Patent attributes
A computer-implemented method includes receiving a first request to grant an account access to a software application of a plurality of software applications, and determining whether a native database stores first permission data for the account to access the software application. This example method further includes, in response to determining that the database does not store the first permission data: sending, via a network to an application server configured to provide the software application, a second request for second permission data for the account to access the software application; responsive to sending the second request to the application server, receiving the second permission data from the application server; responsive to receiving the second permission data from the application server, storing the second permission data in the database; and granting, in accordance with the second permission data, access to the account to access the software application.