SINGLE SIGN-ON FOR UNMANAGED MOBILE DEVICES
First Claim
1. A non-transitory computer-readable medium embodying a program executable in at least one computing device, the program, when executed by the at least one computing device, being configured to cause the at least one computing device to at least:
- receive an access request from a client application executed in a client device;
cause the client application, using a redirection response that redirects the access request to an identity provider, to request an identity assertion from an authentication application executed in the client device;
receive the identity assertion from the client application;
verify the identity assertion; and
authenticate the client application.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are various examples for providing a single sign-on experience for mobile devices that may or may not be managed. A service provider receives an access request from a first client application executed in a client device. The service provider causes the first client application, using a redirection response that redirects the access request to an identity provider, to request an authentication token from a second client application executed in the client device. The service provider receives the authentication token from the first client application. The service provider then authenticates the first client application in response to verifying the authentication token.
65 Citations
20 Claims
-
1. A non-transitory computer-readable medium embodying a program executable in at least one computing device, the program, when executed by the at least one computing device, being configured to cause the at least one computing device to at least:
-
receive an access request from a client application executed in a client device; cause the client application, using a redirection response that redirects the access request to an identity provider, to request an identity assertion from an authentication application executed in the client device; receive the identity assertion from the client application; verify the identity assertion; and authenticate the client application. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system, comprising:
-
at least one computing device; and a service provider executable by the at least one computing device, the service provider configured to cause the at least one computing device to at least; receive an access request from a first client application executed in a client device; cause the first client application, using a redirection response that redirects the access request to an identity provider, to request an authentication token from a second client application executed in the client device; receive the authentication token from the first client application; and authenticate the first client application in response to verifying the authentication token. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method, comprising:
-
receiving an access request from a first client application executed in a client device; redirecting the first client application to request an authentication token from a second client application executed in the client device; receiving the authentication token from the first client application; verifying the authentication token; and authenticating the first client application. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification