PRIVILEGED ACCOUNT PLUG-IN FRAMEWORK - STEP-UP VALIDATION
First Claim
1. A system, comprising:
- a memory storing computer-executable instructions;
a privileged access management module that provides a privileged access management service configured with a plug-in framework for accessing secure resources; and
a processor configured to access the memory and execute the computer-executable instructions to at least;
receive, from an entity associated with the secure resources, plug-in code for implementing a workflow that includes at least a step-up validation associated with a user attempting to access at least one secure resource of the secure resources;
generate instructions for implementing the workflow based at least in part on the received plug-in code;
receive, from the user, a log-in request including at least first authentication information, the log-in request corresponding to the privileged access management service;
provide access to the at least one secure resource when the user is authenticated with respect to the privileged access management service;
receive, from a computing device of the user, a request to access a second secure resource of the secure resources; and
implement the workflow to perform the step-up validation at least in response to the request to access the second secure resource, the workflow implemented based at least in part on an attribute associated with the request.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for managing privileged accounts via a privileged access management service are provided. In some examples, the service may be configured with a plug-in framework for accessing secure resources. In some aspects, plug-in code for implementing a workflow that includes step-up validation associated with a user attempting to access at least one secure resource may be received. Access to the at least one secure resource may be provided when the user is authenticated with respect to the service. In some examples, a request to access a second secure resource may be received. Additionally, in some examples, the workflow to perform the step-up validation may be implemented at least in response to the request to access the second secure resource. The workflow implemented based at least in part on an attribute associated with the request.
41 Citations
20 Claims
-
1. A system, comprising:
-
a memory storing computer-executable instructions; a privileged access management module that provides a privileged access management service configured with a plug-in framework for accessing secure resources; and a processor configured to access the memory and execute the computer-executable instructions to at least; receive, from an entity associated with the secure resources, plug-in code for implementing a workflow that includes at least a step-up validation associated with a user attempting to access at least one secure resource of the secure resources; generate instructions for implementing the workflow based at least in part on the received plug-in code; receive, from the user, a log-in request including at least first authentication information, the log-in request corresponding to the privileged access management service; provide access to the at least one secure resource when the user is authenticated with respect to the privileged access management service; receive, from a computing device of the user, a request to access a second secure resource of the secure resources; and implement the workflow to perform the step-up validation at least in response to the request to access the second secure resource, the workflow implemented based at least in part on an attribute associated with the request. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer-readable storage memory storing a plurality of instructions executable by one or more processors, the plurality of instructions comprising:
-
instructions that cause the one or more processors to manage a privileged access management service configured with a plug-in framework for accessing secure resources; instructions that cause the one or more processors to receive, from an entity associated with the secure resources, plug-in code for implementing a workflow that includes at least a step-up validation associated with a user attempting to access at least one secure resource of the secure resources; instructions that cause the one or more processors to provide access to the at least one secure resource when the user is authenticated with respect to the privileged access management service; instructions that cause the one or more processors to receive, from a computing device of the user, a request to access a second secure resource of the secure resources; and instructions that cause the one or more processors to implement the workflow to perform the step-up validation at least in response to the request to access the second secure resource, the workflow implemented based at least in part on an attribute associated with the request. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A computer-implemented method, comprising:
-
managing, by a computer system, a privileged access management service configured with a plug-in framework for accessing secure resources; receiving, from an entity associated with the secure resources, plug-in code for implementing a workflow that includes at least a step-up validation associated with a user attempting to access at least one secure resource of the secure resources; providing access to the at least one secure resource when the user is authenticated with respect to the privileged access management service; receiving, from a computing device of the user, a request to access a second secure resource of the secure resources; and implementing, by the computer system, the workflow to perform the step-up validation at least in response to the request to access the second secure resource, the workflow implemented based at least in part on an attribute associated with the request. - View Dependent Claims (17, 18, 19, 20)
-
-
15. The computer-implemented method of 14, further comprising receiving, from the user, a log-in request including at least first authentication information, the log-in request corresponding to the privileged access management service.
-
16. The computer-implemented method of 15, wherein the plug-in framework enables the entity associated with the secure resources to update a policy associated with accessing the secure resources while the user is logged into the privileged access management service.
Specification