USER AUTHENTICATION IN A CLOUD ENVIRONMENT
First Claim
1. A client computer system comprising the following:
- one or more processors;
system memory;
one or more computer-readable storage media having stored thereon computer-executable instructions that, when executed by the one or more processors, causes the computing system to perform a method for authenticating a user to a remote application provisioning service, the method comprising the following;
an act of receiving one or more authentication credentials from a user at the client computing system to authenticate the user to a remote application provisioning service that provides virtual machine-hosted remote applications;
an act of sending the received authentication credentials to an authentication service, the authentication service being configured to generate an encrypted token based on the received authentication credentials;
an act of receiving the generated encrypted token from the authentication service;
an act of storing the received encrypted token and the received authentication credentials in a data store; and
an act of sending the encrypted token to the remote application provisioning service, the encrypted token indicating to the remote application provisioning service that the user is a valid user.
3 Assignments
0 Petitions
Accused Products
Abstract
Embodiments are directed to authenticating a user to a remote application provisioning service. In one scenario, a client computer system receives authentication credentials from a user at to authenticate the user to a remote application provisioning service that provides virtual machine-hosted remote applications. The client computer system sends the received authentication credentials to an authentication service, which is configured to generate an encrypted token based on the received authentication credentials. The client computer system then receives the generated encrypted token from the authentication service, stores the received encrypted token and the received authentication credentials in a data store, and sends the encrypted token to the remote application provisioning service. The encrypted token indicates to the remote application provisioning service that the user is a valid user.
-
Citations
20 Claims
-
1. A client computer system comprising the following:
-
one or more processors; system memory; one or more computer-readable storage media having stored thereon computer-executable instructions that, when executed by the one or more processors, causes the computing system to perform a method for authenticating a user to a remote application provisioning service, the method comprising the following; an act of receiving one or more authentication credentials from a user at the client computing system to authenticate the user to a remote application provisioning service that provides virtual machine-hosted remote applications; an act of sending the received authentication credentials to an authentication service, the authentication service being configured to generate an encrypted token based on the received authentication credentials; an act of receiving the generated encrypted token from the authentication service; an act of storing the received encrypted token and the received authentication credentials in a data store; and an act of sending the encrypted token to the remote application provisioning service, the encrypted token indicating to the remote application provisioning service that the user is a valid user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer system comprising the following:
-
one or more processors; system memory; one or more computer-readable storage media having stored thereon computer-executable instructions that, when executed by the one or more processors, causes the computing system to perform a method for authenticating a user at a remote application provisioning service, the method comprising the following; an act of receiving, at a remote application provisioning service, an encrypted token from a client computer system, the encrypted token being generated based on authentication credentials provided by a user; an act of the remote application provisioning service decrypting the received encrypted token; an act of determining the user'"'"'s identity from the decrypted token; an act of determining, based on the user'"'"'s identity, which remote applications the user is authorized to access; and an act of providing to the user an indication of those remote applications that are available for use. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A computer system comprising the following:
-
one or more processors; system memory; one or more computer-readable storage media having stored thereon computer-executable instructions that, when executed by the one or more processors, causes the computing system to perform a method for authenticating a user to a remote application provisioning service, the method comprising the following; an act of receiving, at a remote application provisioning service, an indication from a user indicating that a specified remote application is to be instantiated, the indication including an encrypted token that was generated based on authentication credentials received from the user; an act of decrypting the received encrypted token to determine the user'"'"'s identity; an act of verifying that the user has permission to access the specified remote application; and an act of the remote application provisioning service sending the encrypted token to a remote application virtual machine host that provides access to the specified remote application using the encrypted token and the user'"'"'s authentication credentials. - View Dependent Claims (19, 20)
-
Specification