Securely authorizing access to remote resources
First Claim
1. A method for authorizing access to a cloud-based content repository, comprising:
- receiving, based on a determination that a mobile device complies with one or more compliance policies provided by a management service, a management identifier;
transmitting an access request including the management identifier to the content repository; and
receiving access to the content repository based on a determination that the management identifier is valid, wherein the step of receiving access to the content repository is preconditioned on bringing the mobile device into compliance with an encryption policy, wherein bringing the mobile device into compliance can include enabling encryption based on a configuration profile from the management service, and wherein the compliance is checked at the time of receiving the access request.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods and an apparatus are provided for securely authorizing access to remote resources. For example, a method is provided that includes receiving a request to determine whether a user device communicatively coupled to a resource server is authorized to access at least one resource hosted by the resource server and determining whether the user device communicatively coupled to the resource server is authorized to access the at least one resource hosted by the resource server based at least in part on whether the user device communicatively coupled to the resource server has been issued a management identifier. The method further includes providing a response indicating that the user device communicatively coupled to the resource server is authorized to access the at least one resource hosted by the resource server in response to a determination that the user device communicatively coupled to the resource server is authorized to access the at least one resource hosted by the resource server. The method yet further includes providing a response indicating that the user device communicatively coupled to the resource server is not authorized to access the at least one resource hosted by the resource server in response to a determination that the user device communicatively coupled to the resource server is not authorized to access the at least one resource hosted by the resource server.
81 Citations
18 Claims
-
1. A method for authorizing access to a cloud-based content repository, comprising:
-
receiving, based on a determination that a mobile device complies with one or more compliance policies provided by a management service, a management identifier; transmitting an access request including the management identifier to the content repository; and receiving access to the content repository based on a determination that the management identifier is valid, wherein the step of receiving access to the content repository is preconditioned on bringing the mobile device into compliance with an encryption policy, wherein bringing the mobile device into compliance can include enabling encryption based on a configuration profile from the management service, and wherein the compliance is checked at the time of receiving the access request. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable medium comprising instructions which, when executed by a processor, perform a method for authorizing access to a cloud-based content repository, comprising:
-
receiving, based on a determination that a mobile device complies with one or more compliance policies provided by a management service, a management identifier; transmitting an access request including the management identifier to the content repository; and receiving access to the content repository based on a determination that the management identifier is valid, wherein the step of receiving access to the content repository is preconditioned on bringing the mobile device into compliance with an encryption policy, wherein bringing the mobile device into compliance can include enabling encryption based on a configuration profile from the management service, and wherein the compliance is checked at the time of receiving the access request. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A system for authorizing access to a cloud-based content repository, comprising:
-
a mobile device; a content repository; and a management server, wherein; the mobile device provides a request to access the cloud-based content repository, the request including a management identifier; the management server receives the management identifier from the cloud-based content repository; the management server determines whether the management identifier is valid and, if so, returns a message to the cloud-based content repository; and the mobile device receives access to the cloud-based content repository, wherein the step of receiving access to the content repository is preconditioned on bringing the mobile device into compliance with an encryption policy, wherein bringing the mobile device into compliance can include enabling encryption based on a configuration profile from the management service, and wherein the compliance is checked at the time of receiving the access request. - View Dependent Claims (15, 16, 17, 18)
-
Specification