System and method for managing a proxy request over a secure network using inherited security attributes
First Claim
1. A network device for managing a communication over a network, comprising:
- a transceiver arranged to send and to receive the communication over the network;
a processor, coupled to the transceiver, that is configured to perform actions, including;
receiving a proxy request from a client through a secure tunnel;
modifying the proxy request to include a security attribute; and
forwarding the modified proxy request to a proxy service, wherein the security attribute enables a proxy connection through the secure tunnel.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, devices, and systems are directed to managing a proxy request over a secure network using inherited security attributes. Proxy traffic, such as HTTP proxy traffic, is tunneled through a secure tunnel such that the proxy request inherits security attributes of the secure tunnel. The secure attributes may be employed to enable proxy access to a server, thereby extending a security property of the secure tunnel to the proxy connection tunneled through it. A secure tunnel service receives a proxy request from a client and modifies the proxy request to include the security attribute. In one embodiment, the security attribute is an identifier that enables a proxy service may employ to determine another security attribute. The proxy service is enabled to employ the security attribute, and the security attribute to determine if the client is authorized access to the server.
-
Citations
28 Claims
-
1. A network device for managing a communication over a network, comprising:
-
a transceiver arranged to send and to receive the communication over the network;
a processor, coupled to the transceiver, that is configured to perform actions, including;
receiving a proxy request from a client through a secure tunnel;
modifying the proxy request to include a security attribute; and
forwarding the modified proxy request to a proxy service, wherein the security attribute enables a proxy connection through the secure tunnel. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An apparatus for managing a communication over a network, comprising:
-
a transceiver arranged to send and to receive the communication over the network;
a processor, coupled to the transceiver, that is configured to perform actions, including;
establishing a secure tunnel between the apparatus and a client;
receiving a proxy request from the client through the secure tunnel;
modifying the proxy request to include a security attribute; and
forwarding the modified proxy request to a proxy service, wherein the security attribute enables a proxy connection through the secure tunnel. - View Dependent Claims (8, 9)
-
-
10. A method for managing a communication over a network, comprising:
-
receiving a proxy request from a client through a secure tunnel;
modifying the proxy request to include a security attribute; and
forwarding the modified proxy request to a proxy service, wherein the security attribute enables a proxy connection through the secure tunnel. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for managing a communication over a network, comprising:
-
a client that is configured to perform actions, including;
determining a secure tunnel; and
sending a proxy request through the determined secure tunnel; and
a server, coupled to the client, that is configured to perform actions, including;
receiving the proxy request from the client through the secure tunnel;
modifying the proxy request to include a security attribute; and
forwarding the modified proxy request to a proxy service, wherein the security attribute enables a proxy connection through the secure tunnel. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. An apparatus for managing a communication over a network, comprising:
-
a transceiver arranged to send and to receive the communication over the network;
a processor, coupled to the transceiver, that is configured to receive a proxy request from a client through a secure tunnel;
a means for modifying the proxy request to include a security attribute; and
a means for forwarding the modified proxy request to a proxy service, wherein the security attribute enables a proxy connection through the secure tunnel. - View Dependent Claims (28)
-
Specification