-
公开(公告)号:US11637831B2
公开(公告)日:2023-04-25
申请号:US16597417
申请日:2019-10-09
Applicant: salesforce.com, inc.
Inventor: Kyle Edward Heldman , Brian Ray Brinegar , Chad Anthony Vanhorn , Dinesh Rajasekharan , Joshua Allen Bronson , Joshua Thomas Armstrong , John Damon Rice , Nathan Alan Corn , Tyler Christopher Staley
IPC: H04L9/40 , H04L67/10 , H04L61/4511
Abstract: An application programming interface (API) platform accesses cloud-based software services in a cloud computing system. API requests used in the API platform include a tenant specific endpoint (TSE) that uses a unique tenant identifier and an API endpoint as a URL domain. The unique tenant identifier identifies a tenant associated with the API request and the API endpoint identifies one of the cloud-based software services. The combination of the unique tenant identifier and the API endpoint in the domain of the TSE maps to an IP address for a specific software service in a specific one of the data centers in the cloud computing system assigned to the tenant. This allows API requests to be routed directly to the tenant specific data centers without first being routed through a central routing service.
-
公开(公告)号:US20200007520A1
公开(公告)日:2020-01-02
申请号:US16022241
申请日:2018-06-28
Applicant: salesforce.com, inc.
Inventor: Kyle Edward Heldman , Douglas Christopher Wilson , Jackson Gregory Reed , Kyle Warren Apple , Jacob Andrew Richwine
Abstract: Techniques are disclosed relating to a computer system accessing a client credential set to authenticate with a destination computer system. A computer system may, subsequent to receiving an indication to make available an application for a particular user, retrieve configuration data specifying a reference to a key value. The computer system may maintain a data object that includes a client credential set for the particular user. In response to an occurrence of an event associated with the application, the computer system may access the client credential set of the particular user from the data object using the key value and an indication of the particular user. The computer system may then send a request including the client credential set to a destination computer system for authentication with the destination computer system and receive a response indicating whether the computer system has been authenticated.
-
公开(公告)号:US11509641B2
公开(公告)日:2022-11-22
申请号:US17146255
申请日:2021-01-11
Applicant: salesforce.com, inc.
Inventor: Kyle Edward Heldman , Douglas Christopher Wilson , Jackson Gregory Reed , Kyle Warren Apple , Jacob Andrew Richwine
IPC: H04L9/40 , G06F8/61 , G06F9/54 , H04L65/1063 , G06F21/41 , G06Q10/06 , H04W12/084
Abstract: Techniques are disclosed relating to a computer system accessing a client credential set to authenticate with a destination computer system. A computer system may, subsequent to receiving an indication to make available an application for a particular user, retrieve configuration data specifying a reference to a key value. The computer system may maintain a data object that includes a client credential set for the particular user. In response to an occurrence of an event associated with the application, the computer system may access the client credential set of the particular user from the data object using the key value and an indication of the particular user. The computer system may then send a request including the client credential set to a destination computer system for authentication with the destination computer system and receive a response indicating whether the computer system has been authenticated.
-
公开(公告)号:US20210136052A1
公开(公告)日:2021-05-06
申请号:US17146255
申请日:2021-01-11
Applicant: salesforce.com, inc.
Inventor: Kyle Edward Heldman , Douglas Christopher Wilson , Jackson Gregory Reed , Kyle Warren Apple , Jacob Andrew Richwine
Abstract: Techniques are disclosed relating to a computer system accessing a client credential set to authenticate with a destination computer system. A computer system may, subsequent to receiving an indication to make available an application for a particular user, retrieve configuration data specifying a reference to a key value. The computer system may maintain a data object that includes a client credential set for the particular user. In response to an occurrence of an event associated with the application, the computer system may access the client credential set of the particular user from the data object using the key value and an indication of the particular user. The computer system may then send a request including the client credential set to a destination computer system for authentication with the destination computer system and receive a response indicating whether the computer system has been authenticated.
-
公开(公告)号:US11431500B2
公开(公告)日:2022-08-30
申请号:US16740188
申请日:2020-01-10
Applicant: salesforce.com, inc.
Inventor: Kyle Edward Heldman , Brian Ray Brinegar , Chad Anthony Vanhorn , Dinesh Rajasekharan , Joshua Allen Bronson , Joshua Thomas Armstrong , John Rice , Nathan Corn , Tyler Staley
IPC: H04L9/32 , G06F16/958
Abstract: Among other things, embodiments of the present disclosure are directed to providing authorization code management for published static applications. Other embodiments may be described and/or claimed.
-
公开(公告)号:US10893033B2
公开(公告)日:2021-01-12
申请号:US16022241
申请日:2018-06-28
Applicant: salesforce.com, inc.
Inventor: Kyle Edward Heldman , Douglas Christopher Wilson , Jackson Gregory Reed , Kyle Warren Apple , Jacob Andrew Richwine
Abstract: Techniques are disclosed relating to a computer system accessing a client credential set to authenticate with a destination computer system. A computer system may, subsequent to receiving an indication to make available an application for a particular user, retrieve configuration data specifying a reference to a key value. The computer system may maintain a data object that includes a client credential set for the particular user. In response to an occurrence of an event associated with the application, the computer system may access the client credential set of the particular user from the data object using the key value and an indication of the particular user. The computer system may then send a request including the client credential set to a destination computer system for authentication with the destination computer system and receive a response indicating whether the computer system has been authenticated.
-
-
-
-
-