A method, apparatus and computer instructions for tracking security
attributes along invocation chain using secure propagation token. When a
user is authenticated, a propagation token is created. The propagation
token includes a caller list, a host list, and custom attributes. The
propagation token may be propagated downstream along with other marker
tokens. A service provider may associate custom attributes in the
propagation token or create custom propagation token to be propagated.
The propagation token tracks the original caller and subsequent callers
when user switches occur and a list of hosts at which the propagation
token lands on.