Browse Prior Art Database

Centralized Password Maintenance and Cross-Environment Propagation

IP.com Disclosure Number: IPCOM000110200D
Original Publication Date: 1992-Oct-01
Included in the Prior Art Database: 2005-Mar-25
Document File: 1 page(s) / 43K

Publishing Venue

IBM

Related People

Cahill, LM: AUTHOR [+3]

Abstract

Disclosed is a technique to provide a centralized password maintenance utility that allows for cross-environment propagation. The technique simplifies password maintenance for the user and would be implemented in the following way: 1. Access to the function would be through icon selection or menu choice. The user is then prompted to enter a password to gain access. 2. A window appears that contains a list of all devices, systems and applications that require passwords. Examples include workstation power-on, host ids, LAN ids, PhoneMail, and electronic forms and signatures. Displayed next to each item is the current password and the date it was last changed. 3. Users have the option to set one password that would apply to all devices, systems and applications.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 85% of the total text.

Centralized Password Maintenance and Cross-Environment Propagation

      Disclosed is a technique to provide a centralized password
maintenance utility that allows for cross-environment propagation.
The technique simplifies password maintenance for the user and would
be implemented in the following way:
      1.   Access to the function would be through icon selection or
menu choice.  The user is then prompted to enter a password to gain
access.
      2.   A window appears that contains a list of all devices,
systems and applications that require passwords.  Examples include
workstation power-on, host ids, LAN ids, PhoneMail, and electronic
forms and signatures.  Displayed next to each item is the current
password and the date it was last changed.
      3.   Users have the option to set one password that would apply
to all devices, systems and applications.  Changing this one password
automatically changes all of the passwords.  The option to have
different passwords also remains.
      4.   Once the new passwords are typed in, the user presses a
"Propagate" button.  The function communicates with each of the
devices and systems and automatically changes the password.
      5.   New devices, systems, and applications are added to the
function through a registration system. For example, to add a host
system id to the list, the user would select a "Register" button, and
be prompted for the type of system (host), the system name, an...