Unified provisioning of applications on devices in an enterprise system
First Claim
1. A method comprising:
- determining, based on a user role associated with an identity of a user, an account enabling the identity to access a first resource, wherein the first resource is accessible from a first device using a first application, wherein the first device is registered for the identity of the user;
configuring, by a computer system, the first application with connection information that enables the first application to connect the first device to a first target system based on the account, wherein the first target system provides access for the first resource according to the account;
configuring, by the computer system, the first application with access information that permits the first application to access the first resource, wherein the access information is based on access permitted to the identity by the account; and
transmitting the first application to the first device upon configuring the first application with the connection information and the access information.
1 Assignment
0 Petitions
Accused Products
Abstract
The present disclosure relates generally to managing access to an enterprise system using remote devices. Techniques are disclosed for provisioning applications on remote devices to access resources in an enterprise system. Specifically, applications may be automatically configured with access information (e.g., account information) and connection information to access a resource in an enterprise system using a remote device. Configuring an application may include determining an account for accessing a resource using the application. An account may be provisioned if one has not been established. Upon configuring an application, the device access management system may provide a configured application to the remote device(s) for which the application is configured. Once the configured application is received, the application may be automatically installed on the remote device, after which the application may be executed to access a resource.
-
Citations
20 Claims
-
1. A method comprising:
-
determining, based on a user role associated with an identity of a user, an account enabling the identity to access a first resource, wherein the first resource is accessible from a first device using a first application, wherein the first device is registered for the identity of the user; configuring, by a computer system, the first application with connection information that enables the first application to connect the first device to a first target system based on the account, wherein the first target system provides access for the first resource according to the account; configuring, by the computer system, the first application with access information that permits the first application to access the first resource, wherein the access information is based on access permitted to the identity by the account; and transmitting the first application to the first device upon configuring the first application with the connection information and the access information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer-readable medium comprising instructions stored thereon, that when executed by one or more processors, cause the one or more processors to perform operations comprising:
-
determining, based on a user role associated with an identity of a user, an account enabling the identity to access a first resource, wherein the first resource is accessible from a first device using a first application, wherein the first device is registered for the identity of the user; configuring, by a computer system, the first application with connection information that enables the first application to connect the first device to a first target system based on the account, wherein the first target system provides access for the first resource according to the account; configuring, by the computer system, the first application with access information that permits the first application to access the first resource, wherein the access information is based on access permitted to the identity by the account; and transmitting the first application to the first device upon configuring the first application with the connection information and the access information. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method comprising:
-
provisioning, based on a user role associated with an identity of a user, access for the identity to a first application and a second application, wherein the first application is provisioned for access to a first resource using a first remote device registered to the identity, and wherein the second application is provisioned for access to a second resource using the first remote device; configuring, by a computer system, the first application with first connection information and first access information to access the first resource using the first remote device, wherein the first access information is based on the access provisioned for the identity to the first application; configuring, by the computer system, the second application with second connection information and second access information to access the second resource using the first remote device, wherein the second access information is based on the access provisioned for the identity to the second application; transmitting the first application to the first remote device upon the configuring of the first application; and transmitting the second application to the first remote device upon the configuring of the second application. - View Dependent Claims (18, 19, 20)
-
Specification