METHOD AND SYSTEM FOR CONTROLLING A TERMINAL ACCESS AND TERMINAL FOR CONTROLLING AN ACCESS
First Claim
1. A method for controlling terminal access, comprising:
- receiving a policy configuration sent by a server on a network side, the policy configuration being generated by the server on the network side according to an authorization range of a terminal identity after a terminal is authenticated;
modifying a local setting according to the policy configuration; and
controlling an access authority of the terminal according to the modified local setting.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and a system for controlling terminal access, and a terminal for controlling access are provided. The method includes: receiving a policy configuration sent by a server on a network side; modifying local setting according to the policy configuration; and controlling an access authority of the terminal according to the modified local setting. Thus, when terminal access control is needed for a terminal connected to the network, the policy configuration can be delivered to the agent of the terminal, so that the agent controls an access authority of the terminal according to the policy configuration. Thereby, the convenient and flexible separation of the pre-authentication domain and the post-authentication domain is realized for different terminals, so as to meet the requirements for access control of multiple terminals.
21 Citations
12 Claims
-
1. A method for controlling terminal access, comprising:
-
receiving a policy configuration sent by a server on a network side, the policy configuration being generated by the server on the network side according to an authorization range of a terminal identity after a terminal is authenticated; modifying a local setting according to the policy configuration; and controlling an access authority of the terminal according to the modified local setting. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for controlling terminal access, comprising:
-
a terminal adapted to receive a policy configuration sent by a server on a network side and modify a local setting according to the received policy configuration to control an access authority of the terminal; and a server adapted to authenticate the terminal, generate the policy configuration according to an authorization range of a terminal identity and send the policy configuration to the terminal. - View Dependent Claims (8, 9, 10)
-
-
11. A terminal for controlling access, comprising:
-
a receiving unit adapted to receive a policy configuration sent by a server, the policy configuration being generated by a server on a network side according to an authorization range of a terminal identity after the terminal is authenticated; a configuring unit adapted to modify a local setting according to the policy configuration received by the receiving unit; and a controlling unit adapted to control an access authority of the terminal according to the local setting modified by the configuring unit. - View Dependent Claims (12)
-
Specification