US 12,445,446 B2
Techniques for unifying multiple identity clouds
Karl McGuinness, Oakland, CA (US); and Matias Woloski, Punta del Este (UY)
Filed by Okta, Inc., San Francisco, CA (US)
Filed on Nov. 8, 2022, as Appl. No. 18/053,721.
Prior Publication US 2024/0154967 A1, May 9, 2024
Int. Cl. H04L 29/06 (2006.01); H04L 9/40 (2022.01)
CPC H04L 63/102 (2013.01) [H04L 63/0815 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for managing resources at a software platform of a device, comprising:
receiving, from a first user associated with an application, a first request to build an authorization model for a resource of the application using a first cloud platform associated with the software platform, the first cloud platform including one or more features associated with authentication management across a plurality of applications comprising the application, wherein the authorization model identifies one or more parameters associated with accessing the resource via a second cloud platform associated with the software platform, the second cloud platform used by a plurality of organizations;
receiving, from the first user, a second request to integrate the resource with the second cloud platform in accordance with the authorization model, wherein the resource is accessible via the second cloud platform in accordance with integration of the resource with the second cloud platform;
authorizing the first request and the second request using a directory associated with the software platform, wherein authorization of the first request and the second request is based at least in part on a first credential associated with the first user;
receiving, from a second user of an organization of the plurality of organizations, a third request to access the resource of the application via the second cloud platform associated with the software platform; and
authorizing the third request using the directory associated with the software platform, wherein the authorization of the third request is in accordance with the authorization model and based at least in part on a second credential associated with the second user.