TECHNIQUES FOR ENVIRONMENT SINGLE SIGN ON
First Claim
Patent Images
1. A method implemented in a computer-readable storage medium that is executed by a processor to perform the method, comprising:
- receiving a request from a principal on a first device to access a first protected resource;
authenticating the principal for access to the first protected resource;
establishing a first authentication session for the first device and a second authenticated session for a second device accessible to the principal, the first and second device comprising an environment with one another; and
permitting the principal to access the first protected resource and one or more second protected resources, access is permitted from the first device and from the second device without re-authenticating.
16 Assignments
0 Petitions
Accused Products
Abstract
Techniques for environment single sign on are provided. Multiple identifiers for devices are associated as a single environment. A principal can be authenticated via any of the devices once to access protected resources and once authenticated the principal can access the protected resources from the other devices without re-authenticating.
-
Citations
20 Claims
-
1. A method implemented in a computer-readable storage medium that is executed by a processor to perform the method, comprising:
-
receiving a request from a principal on a first device to access a first protected resource; authenticating the principal for access to the first protected resource; establishing a first authentication session for the first device and a second authenticated session for a second device accessible to the principal, the first and second device comprising an environment with one another; and permitting the principal to access the first protected resource and one or more second protected resources, access is permitted from the first device and from the second device without re-authenticating. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method implemented in a computer-readable storage medium that is executed by a processor to perform the method, comprising:
-
receiving a first identifier and a second identifier, the first identifier identifies a first device and the second identifier identifies a second device; associating the first identifier and the second identifier as a processing environment; and allowing single sign-on authentication via the first device and the second device without re-authentication in response to the processing environment, the single sign-on authentication provides access to protected resources from both the first and second devices of the processing environment. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A multiprocessor-implemented system, comprising:
-
a proxy device; and a proxy service implemented in a computer-readable medium and to execute on the proxy device; wherein the proxy service is configured to manage multiple devices as a single environment and to permit authentication to multiple resources of the single environment to occur once without regard to which of the multiple devices initial authentication occurs from. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification