Browse Prior Art Database

Bypassing Sign-On Using Pass-Through

IP.com Disclosure Number: IPCOM000036926D
Original Publication Date: 1989-Nov-01
Included in the Prior Art Database: 2005-Jan-29
Document File: 1 page(s) / 12K

Publishing Venue

IBM

Related People

Budnik, CS: AUTHOR [+3]

Abstract

The disclosed technique provides a way for users of personal computers and other systems to sign-on automatically to host systems. This eliminates the need to sign-on at the target system of a pass-through operation, provides a mechanism for the source system to identify the request to automatically sign-on, and allows the target system to permit the pass-through session to automatically sign-on.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 1 of 1

Bypassing Sign-On Using Pass-Through

The disclosed technique provides a way for users of personal computers and other systems to sign-on automatically to host systems. This eliminates the need to sign-on at the target system of a pass-through operation, provides a mechanism for the source system to identify the request to automatically sign-on, and allows the target system to permit the pass-through session to automatically sign-on.

Eliminating the need to sign-on the target system of a pass- through operation is accomplished by providing the sign-on information (user id, password, plus other sign-on parameters) with the request to sign-on. It uses a standard communications protocol to accomplish this task. The request to initiate processing at a remote system can be initiated either from a terminal attached to an AS/400 or from a personal computer on a local area network requesting use of the work station feature. In addition, the technique provides the capability in a trusted network to not send passwords for same-user automatic sign-on attempts, and it permits the user to provide an exit program to monitor all remote sign-on attempts.

The following scenario provides the steps taken by each of the participants when a user requests automatic sign-on. Source System 1. The user requests to initiate an interactive job at the target system. The sign-on data for the target system are supplied with the request. NETWORK 2. The user id and password are passed in the ATTACH. Other data are passed as PIP data. Target System
3. The target system handles the ATTACH and validates the user id and password. 4. When the ATTACH is valid,...