Secure single sign-on and conditional access for client applications

An application program, client-side technology, applied in the direction of security devices, secure communication devices, computer security devices, etc.

Active Publication Date: 2019-04-02
CITRIX SYST INC
View PDF23 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] SSO and conditional access can be challenging for certain platforms such as mobile device platforms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure single sign-on and conditional access for client applications
  • Secure single sign-on and conditional access for client applications
  • Secure single sign-on and conditional access for client applications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In the following description of various embodiments, reference is made to the accompanying drawings identified above and forming a part hereof, and in which are shown by way of illustration various embodiments in which aspects described herein may be practiced. It is to be understood that other embodiments may be utilized and structural and functional modifications may be made without departing from the scope described herein. The various aspects are capable of other embodiments and of being practiced or of being carried out in various different ways.

[0025] It is to be understood that the phraseology and terminology used herein are for the purpose of description and should not be regarded as limiting. Rather, phrases and terms used herein should be given their broadest interpretations and meanings. The use of "comprises" and "comprises" and variations thereof is intended to cover the items listed thereafter and equivalents thereof as well as additional items and equ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Methods and systems for implementing single sign on (SSO) and/or conditional access for client applications are described herein. The system may comprise an identity provider gateway, and the system may authenticate a user of the client application using the identity provider gateway. In some aspects, a secure communication tunnel may be established between the client application and the identityprovider gateway, and the secure communication tunnel may use, for example, a client certificate. The identity provider gateway may grant or deny the client application access to one or more resourcesbased on information associated with the client certificate.

Description

technical field [0001] Aspects described herein relate generally to computer networking and data security. More specifically, aspects described herein relate to authorizing a client device to access one or more resources using single sign-on and / or conditional access mechanisms. Background technique [0002] Increasingly, device consuming software applications (eg, enterprise applications) may be used that may not be company-issued devices, such as bring your own device office (BYOD) devices. End users can expect their enterprise applications to have the user experience consumers prefer. For example, a user may desire to be able to perform single sign-on (SSO) to an enterprise application. At the same time, IT departments can expect authorized users to consume enterprise data securely on authorized endpoints using authorized applications. IT departments can also expect to leverage technologies such as machine learning to identify anomalous behavior and restrict access to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44
CPCG06F21/445H04L63/0272H04L63/0815H04L9/3213H04L9/3268H04L63/10H04L63/108H04L63/20H04L63/0823H04L63/083H04W12/069H04W12/068H04L63/029H04L63/0263H04L9/3236H04W12/08H04W12/37H04W12/71H04W12/72
Inventor 加纳达南·贾瓦哈
Owner CITRIX SYST INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products