SECURITY ENHANCEMENT THROUGH APPLICATION ACCESS CONTROL
First Claim
1. A method for enhancing security by application access control in a collaboration environment, the method, comprising:
- providing, via the collaboration environment, applications for use by a user in the collaboration environment;
wherein, the applications are selectable by a user for integration, through the collaboration environment, for use in interaction and engagement with other users in the collaboration environment in collaboration sessions;
wherein, the applications that are visible or available for use by the user are configurable by another user with appropriate permissions.
4 Assignments
0 Petitions
Accused Products
Abstract
Security enhancement through application access control for cloud-based services and/or storage accounts is disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system, for providing, via the collaboration environment, applications for use by a user in the collaboration environment. The applications are selectable by a user, through the collaboration environment, for use in interaction and engagement with other users in the collaboration environment in collaboration sessions. The applications that are visible or available for use by the user is configurable by another user (e.g., administrator or IT specialist) with appropriate permissions, though a designated console.
51 Citations
35 Claims
-
1. A method for enhancing security by application access control in a collaboration environment, the method, comprising:
-
providing, via the collaboration environment, applications for use by a user in the collaboration environment; wherein, the applications are selectable by a user for integration, through the collaboration environment, for use in interaction and engagement with other users in the collaboration environment in collaboration sessions; wherein, the applications that are visible or available for use by the user are configurable by another user with appropriate permissions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 16, 17, 18, 19, 20, 21, 22)
-
-
15. A system for enhancing security by application access control in a cloud-based environment, the system, comprising:
-
means for, providing a list of applications available for use by a first user in the cloud-based environment; wherein, applications that are in the list of applications for the first user are selectable by a second user through a console in a user interface to the collaboration environment; means for, enforcing mobile security settings when the cloud-based environment is accessed by the first user using a mobile device.
-
-
23. A method for enhancing security of corporate content by enabling configuration of access and use of native applications and third party applications in a cloud environment, the method, comprising:
-
receiving, an identification of the third party applications allowable for use to access the corporate content; wherein, the third party applications are selected through a console in the cloud environment; presenting, a list of the third party applications to users selectable for use by the users in accessing the corporate content or interacting with other users in the cloud environment; wherein, the list of the third party application that are selectable is specific to the users associated with or belonging to an enterprise to which the corporate content relates. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
Specification