A method, apparatus and computer instructions for tracking security attributes along invocation chain using secure propagation token. When a user is authenticated, a propagation token is created. The propagation token includes a caller list, a host list, and custom attributes. The propagation token may be propagated downstream along with other marker tokens. A service provider may associate custom attributes in the propagation token or create custom propagation token to be propagated. The propagation token tracks the original caller and subsequent callers when user switches occur and a list of hosts at which the propagation token lands on.

 
Web www.patentalert.com

< Identity access management system

< Annotating programs for automatic summary generation

> Method and apparatus for network identification

> Method and system for establishing federation relationships through imported configuration files

~ 00232