| CPC H04L 63/083 (2013.01) [H04L 63/1483 (2013.01)] | 20 Claims |

|
1. A method, comprising:
receiving, by a first system from a given user, a log in of the given user to the first system;
receiving, by the first system from the given user, one or more operations to be performed by the first system, on behalf of the given user, on a second system;
sending an impersonation request, by the first system to the second system, to obtain an impersonated user access token of the given user for the second system, wherein the impersonated user access token of the given user allows the first system to perform the one or more operations on the second system on behalf of the given user;
receiving, by the first system from the second system, in response to the impersonation request, the impersonated user access token of the given user for the second system; and
providing, by the first system to the second system, the one or more operations, with the impersonated user access token of the given user for the second system, wherein the second system performs the one or more operations based at least in part on a result of an access validation of the impersonated user access token of the given user for the second system, wherein the access validation comprises validating an impersonator user access token of the first system that allows the first system to impersonate a plurality of users on the second system, wherein the impersonator user access token of the first system is distinct from the impersonated user access token of the given user,
wherein the method is performed by at least one processing device comprising a processor coupled to a memory.
|