Role-Based Access to Shared Resources
First Claim
1. A method comprising:
- receiving, at an intermediate network connected device from an edge network device, information identifying a user as having accessed a first network device from an external network connected device, wherein the intermediate network connected device is arranged between the first network device and a second network device, wherein the intermediate network connected device, the first network device and the second network device are within a network and wherein the external network connected device is outside the network;
receiving at the intermediate network connected device a request from the first network device to access the second network device;
determining the user is a source of the request via the first network device based upon the received information; and
evaluating the request from the first network device based upon determining the user to be the source of the request.
1 Assignment
0 Petitions
Accused Products
Abstract
Information identifying a user as having accessed a first network device from an external network connected device is received at an intermediate network connected device from an edge network device. The intermediate network connected device is arranged between the first network device and a second network device. The intermediate network connected device, the first network device and the second network device are within the network and the external network connected device is outside the network. A request to access the second network device is received at the intermediate network connected device from the first network device. It is determined that the user is a source of the request via the first network device based upon the received information. The request from the first network device is evaluated based upon determining the user is the source of the request.
14 Citations
20 Claims
-
1. A method comprising:
-
receiving, at an intermediate network connected device from an edge network device, information identifying a user as having accessed a first network device from an external network connected device, wherein the intermediate network connected device is arranged between the first network device and a second network device, wherein the intermediate network connected device, the first network device and the second network device are within a network and wherein the external network connected device is outside the network; receiving at the intermediate network connected device a request from the first network device to access the second network device; determining the user is a source of the request via the first network device based upon the received information; and evaluating the request from the first network device based upon determining the user to be the source of the request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An apparatus comprising:
-
a network interface unit configured to enable communication over a network; and a processor coupled to the network interface unit, wherein the processor is configured to; receive, via the network interface unit, information identifying a user as having accessed a first network device from an external network connected device, wherein the apparatus is arranged between the first network device and a second network device, wherein the apparatus, the first network device and the second network device are within the network and wherein the external network connected device is outside the network; receive, via the network interface unit, a request from the first network device to access the second network device; determine the user is a source of the request via the first network device based upon the received information; and evaluate the request from the first network device based upon determining user is the source of the request. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A non-transitory computer readable storage media encoded with instructions, wherein the instructions, when executed by a processor, cause the processor to:
-
receive information identifying a user as having accessed a first network device from an external network connected device, wherein the processor is included in an apparatus that is arranged between the first network device and a second network device, wherein the apparatus, the first network device and the second network device are within a network and wherein the external network connected device is outside the network; receive a request from the first network device to access the second network device; determine the user is a source of the request via the first network device based upon the received information; and evaluate the request from the first network device based upon determining the user is the source of the request. - View Dependent Claims (18, 19, 20)
-
Specification