Protection of application passwords using a secure proxy

ABSTRACT

A computer-implemented method, computer program product, and system for tagging and replacing tagged credentials with target credentials unknown to a client. The method includes; receiving an access request from a client to access a protected resource on a target server, injecting credential field tags into a credential form used to access the protected resource, auto-submitting the credential form on the client computer, replace tagged credentials with target credentials, submitting the target credentials to the target server, and updating the target credentials if the target credentials are invalid or expired without intervention by the client.

BACKGROUND

The present invention relates generally to the field of userauthentication, and more particularly to proxy-based authenticationmanagement.

Authentication in computer systems can be done in various ways andinvolves acquiring user or application characteristics or credentialsand verifying them against a known value. In popular conventionalauthentication implementations, a user, which can be a person or anapplication, requesting a connection to a target will interact with aclient (machine) which then provides client credentials to the target.Typically, the target is a server machine or server process providing aservice to the client. Typically, direct connection is made to thetarget via a protocol. The target (or server) can be implemented eitherin hardware or by software. Upon receiving the client credentials, thetarget will authenticate the provided client credentials by comparingthem with known values in order to verify the client and accordinglyauthorize (grant or deny) the request for connection. In thisconventional authentication process, security breaches can occur at theclient, at the target, and in the transfer of client credentials betweenthe client and the target (during communications).

SUMMARY

Embodiments of the present invention disclose a computer-implementedmethod, computer program product, and system for tagging and replacingtagged credentials with target credentials unknown to a clientincluding; receiving an access request from a client to access aprotected resource on a target server, injecting credential field tagsinto a credential form used to access the protected resource,auto-submitting the credential form on the client computer, replacetagged credentials with target credentials, submitting the targetcredentials to the target server, and updating the target credentials ifthe target credentials are invalid or expired without intervention bythe client.

BRIEF DESCRIPTION OF THE DRAWINGS

The following detailed description, given by way of example and notintended to limit the invention solely thereto, will best be appreciatedin conjunction with the accompanying drawings, in which:

FIG. 1 is a functional block diagram illustrating a proxy serverauthentication environment, according to an exemplary embodiment;

FIG. 2 is credential replacement flowchart depicting the operationalsteps of a credential replacement program, according to an exemplaryembodiment;

FIG. 3 is a block diagram of components of a server or computing deviceexecuting the credential replacement program, according to an exemplaryembodiment;

FIG. 4 depicts a cloud computing environment, according to an exemplaryembodiment; and

FIG. 5 depicts abstract model layers of a cloud computing environment,according to an exemplary embodiment.

The drawings are not necessarily to scale. The drawings are merelyschematic representations, not intended to portray specific parametersof the invention. The drawings are intended to depict only typicalembodiments of the invention. In the drawings, like numbering representslike elements.

DETAILED DESCRIPTION

Detailed embodiments of the claimed structures and methods are disclosedherein; however, it can be understood that the disclosed embodiments aremerely illustrative of the claimed structures and methods that may beembodied in various forms. This invention may, however, be embodied inmany different forms and should not be construed as limited to theexemplary embodiments set forth herein. In the description, details ofwell-known features and techniques may be omitted to avoid unnecessarilyobscuring the presented embodiments.

References in the specification to “one embodiment”, “an embodiment”,“an example embodiment”, etc., indicate that the embodiment describedmay include a particular feature, structure, or characteristic, butevery embodiment may not necessarily include the particular feature,structure, or characteristic. Moreover, such phrases are not necessarilyreferring to the same embodiment. Further, when a particular feature,structure, or characteristic is described in connection with anembodiment, it is submitted that it is within the knowledge of oneskilled in the art to affect such feature, structure, or characteristicin connection with other embodiments whether or not explicitlydescribed.

The present invention relates generally to the field of userauthentication, and more particularly to proxy-based authenticationmanagement. Typically, a proxy server acts as an intermediary between aclient (i.e., a user) and a protected resource. A proxy server commonlyperforms tasks such as user authentication where a client requestsaccess to a protected resource stored on a target server, the proxyforwards the request to the target server which then returns credentialfield requirements for access to the protected resource. For example, auser may send a request for access to a protected resource via acomputing device where the proxy server intercepts the request andreturns a response including, for example, required credential fields asif the response came directly from a target server. Typically, a proxyserver acts as an intermediary between a user and a protected resource,however, the protection provided by the proxy server may be limitedduring certain credential events (e.g., password generation or passwordchange) due to users recycling common passwords across a plurality ofapplications.

According to one embodiment, the risks of a user created password may beavoided by using a set of client credentials for user authentication(e.g., into an enterprise account) and a set of target credentialslinked to the user (but unknown to the user) for access a protectedresource. It may be advantageous to use credential field tags to maprequired credential fields to user target credentials, where the targetcredential tags are injected into each credential field required toaccess a protected resource. The proxy server can then replace therequired credential fields with the target credentials upon credentialsubmission from the client. Additionally, if the target credentials areexpired (e.g., expired password) the proxy server can change the targetcredentials (without user intervention) and store the updated targetcredentials for future use.

As used in this description and the accompanying claims, the followingterms shall have the meanings indicated, unless the context otherwiserequires.

The term ‘authentication’ or ‘authenticating’ in the context of thisdocument generally refers to the process of verifying the identity of aperson or application. This process can include receiving credentials ofthe person or application, comparing them with known values, andaccordingly verifying (successfully or unsuccessfully) the identity ofthe person or application.

The term ‘authorization’ or ‘authorizing’ in the context of thisdocument generally refers to the process of granting or denying accessor a level of access to a target system to a person or application thathas been authenticated.

The term ‘client credentials’ in the context of this document generallyrefers to credentials possessed by the client which can be used toverify that a client is who the client claims to be. Client credentialscan be used in authentication with another element or module of asystem, for example authentication to a proxy or an enterprise account.

The term ‘target credentials’ or ‘proxy-target credentials’ in thecontext of this document generally refers to credentials forauthentication to a target. Target credentials can be passed to thetarget by another element or module of a system, for example by a proxyserver.

The term ‘credentials’, when used in general in this document, can referto any credentials in the system, including client credentials andtarget credentials.

In the context of this document, the term ‘user’ or is generally used torefer to a human who is interacting with a client computer, but can alsorefer to an application on the client computer, to a computer or deviceconnected to the client computer (such as mobile or network device), andto a computer or device, such as a piece of hardware (where the hardwareis acting as the user). One skilled in the art will realize from thecontext of the description in this document that the term “user” mayalso refer to an application on a client.

In the context of this document, the term ‘client’, ‘client computer’,or ‘client machine’ generally refers to the machine, device, or moduleused by a user (human, application, or machine). For example, anapplication (user) can reside on a client machine. Actions performed bya user are typically performed on the client (client machine). As willbe obvious to one skilled in the art, the use of the general term‘client’ refers to a portion of the system including the client machineand/or an associated user, user actions, and/or client processes. Theterm ‘client’ when used in connection with actions or processes of thesystem can refer to user actions and/or client machine processes.

The term ‘proxy’ in the context of this document generally refers to amachine, module, application, or system that acts as an intermediary forrequests between clients and target(s).

The term ‘target’ or ‘target server’ in the context of this documentgenerally refers to a machine, module, application, or system thatprovides service to a client. Typically, a client desires connectionwith a target, and the client initiates connection requests between theclient and the target.

The term ‘protected resource” in the context of this document generallyrefers to a resource (an application, an object, a document, a page, afile, executable code, or other computational resource,communication-type resource, etc.) for which access is controlled orrestricted. A protected resource is identified by a Uniform ResourceLocator (URL), or more generally, a Uniform Resource Identifier (URI),that can only be accessed by an authenticated and authorized user.

FIG. 1 is a functional block diagram of a proxy server authenticationenvironment 100, according to one or more embodiments of the presentinvention. More specifically, proxy server authentication environment100 includes computing device 102, proxy server 120, vault 130, andtarget server 140 connected via network 110. It should be appreciatedthat illustrated figures provide only an illustration of oneimplementation and does not imply any limitations with regard to theenvironments in which different embodiments may be implemented. Manymodifications to the depicted environments may be made based on designand implementation requirements.

Network 110 can be, for example, a local area network (LAN), a wide areanetwork (WAN) such as the Internet, or a combination of the two, and caninclude wired, wireless, or fiber optic connections. In general, network110 can be any combination of connections and protocols that willsupport communications between computing device 102, proxy server 120,and/or target server 140, in accordance with one or more embodiments ofthe invention.

Target server 140 may be a mainframe server computer system such as amanagement server, a web server, or a computing device such as a laptopcomputer, tablet computer, netbook computer, personal computer (PC), adesktop computer, a personal digital assistant (PDA), a smartphone, aSMS capable phone, or any programmable electronic device capable ofcommunicating with proxy server 120, computing device 102, and vault 130via network 110, in accordance with one or more embodiments of theinvention. Target server 140 can represent a “cloud” of computersinterconnected by one or more networks, where the respective servers area primary server for a computing system utilizing clustered computerswhen accessed through network 110. Target server 140 can include aprotected resource 142 such as, for example, Facebook®.

Computing device 102 may be laptop computers, tablet computers, netbookcomputers, personal computers (PC), desktop computers, personal digitalassistants (PDA), smartphones, SMS capable phones, or any programmableelectronic device capable of communicating with proxy server 120 vianetwork 110, in accordance with one or more embodiments of theinvention. In an embodiment, computing device 102 may be a clientcomputer having a graphical user interface (GUI) 104 allowing a user tolog into an enterprise account and/or for requesting access to protectedresource 142 via network 110. An access request sent by the client maybe intercepted by proxy server 120 for further processing as will bediscussed below.

Proxy server 120 may be a mainframe server computer system such as amanagement server, a web server, or a computing device such as a laptopcomputer, tablet computer, netbook computer, personal computer (PC), adesktop computer, a personal digital assistant (PDA), a smartphone, aSMS capable phone, or any programmable electronic device capable ofcommunicating with target server 140, computing device 102, and vault130 via network 110, in accordance with one or more embodiments of theinvention. Proxy server 120 can also represent a “cloud” of computersinterconnected by one or more networks, where the respective servers area primary server for a computing system utilizing clustered computerswhen accessed through network 110.

In an embodiment, proxy server 120 acts as an intermediary between aclient-side and a server-side authentication infrastructure, where proxyserver 120 can operate in conjunction with one or more authenticationservers. For example, a user may be authenticated into a client-sideinfrastructure using enterprise account credentials and may beauthenticated into a server-side infrastructure using target credentials(unknown to the user), where the target credentials are required toaccess protected resource 142. The terms “server-side” and “client-side”refer to actions or entities at a server or a client, respectively,within proxy server authentication environment 100.

Proxy server 120 includes credential program 122, which is a collectionof machine readable instructions and data that is used to receive,authenticate, tag, and replace credential fields required to accessprotected resource 142, according to one or more embodiments of thepresent invention. Credential program 122 includes a plurality ofmodules such as client authentication module 124 (for authenticating auser), client request module 126 (for receiving and tagging clientrequests for access to a protected resource), and credential replacementmodule 128 (for replacing tagged credential fields with targetcredentials).

Client authentication module 124 is a collection of machine readableinstructions and data that is used to authenticate a user into aclient-side infrastructure (e.g., into an enterprise account), accordingto one or more embodiments of the present invention. The user can beauthenticated using any authentication techniques known in the art suchas, for example, by authenticating the user into an enterprise accountusing privileged account credentials or root account credentials.Alternatively, the user may be authenticated after proxy server 120receives an access request to access protected resource 142. Userauthentication can be initiated by the user or automatically when proxyserver 120 receives the access request. If the user is not authenticatedat the time of receiving the access request, client authenticationmodule 124 can require the user to perform an authentication process bysending the client some type of authentication challenge (e.g., aclient-side credential requirement). The authentication challenge may bein various formats, such as an HTML form. The user then provides therequested or required information, such as a user identifier and anassociated password, or the client may automatically return certaininformation. The user authentication or authentication challenge maysupport forms-based single-sign-on operations in accordance with anembodiment of the present invention.

An active session can be initiated upon authorization of the user, suchthat proxy server 140 can maintain information regarding a secureclient-side session for the authorized user during the active session.Accordingly, information may be available for retrieval by proxy server120 on behalf of the user during an active session. When proxy server120 or some other server requires any other authentication informationor the intervention of another authentication processes, it may beassumed that such resources are available to proxy server 120 through anappropriate authentication infrastructure. After the user isauthenticated, an access request can be process by client request module126.

Client request module 126 is a collection of machine readableinstructions and data that is used to process access requests, accordingto one or more embodiments of the present invention. The process isinitiated when the user request a server-side protected resource (e.g.,protected resource 142), such as a web page within the domain “ibm.com”.The user can send the access request via a web browser (or associatedapplication or applet) via GUI 104, such that an HTTP request is sent totarget server 140 (hosting protected resource 142) and which isintercepted by proxy server 120 and forwarded to target server 140.Client request module 126 receives an access response from target server140 regarding the forwarded access request, for example, a credentialform having required credential fields for access to protected resource142. Client request module 126 can identify the protocol of targetserver 140, for example, Hypertext Transfer Protocol (HTTP), remotedesktop protocol (RDP), or secure shell (SSH) protocol using techniquesknown in the art. After client request module 126 identifies therequired credential fields in the access response, tagged credentialsand credential field tags are injected into each required credentialfield on the credential form. The credential field tags may be, forexample, a client-side script (e.g., JavaScript). If the requiredcredential fields include a username and password, a tag_username andtag_password may be injected into each credential field, respectively.Client request module 126 then sends the tagged credential form to theclient (e.g., computing device 102). The tagging scripts can automateelements of GUI 104 on the client application (browser, desktopapplications, etc.). The scripts can also be used for auto-submittal ofthe credential form by GUI 104 without user intervention. Once thecredential form is submitted, credential replacement module 128 canreplace the required credential fields with target credentials.

Credential replacement module 128 is a collection of machine readableinstructions and data that is used to identify required targetcredential fields tagged by client request module 126 and replacing therequired credential fields with target credentials. After the proxyserver 120 receives the credential form submitted with taggedcredentials and credential field tags, credential replacement module 128searches data store 123 for target credentials mapped to theauthenticated user via the credential field tags. If there are no targetcredentials stored in data store 128, credential replacement module 128may generate target credentials for the authenticated user. If targetcredentials are found in data store 128, credential replacement module128 may replace the tagged credentials and credential field tags withthe target credentials and submit the replaced credential form to targetserver 140 for access to protected resource 142. If the targetcredentials are valid, the user is given access to protected resource142, if the target credentials require additional steps (e.g.,credential fields need to be updated or changed), the required changesare done by credential replacement module 128 and the updated targetcredentials are stored in data store 132. The updated target credentialsare then used to allow the authenticated user to gain access toprotected resource 142.

FIG. 2 is a credential replacement flowchart 200 depicting operationalsteps of credential replacement program 122, according to one or moreembodiments of the present invention. A user (or client machine) isauthenticated into, for example, an enterprise account using techniquesdiscussed above. Credential replacement program 122 receives a requestoriginating from the authenticated user to access protected resource 142and forwards the access request to target server 140 (Step 202).Credential replacement program 122 receives a credential form fromtarget server 140 and injects credential field tags into each requiredcredential field of the credential form (Step 204). Credentialreplacement program 122 sends the tagged credential form to clientcomputer, (Step 206). Credential replacement program 122 receivescredential form with tagged credentials from client computer (Step 208)and replaces the tagged credentials with target credentials (Step 210).Credential replacement program 122 determines if the target credentialsare valid by submitting the replaced credentials in the credential formto target server (Step 211). If the target credentials are valid, theuser is given access to the protected resource (Step 214), if the targetcredentials need to be modified, credential replacement program 122modifies the target credentials and updates the target credentials inthe data store (Step 213) and allows the user to access the protectedresource (Step 214).

FIG. 3 is a block diagram of components of proxy server 120 inaccordance with one or more embodiments of the present invention. Itshould be noted, the components presented may be similar to componentsof computing device 102 or target server 140.

Proxy server 120 may include one or more processors 302, one or morecomputer-readable RAMs 304, one or more computer-readable ROMs 306, oneor more computer readable storage media 308, device drivers 312,read/write drive or interface 314, network adapter or interface 316, allinterconnected over a communications fabric 318. Communications fabric318 may be implemented with any architecture designed for passing dataand/or control information between processors (such as microprocessors,communications and network processors, etc.), system memory, peripheraldevices, and any other hardware components within a system.

One or more operating systems 310, and one or more application programs311, for example, credential program 122, are stored on one or more ofthe computer readable storage media 308 for execution by one or more ofthe processors 302 via one or more of the respective RAMs 304 (whichtypically include cache memory). In the illustrated embodiment, each ofthe computer readable storage media 308 may be a magnetic disk storagedevice of an internal hard drive, CD-ROM, DVD, memory stick, magnetictape, magnetic disk, optical disk, a semiconductor storage device suchas RAM, ROM, EPROM, flash memory or any other computer-readable tangiblestorage device that can store a computer program and digitalinformation.

Proxy server 120 may also include a R/W drive or interface 314 to readfrom and write to one or more portable computer readable storage media326. Application programs 311 on proxy server 120 may be stored on oneor more of the portable computer readable storage media 326, read viathe respective R/W drive or interface 314 and loaded into the respectivecomputer readable storage media 308.

Proxy server 120 may also include a network adapter or interface 316,such as a TCP/IP adapter card or wireless communication adapter (such asa 4G wireless communication adapter using OFDMA technology). Applicationprograms 311 on proxy server 120 may be downloaded from an externalcomputer or external storage device via a network (for example, theInternet, a local area network or other wide area network or wirelessnetwork) and network adapter or interface 316. From the network adapteror interface 316, the programs may be loaded onto computer readablestorage media 308. The network may comprise copper wires, opticalfibers, wireless transmission, routers, firewalls, switches, gatewaycomputers and/or edge servers.

Proxy server 120 may also include a display screen 320, a keyboard orkeypad 322, and a computer mouse or touchpad 324. Device drivers 312interface to display screen 320 for imaging, to keyboard or keypad 322,to computer mouse or touchpad 324, and/or to display screen 320 forpressure sensing of alphanumeric character entry and user selections.The device drivers 312, R/W drive or interface 314 and network adapteror interface 316 may comprise hardware and software (stored on computerreadable storage media 308 and/or ROM 306).

The programs described herein are identified based upon the applicationfor which they are implemented in a specific embodiment of theinvention. However, it should be appreciated that any particular programnomenclature herein is used merely for convenience, and thus theinvention should not be limited to use solely in any specificapplication identified and/or implied by such nomenclature.

The present invention may be a system, a method, and/or a computerprogram product. The computer program product may include a computerreadable storage medium (or media) having computer readable programinstructions thereon for causing a processor to carry out aspects of thepresent invention.

The computer readable storage medium can be a tangible device that canretain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a static random access memory (SRAM), a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present invention may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, or either source code or object code written in anycombination of one or more programming languages, including an objectoriented programming language such as Smalltalk, C++ or the like, andconventional procedural programming languages, such as the “C”programming language or similar programming languages. The computerreadable program instructions may execute entirely on the user'scomputer, partly on the user's computer, as a stand-alone softwarepackage, partly on the user's computer and partly on a remote computeror entirely on the remote computer or server. In the latter scenario,the remote computer may be connected to the user's computer through anytype of network, including a local area network (LAN) or a wide areanetwork (WAN), or the connection may be made to an external computer(for example, through the Internet using an Internet Service Provider).In some embodiments, electronic circuitry including, for example,programmable logic circuitry, field-programmable gate arrays (FPGA), orprogrammable logic arrays (PLA) may execute the computer readableprogram instructions by utilizing state information of the computerreadable program instructions to personalize the electronic circuitry,in order to perform aspects of the present invention.

Aspects of the present invention are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions.

These computer readable program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that can directa computer, a programmable data processing apparatus, and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart and/or block diagram blockor blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof instructions, which comprises one or more executable instructions forimplementing the specified logical function(s). In some alternativeimplementations, the functions noted in the block may occur out of theorder noted in the figures. For example, two blocks shown in successionmay, in fact, be executed substantially concurrently, or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, can be implementedby special purpose hardware-based systems that perform the specifiedfunctions or acts or carry out combinations of special purpose hardwareand computer instructions.

It is understood in advance that although this disclosure includes adetailed description on cloud computing, implementation of the teachingsrecited herein are not limited to a cloud computing environment. Rather,embodiments of the present invention are capable of being implemented inconjunction with any other type of computing environment now known orlater developed.

Cloud computing is a model of service delivery for enabling convenient,on-demand network access to a shared pool of configurable computingresources (e.g. networks, network bandwidth, servers, processing,memory, storage, applications, virtual machines, and services) that canbe rapidly provisioned and released with minimal management effort orinteraction with a provider of the service. This cloud model may includeat least five characteristics, at least three service models, and atleast four deployment models.

Characteristics are as Follows:

On-demand self-service: a cloud consumer can unilaterally provisioncomputing capabilities, such as server time and network storage, asneeded automatically without requiring human interaction with theservice's provider.

Broad network access: capabilities are available over a network andaccessed through standard mechanisms that promote use by heterogeneousthin or thick client platforms (e.g., mobile phones, laptops, and PDAs).

Resource pooling: the provider's computing resources are pooled to servemultiple consumers using a multi-tenant model, with different physicaland virtual resources dynamically assigned and reassigned according todemand. There is a sense of location independence in that the consumergenerally has no control or knowledge over the exact location of theprovided resources but may be able to specify location at a higher levelof abstraction (e.g., country, state, or datacenter).

Rapid elasticity: capabilities can be rapidly and elasticallyprovisioned, in some cases automatically, to quickly scale out andrapidly released to quickly scale in. To the consumer, the capabilitiesavailable for provisioning often appear to be unlimited and can bepurchased in any quantity at any time.

Measured service: cloud systems automatically control and optimizeresource use by leveraging a metering capability at some level ofabstraction appropriate to the type of service (e.g., storage,processing, bandwidth, and active user accounts). Resource usage can bemonitored, controlled, and reported providing transparency for both theprovider and consumer of the utilized service.

Service Models are as Follows:

Software as a Service (SaaS): the capability provided to the consumer isto use the provider's applications running on a cloud infrastructure.The applications are accessible from various client devices through athin client interface such as a web browser (e.g., web-based e-mail).The consumer does not manage or control the underlying cloudinfrastructure including network, servers, operating systems, storage,or even individual application capabilities, with the possible exceptionof limited user-specific application configuration settings.

Platform as a Service (PaaS): the capability provided to the consumer isto deploy onto the cloud infrastructure consumer-created or acquiredapplications created using programming languages and tools supported bythe provider. The consumer does not manage or control the underlyingcloud infrastructure including networks, servers, operating systems, orstorage, but has control over the deployed applications and possiblyapplication hosting environment configurations.

Infrastructure as a Service (IaaS): the capability provided to theconsumer is to provision processing, storage, networks, and otherfundamental computing resources where the consumer is able to deploy andrun arbitrary software, which can include operating systems andapplications. The consumer does not manage or control the underlyingcloud infrastructure but has control over operating systems, storage,deployed applications, and possibly limited control of select networkingcomponents (e.g., host firewalls).

Deployment Models are as Follows:

Private cloud: the cloud infrastructure is operated solely for anorganization. It may be managed by the organization or a third party andmay exist on-premises or off-premises.

Community cloud: the cloud infrastructure is shared by severalorganizations and supports a specific community that has shared concerns(e.g., mission, security requirements, policy, and complianceconsiderations). It may be managed by the organizations or a third partyand may exist on-premises or off-premises.

Public cloud: the cloud infrastructure is made available to the generalpublic or a large industry group and is owned by an organization sellingcloud services.

Hybrid cloud: the cloud infrastructure is a composition of two or moreclouds (private, community, or public) that remain unique entities butare bound together by standardized or proprietary technology thatenables data and application portability (e.g., cloud bursting forload-balancing between clouds).

A cloud computing environment is service oriented with a focus onstatelessness, low coupling, modularity, and semantic interoperability.At the heart of cloud computing is an infrastructure comprising anetwork of interconnected nodes.

FIG. 4 is an exemplary illustration of a cloud computing environment,according to one or more embodiments of the present invention. The cloudcomputing environment can include one or more cloud computing nodes withwhich local computing devices used by cloud consumers, such as, forexample, personal digital assistant (PDA) or cellular telephone 440A,desktop computer 440B, and/or laptop computer 440C may communicate. Thenodes may be grouped (not shown) physically or virtually, in one or morenetworks, such as Private, Community, Public, or Hybrid clouds asdescribed hereinabove, or a combination thereof. This allows the cloudcomputing environment to offer infrastructure, platforms and/or softwareas services for which a cloud consumer does not need to maintainresources on a local computing device. It is understood that the typesof computing devices 440A-C are intended to be illustrative only andthat computing nodes and the cloud computing environment can communicatewith any type of computerized device over any type of network and/ornetwork addressable connection (e.g., using a web browser).

FIG. 5 is a set of functional abstraction layers provided by the cloudcomputing environment illustrated in FIG. 4, according to one or moreembodiments of the present invention. It should be understood in advancethat the components, layers, and functions shown in FIG. 5 are intendedto be illustrative only and embodiments of the invention are not limitedthereto. As depicted, the following layers and corresponding functionsare provided:

Hardware and software layer 500 includes hardware and softwarecomponents. Examples of hardware components include: mainframes 501;RISC (Reduced Instruction Set Computer) architecture based servers 502;servers 503; blade servers 504; storage devices 505; and networks andnetworking components 506. In some embodiments, software componentsinclude network application server software 507 and database software508.

Virtualization layer 570 provides an abstraction layer from which thefollowing examples of virtual entities may be provided: virtual servers571; virtual storage 572; virtual networks 573, including virtualprivate networks; virtual applications and operating systems 574; andvirtual clients 575.

In one example, management layer 580 may provide the functions describedbelow. Resource provisioning 581 provides dynamic procurement ofcomputing resources and other resources that are utilized to performtasks within the cloud computing environment. Metering and Pricing 582provide cost tracking as resources are utilized within the cloudcomputing environment, and billing or invoicing for consumption of theseresources. In one example, these resources may comprise applicationsoftware licenses. Security provides identity verification for cloudconsumers and tasks, as well as protection for data and other resources.User portal 583 provides access to the cloud computing environment forconsumers and system administrators. Service level management 584provides cloud computing resource allocation and management such thatrequired service levels are met. Service Level Agreement (SLA) planningand fulfillment 585 provide pre-arrangement for, and procurement of,cloud computing resources for which a future requirement is anticipatedin accordance with an SLA.

Workloads layer 590 provides examples of functionality for which thecloud computing environment may be utilized. Examples of workloads andfunctions which may be provided from this layer include: mapping andnavigation 591; software development and lifecycle management 592;virtual classroom education delivery 593; data analytics processing 594;transaction processing 595; and credential replacement processing 596.

The programs described herein are identified based upon the applicationfor which they are implemented in a specific embodiment of theinvention. However, it should be appreciated that any particular programnomenclature herein is used merely for convenience, and thus theinvention should not be limited to use solely in any specificapplication identified and/or implied by such nomenclature.

The descriptions of the various embodiments of the present inventionhave been presented for purposes of illustration, but are not intendedto be exhaustive or limited to the embodiments disclosed. Manymodifications and variations will be apparent to those of ordinary skillin the art without departing from the scope and spirit of the invention.The terminology used herein was chosen to best explain the principles ofthe embodiment, the practical application or technical improvement overtechnologies found in the marketplace, or to enable others of ordinaryskill in the art to understand the embodiments disclosed herein.

What is claimed is:
 1. A computer-implemented method comprising:receiving, by one or more processors, an access request from a clientcomputer for access to a protected resource stored on a target server;forwarding, by the one or more processors, the access request to thetarget server; receiving, by the one or more processors, an accessresponse from the target server, wherein the access response is acredential form including credential fields required to access theprotected resource; injecting, by the one or more processors, acredential field tag into each required credential field; sending, bythe one or more processors, the tagged credential form to the clientcomputer; receiving, by the one or more processors, a tagged credentialform from the client computer including tagged credentials in therequired credential fields with the credential field tags, wherein thetagged credentials are auto-submitted by the client computer; replacing,by the one or more processors, the tagged credentials with targetcredentials mapped by the credential field tags, wherein the targetcredentials are stored in a protected data store; sending, by the one ormore processors, the target credentials to the target server; updating,by the one or more processors, the target credentials and storing theupdated target credentials in a protected data store without clientintervention; determining, by the one or more processors, the targetcredentials are invalid; replacing, by the one or more processors, theinvalid target credentials with the updated target credentials andsubmitting the updated target credentials to the target server, inresponse to the target credentials being invalid; and allowing, by theone or more processors, the client computer to access the protectedresource, in response to the target server validating the targetcredentials.
 2. The method of claim 1, wherein the user is authenticatedinto an enterprise account using client credentials.
 3. The method ofclaim 1, further comprising: entering, by the one or more processors,the tagged credentials into the credential form having credential fieldtags.
 4. The method of claim 1, wherein the target credentials aregenerated by the one or more processors.
 5. The method of claim 1,wherein the credential field tags are in the form of JavaScript.
 6. Acomputer program product comprising: one or more non-transitorycomputer-readable storage media and program instructions stored on theone or more non-transitory computer-readable storage media, the programinstructions comprising: program instructions to receive, by the one ormore processors, an access request from a client computer for access toa protected resource stored on a target server; program instructions toforward, by the one or more processors, the access request to the targetserver; program instructions to receive, by the one or more processors,an access response from the target server, wherein the access responseis a credential form including credential fields required to access theprotected resource; program instructions to inject, by the one or moreprocessors, a credential field tag into each required credential field;program instructions to send, the one or more processors, the taggedcredential form to the client computer; program instructions to receive,by the one or more processors, a tagged credential form from the clientcomputer including tagged credentials in the required credential fieldswith the credential field tags, wherein the tagged credentials areauto-submitted by the client computer; program instructions to replace,by the one or more processors, the tagged credentials with targetcredentials mapped by the credential field tags, wherein the targetcredentials are stored in a protected data store; program instructionsto send, by the one or more processors, the target credentials to thetarget server; program instructions to update, by the one or moreprocessors, the target credentials and storing the updated targetcredentials in a protected data store without client intervention;program instructions to determine, by the one or more processors, thetarget credentials are invalid; program instructions to replace, by theone or more processors, the invalid target credentials with the updatedtarget credentials and to submit the updated target credentials to thetarget server, in response to the target credentials being invalid; andprogram instructions to allow, by the one or more processors, the clientcomputer to access the protected resource, in response to the targetserver validating the target credentials.
 7. The computer programproduct of claim 6, wherein the user is authenticated into an enterpriseaccount using client credentials.
 8. The computer program product ofclaim 6, further comprising: program instructions to enter, by the oneor more processors, the tagged credentials into the credential formhaving credential field tags.
 9. The computer program product of claim6, wherein the target credentials are generated by the one or moreprocessors.
 10. The computer program product of claim 6, wherein thecredential field tags are in the form of JavaScript.
 11. A computersystem comprising: one or more computer processors; one or morecomputer-readable storage media; and program instructions stored on thecomputer-readable storage media for execution by at least one of the oneor more computer processors, the program instructions comprising:program instructions to receive, by the one or more processors, anaccess request from a client computer for access to a protected resourcestored on a target server; program instructions to forward, by the oneor more processors, the access request to the target server; programinstructions to receive, by the one or more processors, an accessresponse from the target server, wherein the access response is acredential form including credential fields required to access theprotected resource; program instructions to inject, by the one or moreprocessors, a credential field tag into each required credential field;program instructions to send, the one or more processors, the taggedcredential form to the client computer; program instructions to receive,by the one or more processors, a tagged credential form from the clientcomputer including tagged credentials in the required credential fieldswith the credential field tags, wherein the tagged credentials areauto-submitted by the client computer; program instructions to replace,by the one or more processors, the tagged credentials with targetcredentials mapped by the credential field tags, wherein the targetcredentials are stored in a protected data store; program instructionsto send, by the one or more processors, the target credentials to thetarget server; program instructions to update, by the one or moreprocessors, the target credentials and storing the updated targetcredentials in a protected data store without client intervention;program instructions to determine, by the one or more processors, thetarget credentials are invalid; program instructions to replace, by theone or more processors, the invalid target credentials with the updatedtarget credentials and to submit the updated target credentials to thetarget server, in response to the target credentials being invalid; andprogram instructions to allow, by the one or more processors, the clientcomputer to access the protected resource, in response to the targetserver validating the target credentials.
 12. The computer system ofclaim 11, wherein the user is authenticated into an enterprise accountusing client credentials.
 13. The computer system of claim 11, furthercomprising: program instructions to enter, by the one or moreprocessors, the tagged credentials into the credential form havingcredential field tags.
 14. The computer system of claim 11, wherein thetarget credentials are generated by the one or more processors.