AUTHENTICATION SERVER ENHANCEMENTS
First Claim
1. An authentication-server method comprising:
- with at least one authentication server;
implementing a set of authentication server configuration rules, wherein the authentication server configuration rules utilize regular-expression based commands;
maintaining a running log of all commands entered by every user as each command is run by the at least one authentication server;
running a configuration diff command each time a session ends;
racking a set of actions of an authentication-server administrator on the authentication server;
storing the set of actions of the authentication-server administrator in a log, wherein the log comprises a username of the authentication-server administrator who generated the log, and a time source and a time zone associated of a location of the set of actions;
running a hash algorithm on the log;
generating an portable document format (PDF) formatted file of the log;
generating a list of all usernames from a set logs that failed a user-authentication process required to access the authentication server;
when a specified amount of failed authentication attempts from a single remote internet protocol (IP) address are detected, blocking all authentication attempts from IP address for a specified period of time;
adding an authorized IP address list as part of an access control list to a user record, wherein the access control list allows the user record'"'"'s username to access the authentication server from specified remote user hosts or subnets; and
providing a mobile device application that enables the authentication-server administrator, wherein the mobile device application enables the authentication-server administrator to monitor and access a proxy server with access to the authentication server, and wherein the authentication server and the mobile device application authenticate to the proxy server over a secured connection.
0 Assignments
0 Petitions
Accused Products
Abstract
A set of authentication server configuration rules are implemented. The authentication server configuration rules utilize regular-expression based commands. A running log of commands entered by every user is maintained for each command is run by the at least one authentication server. A configuration diff command is run each time a session ends. A set of actions of an authentication-server administrator on the authentication server is tracked. The set of actions of the authentication-server administrator is stored in a log. The log includes a username of the authentication-server administrator who generated the log and a time source and a time zone associated of a location of the set of actions. A hash algorithm is run on the log. A portable document format (PDF) formatted the of the log is generated. A list of usernames is generated from a set logs that filled a user-authentication process required to access the authentication server.
-
Citations
14 Claims
-
1. An authentication-server method comprising:
with at least one authentication server; implementing a set of authentication server configuration rules, wherein the authentication server configuration rules utilize regular-expression based commands; maintaining a running log of all commands entered by every user as each command is run by the at least one authentication server; running a configuration diff command each time a session ends; racking a set of actions of an authentication-server administrator on the authentication server; storing the set of actions of the authentication-server administrator in a log, wherein the log comprises a username of the authentication-server administrator who generated the log, and a time source and a time zone associated of a location of the set of actions; running a hash algorithm on the log; generating an portable document format (PDF) formatted file of the log; generating a list of all usernames from a set logs that failed a user-authentication process required to access the authentication server; when a specified amount of failed authentication attempts from a single remote internet protocol (IP) address are detected, blocking all authentication attempts from IP address for a specified period of time; adding an authorized IP address list as part of an access control list to a user record, wherein the access control list allows the user record'"'"'s username to access the authentication server from specified remote user hosts or subnets; and providing a mobile device application that enables the authentication-server administrator, wherein the mobile device application enables the authentication-server administrator to monitor and access a proxy server with access to the authentication server, and wherein the authentication server and the mobile device application authenticate to the proxy server over a secured connection. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A computerized system of an authentication processor comprising:
-
at least one processor operating in the authentication server is configured to execute instructions; a memory including instructions when executed on the at least one processor, causes the processor to perform; implement a set of authentication server configuration rules, wherein the authentication server configuration rules utilize regular-expression based commands; maintain a running log of all commands entered by every user as each command is run by the at least one authentication server; run a configuration diff command each time a session ends; track a set of actions of an authentication-server administrator on the authentication server; store the set of actions of the authentication-server administrator in a log, wherein the log comprises a username of the authentication-server administrator who generated the log and a time source and a time zone associated of a location of the set of actions; run a hash algorithm on the log; generate an portable document format (PDF) formatted file of the log; generate a list of all usernames from a set logs that failed a user-authentication process required to access the authentication server; when a specified amount of failed authentication attempts from a single remote internet protocol (IP) address are detected, block all authentication attempts from IP address for a specified period, of time; add an authorized IP address list as part of an access control list to a user record, wherein the access control list allows the user record'"'"'s username to access the authentication server from specified remote user hosts or subnets; and provide a mobile device application that enables the authentication-server administrator, wherein the mobile device application enables the authentication-server administrator to monitor and access a proxy server with access to the authentication server, and wherein the authentication server and the mobile device, application authenticate to the proxy server over a secured connection. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification