CPC H04L 63/0884 (2013.01) [H04L 63/0807 (2013.01); H04L 63/10 (2013.01)] | 20 Claims |
1. A computer-implemented method, comprising:
obtaining, from a requestor system, a request for a token to access a computing resource;
performing a selection, based on information indicating a trusted location from which the request was made and an availability of tokens corresponding to each authentication provider from a plurality of authentication providers, for an authentication provider from the plurality of authentication providers without additional input from the requestor system to which the requestor system is able to authenticate, wherein the information comprises a prefix of an Internet Protocol (IP) address of the request that matches the trusted location;
redirecting the requestor system to the selected authentication provider;
obtaining, from the requestor system, a token generated by the selected authentication provider; and
providing, to the requestor system, an identity assertion that enables the requestor system to access the computing resource.
|