The present disclosure is a method for bridging requests for access to
resources between requestors in a distributed network and an
authenticator servicing the distributed network. The bridging mechanism
has security features including a naming service for machine
authentication and machine process rules to authorize what process
machines can perform. The security proxy bridge intercepts an access
request, and checks the IP address for machine authentication as well as
the machine process rules and if both verifications are successful, the
bridge then forwards the request for access to the authenticator. The
security proxy framework utilizes a data structure that provides a method
for storing selected security information stored as data records
supporting an authentication and authorization system for users to access
resources on multiple components of a distributed network supporting
multiple business units of an enterprise. Primary authentication
information stored herein includes general user information, security
information, and contact information.