Abstract:
A computer system receives a first request as part of a primary session with a client device to access information stored on a primary domain associated with the computer system. The first request includes an authentication key that was generated using a session key. The computer system receives a second request as part of a sub-session with the client device to access information stored on a secondary domain associated with the computer system. The second request includes a second authentication key that includes a session identifier of the primary session and a session payload generated using the session key and an indicator of the secondary domain. The computer system determines whether to grant the first and second requests using the first and second authentication keys, respectively.
Abstract:
Methods and systems are provided for declaratively configuring a sign up process and a sign up page for a particular service provider. User interface(s), which can be displayed at a user system of a particular service provider, can include a plurality of options for declaratively configuring different sign up processes and sign up pages for the particular service provider. After receiving a selection of one of the options to configure the sign up process and the sign up page, inputs can be received that can include an input that specifies one of a plurality of different types of identifiers associated with a user to be verified as part of the sign up process, and one of a plurality of different types of identity verification processes to define how the user will be verified as part of the sign up process for the service provider.
Abstract:
Disclosed are some implementations of systems, apparatus, methods and computer program products for facilitating the authentication of computing system requests across tenants of at least one multi-tenant database system. Authentication is facilitated using a central registry that is accessible by and independent from the tenants of the multi-tenant database system.
Abstract:
Mechanisms and techniques for customized user validation. A login attempt is received from a remote electronic device with one or more computing devices that provide access to one or more resources. The login attempt is analyzed to determine a profile from a plurality of profiles corresponding to the login attempt. The one or more computing devices support the plurality profiles with each profile having a corresponding flow. The flow corresponding to the profile is performed prior to allowing continuation of the login attempt. The login attempt is continued, via the one or more computing devices, after the flow corresponding to the profile is completed. Access is granted to the one or more resources, via the one or more computing devices, in response to a successful completion of the login attempt.
Abstract:
A method for logging a user into an online host system begins by receiving a login request from a web browser application of a client device, wherein the login request identifies the online host system. The method continues by initiating a single sign-on routine that involves an online third party system and by obtaining third party user data from the online third party system, wherein the obtained third party user data is associated with the user and is maintained by the online third party system. Host system records maintained by the online host system are modified in accordance with the obtained third party user data. Thereafter, the user is automatically logged into the online host system.
Abstract:
Disclosed are some implementations of systems, apparatus, methods and computer program products for facilitating the authentication of computing system requests across tenants of at least one multi-tenant database system. Authentication is facilitated using a central registry that is accessible by and independent from the tenants of the multi-tenant database system.
Abstract:
Methods and systems are provided for declaratively configuring a process and a page for a particular service provider. User interface(s) can be displayed at a user system and include options for declaratively configuring different log in processes and log in pages for the particular service provider. After receiving a selection of one of the options to configure the log in process and the log in page, inputs can be received that specify a type of identifiers associated with a user to be verified as part of the log in process, and an identity verification process to define how the user will be verified as part of the log in process for the service provider.
Abstract:
Disclosed are some implementations of systems, apparatus, methods and computer program products for facilitating the authentication of computing system requests with an unknown destination across tenants of at least one multi-tenant database system. Authentication is facilitated using an intermediate system that is accessible by and independent from the tenants of the multi-tenant database system.
Abstract:
Disclosed are some implementations of systems, apparatus, methods and computer program products for facilitating the authentication of computing system requests with an unknown destination across tenants of at least one multi-tenant database system. Authentication is facilitated using an intermediate system that is accessible by and independent from the tenants of the multi-tenant database system.
Abstract:
Methods and systems are provided for configuring for declaratively configuring a user self-registration process and a user self-registration page process for a particular service provider. A graphical user interface is displayed that includes a plurality of options for declaratively configuring different user self-registration processes and corresponding user self-registration pages for the particular service provider. One of the options can be selected, and a type of identifier and a type of verification process can be specified from different types for each. The type of identifier is associated with a user to be verified as part of the user self-registration process, and can be specified to define how the user is identified and looked-up during the user self-registration process. The type of verification process can define how the user will be verified as part of the user self-registration process.