白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Identity experience framework

專利號
US11997077B2
公開日期
2024-05-28
申請人
Microsoft Technology Licensing, LLC(US WA Redmond)
發(fā)明人
Raja Charu Vikram Kakumani; Brandon B. Murdoch; Ronald Bjones; Muhammad Omer Iqbal; Kim Cameron
IPC分類
H04L9/00; H04L9/40; G06F3/0484
技術(shù)領(lǐng)域
policy,identity,ui,ief,provider,user,token,journeys,providers,composable
地域: WA WA Redmond

摘要

Methods for composable user journeys for user authentication via an identity experience framework are performed by systems and apparatuses. Initiating a user authentication process for an application triggers application calls for dynamic invocation of a specific identity policy, required by the application, of a number of identity policies managed by a host of the identity experience framework. User interfaces defined by the identity policies are provided from the host to the application for interaction by the user and entry of identity information needed to authenticate the user according to specified verification providers. Identity claims and token requests are provided from the application to the host which then authenticates the identity claims via the verification providers and mints a token that includes the claims required by the application, according to the identity policy. The application consumes the token to complete the token request and allow the user access to the application.

說明書

Referring back to flowchart 1100, in step 1110, a token is received responsive to providing to the token request. For example, application 1008 may receive a token generated by the identity policy host responsive to the token request being provided. In embodiments, the token may be received via network interface 1022 and/or communicator 1010. Application 1008 may be configured to provide the received token to identity claim and token manager 1020 for consumption thereof.

In step 1112, the token is consumed by the application to allow access by the user to at least one feature of the application. For instance, identity claim and token manager 1020 of application 1008 may be configured to consume the token. The token may be generated by the identity policy host according to the identity policy specified in the call in step 1108 and may include all claims, as verified, required by application 1008 to authenticate the user and allow access by the user to feature(s) of the application.

權(quán)利要求

1
微信群二維碼
意見反饋