ServiceNow, Inc.
System for permitting access to scoped applications
Last updated:
Abstract:
A public key embedded in a scoped application can be used to permit a trusted application to access a scoped application. The scoped application can receive a request for access to an interface of the scoped application from the trusted application. The request can include a signed identifier that is signed using a private key corresponding to the public key. The signed identifier can be authenticated using the public key. The scoped application can also verify that the signed identifier matches an identifier of the trusted application. Responsive to the authentication and verification, the trusted application may be permitted to have access to the interface of the scoped application. The private key and the public key are generated at a customer service instance operated by a computing provider. The private key is not shared outside of the customer service instance.
Utility
20 Apr 2017
3 Dec 2019