US 11,855,871 B1
Systems, methods, and storage media for analyzing authentication and authorization requirements in an identity infrastructure
Eric Olden, Niwot, CO (US); Carl Eric Leach, Carlsbad, CA (US); Christopher Marie, Denver, CO (US); and Elias Friedman, Vancouver (CA)
Assigned to Strata Identity, Inc., Niwot, CO (US)
Filed by Strata Identity, Inc., Niwot, CO (US)
Filed on Jun. 21, 2023, as Appl. No. 18/339,125.
Claims priority of provisional application 63/354,291, filed on Jun. 22, 2022.
Int. Cl. H04L 43/18 (2022.01); H04L 67/02 (2022.01); H04L 9/40 (2022.01)
CPC H04L 43/18 (2013.01) [H04L 63/08 (2013.01); H04L 67/02 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A system configured for analyzing authentication and authorization requirements in an identity infrastructure, the system comprising:
one or more hardware processors configured by machine-readable instructions to:
intercept, at a server, a first request to access an application in the identity infrastructure, wherein the first request is received from a first user device;
transmit, from the server, one or more of the first request and a modified version of the first request to the application;
intercept, at the server, a response from the application, based at least in part on the transmission;
display, via at least one interface, an analysis of one or more of the first request, the modified version of the first request, and the response, wherein the analysis comprises determining at least one of: requirements for application authentication and authorization, one or more identity protocols utilized by the application, one or more identity techniques utilized by the application, whether application meets predetermined compliance standards, and whether any user-defined security requirements have been implemented; and
capture a second request to access the application, wherein the second request comprises the modified version of the first request and includes one or more identity dependencies received from an identity and access management (IAM) system;
wherein the transmission comprises transmitting the second request to the application; and
wherein intercepting the response comprises intercepting the response from one of the IAM system or the application.