System and method for combining an access control system with a traffic management system

A technology for network business and management equipment, applied in the direction of transmission systems, electrical components, etc., can solve the problems of heavy management costs, lack of security, etc.

Active Publication Date: 2013-11-20
F5 NETWORKS INC
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This is burdensome and expensive to manage, challenges interoperability and scalability, and lacks security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for combining an access control system with a traffic management system
  • System and method for combining an access control system with a traffic management system
  • System and method for combining an access control system with a traffic management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] figure 1 It is a schematic diagram of an example system environment for improving network performance according to an aspect of the present application. Such as figure 1 As shown, the example system environment 100 utilizes multiple network devices, such as one or more network traffic management devices 110 , one or more servers 102 , and one or more client devices 106 . It should be noted that environment 100 may include other numbers and types of network devices in other settings. In this application, if a network device is referred to in the singular (eg client device, network traffic management device, server), it should be pointed out that more than one network device is conceivable. Likewise, where network devices are referred to in the plural (eg, multiple client devices, multiple network traffic management devices, multiple servers), it should be noted that a single network device is contemplated.

[0021] Client devices 106 include network computing devices ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system and method for handling a request from a client device to access a service from a server. The method comprises receiving a request from a user using a client device to access a service from a server. The request is received by a network traffic management device having a local external access management (EAM) agent. The EAM agent directly communicates with an EAM server that provides authentication policy information of a plurality of users able to at least partially access the server. User credential information is sent from the EAM agent to the EAM server, whereby the EAM agent receives access policy information of the user from the EAM server. The system and method selectively controls access of the user's request to the server in accordance with the received access policy information at the network traffic management device.

Description

technical field [0001] The technology generally relates to network communication security, and specifically relates to a system and method for enforcing dynamic access policies through external access management technology. Background technique [0002] Existing computer network systems utilize access management systems to control access to various applications and files. These systems include various components such as Enterprise Access Management (EAM) systems that store policy information. This policy information describes various security settings for applications and files protected by the EAM system. The security settings may include authorization attributes for various users that are allowed to access the secure application. The EAM system securely maintains and implements authentication, authorization, and audit (AAA) procedures for each user consistent with the created policy configuration to ensure that only users who meet or have appropriate security levels are ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L47/20
CPCH04L47/122H04L47/20H04L47/2408H04L63/0815H04L63/102
Inventor 丹尼斯·周阿米特·贾因
Owner F5 NETWORKS INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products