×

Credential-free user login to remotely executed applications

  • US 10,594,678 B2
  • Filed: 06/20/2018
  • Issued: 03/17/2020
  • Est. Priority Date: 06/02/2015
  • Status: Active Grant
First Claim
Patent Images

1. A tangible, non-transitory, machine-readable medium storing instructions that when executed by one or more processors effectuate operations comprising:

  • receiving, with one or more processors executing a permission-management application, a first request to manage permissions of one or more users to access resources with client computing devices, wherein;

    the permission-management application is configured to manage permissions for users of an organization to access a plurality of network-accessible applications;

    the plurality of different network-accessible applications have different permission-management application program interfaces; and

    the permission-management application is configured to manage permissions for users to access respective instances of a plurality of different native applications executing on the client computing devices;

    determining, with the permission-management application, that the first request specifies a first user is to be de-permissioned for a first native application among the plurality of different native applications and, in response, sending via a network, with the permission-management application, instructions to a first client computing device to revoke the first user'"'"'s authority to access the first native application;

    receiving, with the permission-management application, a second request to manage permissions of one or more users to access resources with client computing devices; and

    determining, with the permission-management application, that the second request specifies a second user is to be de-permissioned for a first network-accessible application among the plurality of network-accessible applications and, in response, sending via a network, with the permission-management application, instructions to an intermediary server to revoke the second user'"'"'s authority to access the first network-accessible application,wherein the intermediary server is configured to automate control of login information for the first network-accessible application for the users of the organization.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×