Marco Murgia - Los Gatos CA, US Larry Tomlin - Chapel Hill NC, US Ivan Bojer - San Jose CA, US Jong Kann - Santa Clara CA, US Pierre Rafiq - Sunnyvale CA, US
International Classification:
H04L 29/06
US Classification:
726 4
Abstract:
The present invention is directed towards systems and methods for establishing and applying a policy group to control a user's access to an identified resource. A policy group representing an aggregate of one or more access configurations for a user to access one or more identified resources may be established via a policy manager. The policy group may include a login point component representing an entry point to access the identified resource. The login point may be configured via the policy manager to specify a uniform resource locator for the entry point. One or more authentication and authorization methods may be selected for the login point component. The device may receive a request to access the uniform resource locator. The device may initiate the policy group for evaluation. The device may initiate, with the user, one or more authentication and authorization methods specified by the login point component.
- Fort Lauderdale FL, US Larry Tomlin - Chapel Hill NC, US Ivan Bojer - San Jose CA, US Jong Kann - Santa Clara CA, US Pierre Rafiq - Sunnyvale CA, US
Assignee:
CITRIX SYSTEMS, INC. - Fort Lauderdale FL
International Classification:
H04L 29/06 G06F 21/45
US Classification:
726 1
Abstract:
The present invention is directed towards systems and methods for establishing and applying a policy group to control a user's access to an identified resource. A policy group representing an aggregate of one or more access configurations for a user to access one or more identified resources may be established via a policy manager. The policy group may include a login point component representing an entry point to access the identified resource. The login point may be configured via the policy manager to specify a uniform resource locator for the entry point. One or more authentication and authorization methods may be selected for the login point component. The device may receive a request to access the uniform resource locator. The device may initiate the policy group for evaluation. The device may initiate, with the user, one or more authentication and authorization methods specified by the login point component.