International Business Machines Corporation
DYNAMIC MANAGEMENT OF USER IDENTIFICATIONS

Last updated:

Abstract:

An example operation may include one or more of authenticating a user, by a first system node, based on a first set of user credentials, computing, by the first system node, a second set of user credentials for a second system node, testing the second system node, by the first system node, to determine if the second system node has a user with the second set of the user credentials, and responsive to the second system node not having the user with the second set of the user credentials, creating a user with the second set of the user credentials.

Status:
Application
Type:

Utility

Filling date:

1 Apr 2020

Issue date:

7 Oct 2021