SECURE CONFIGURATION OF AUTHENTICATION SERVERS
First Claim
Patent Images
1. A method for configuring an authentication server comprising:
- assigning a plurality of secrets to a plurality of nodes of a network, so that each respective secret is assigned to a respective node;
generating a data structure comprising the assigned secrets;
securing the data structure; and
sending the data structure to an authentication server.
7 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the invention are directed to automatically populating a database of names and secrets in an authentication server by sending one or more lists of one or more names and secrets by a network management software to an authentication server. Furthermore, some embodiments provide that the lists being sent are encrypted and/or embedded in otherwise inconspicuous files.
57 Citations
25 Claims
-
1. A method for configuring an authentication server comprising:
-
assigning a plurality of secrets to a plurality of nodes of a network, so that each respective secret is assigned to a respective node; generating a data structure comprising the assigned secrets; securing the data structure; and sending the data structure to an authentication server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer readable medium comprising computer executable instructions configured to cause a processor to perform a method for configuring an authentication server, the method comprising:
-
assigning a plurality of secrets to a plurality of nodes of a network, so that each respective secret is assigned to a respective node; generating a data structure comprising the assigned secrets; securing the data structure; and sending the data structure to an authentication server. - View Dependent Claims (13, 14, 15)
-
-
16. A device comprising a processor and a memory, the memory comprising a plurality of instructions executable at the processor and configured to cause the processor to:
-
assign a plurality of secrets to a plurality of nodes of a network, so that each respective secret is assigned to a respective node; generate a data structure comprising the assigned secrets; secure the data structure; and send the data structure to an authentication server.
-
- 17. The device of claim 17, wherein the instructions are further configured to cause the processor to generate or otherwise establish the plurality of secrets.
-
24. A network comprising:
-
a plurality of nodes; a computer executing an authentication management application; and an authentication server, wherein the computer executing the authentication management application is configured to assign a plurality of secrets to a plurality of nodes of a network, so that each respective secret is assigned to a respective node, generate a data structure comprising the assigned secrets, secure the data structure, and send the data structure to an authentication server; and the authentication server is configured to obtain the assigned secrets from the data structure, and use the assigned secrets to perform authentication for the plurality of nodes.
-
-
25. The network of claim 25, wherein the network is selected from the group consisting of a Fibre Channel network and an iSCSI network.
Specification