白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Identity experience framework

專利號
US11997077B2
公開日期
2024-05-28
申請人
Microsoft Technology Licensing, LLC(US WA Redmond)
發(fā)明人
Raja Charu Vikram Kakumani; Brandon B. Murdoch; Ronald Bjones; Muhammad Omer Iqbal; Kim Cameron
IPC分類
H04L9/00; H04L9/40; G06F3/0484
技術(shù)領(lǐng)域
policy,identity,ui,ief,provider,user,token,journeys,providers,composable
地域: WA WA Redmond

摘要

Methods for composable user journeys for user authentication via an identity experience framework are performed by systems and apparatuses. Initiating a user authentication process for an application triggers application calls for dynamic invocation of a specific identity policy, required by the application, of a number of identity policies managed by a host of the identity experience framework. User interfaces defined by the identity policies are provided from the host to the application for interaction by the user and entry of identity information needed to authenticate the user according to specified verification providers. Identity claims and token requests are provided from the application to the host which then authenticates the identity claims via the verification providers and mints a token that includes the claims required by the application, according to the identity policy. The application consumes the token to complete the token request and allow the user access to the application.

說明書

For instance, application 620 is shown as providing the token request and the identity claim (“R”) to host identity policy host 602. The provided identity claim is used by policy executor 614 for verification thereof, e.g., as described in flowchart 400 of FIG. 4. For example, policy executor 614 may provide the identity claim to one or more of verification providers 616. Verification providers 616 may include local account IdPs, social network IdPs, MFAs, email validators, user input validators, REST APIs, token issuers, user directories (which may include user graphs 618), and/or the like as described herein. The identity claim is provided as verification provider input (“R”), and an output response claim (“C”) is returned to policy executor 614. In embodiments, additional identity information and/or attributes may be provided in response claims from verification providers. Policy executor 614 is then configured to verify the identity claim against the response claim.

In some embodiments, one or more of verification providers may be external to the domain or system of identity policy host 602, and external, third-party verification providers 624 (which may be an embodiment of verification provider(s) 114 in FIG. 1) may be also be utilized depending on how the identity policy is defined.

權(quán)利要求

1
微信群二維碼
意見反饋