. This application may communicate with another application operative on a server and the client device. The application may generate a user interface to facilitate user inputs into user interface elements. The server may provide the client device with validation logic that is operative to process any input data directed towards the application via the user interface and identify any violation event of a model shared between the server and the client device.