WHITELIST CONSTRUCTION
First Claim
1. A method comprising:
- receiving, by a computing system executing an access manager application, a request to log out a user from an application executing on a device;
determining, by the access manager application, a redirection address for the application;
validating, by the access manager application, the redirection address; and
based on the validation, causing, by the access manager application, the application to perform one of redirecting the user to the redirection address and determining whether to add the redirection address to a list of valid redirection addresses.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques are provided for of constructing a whitelist of redirection uniform resource locators (URLs). A method can include receiving, by a computing system executing an access manager application, a request to log out a user from an application executing on a device; determining, by the access manager application, a redirection address for the application; validating, by the access manager application, the redirection address; and based on the validation, causing, by the access manager application, the application to perform one of redirecting the user to the redirection address and determining addition of the redirection address to a list of valid redirection addresses.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, by a computing system executing an access manager application, a request to log out a user from an application executing on a device; determining, by the access manager application, a redirection address for the application; validating, by the access manager application, the redirection address; and based on the validation, causing, by the access manager application, the application to perform one of redirecting the user to the redirection address and determining whether to add the redirection address to a list of valid redirection addresses. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A non-transitory computer-readable storage medium storing a plurality of instructions executable by one or more processors to cause the one or more processors to perform operations, comprising:
-
receiving, by a computing system executing an access manager application, a request to log out a user from an application executing on a device; determining, by the access manager application, a redirection address for the application; validating, by the access manager application, the redirection address; and based on the validation, causing, by the access manager application, the application to perform one of redirecting the user to the redirection address, and determining addition of the redirection address to a list of valid redirection addresses. - View Dependent Claims (15, 16, 17)
-
-
18. A system comprising:
-
a memory; and one or more processors coupled to the memory and configured to; receive, by a computing system executing an access manager application, a request to log out a user from an application executing on a device; determine, by the access manager application, a redirection address from the application; determine, by the access manager application, validity of the redirection address; and based on the validation, cause, by the access manager application, the application to perform one of redirecting the user to the redirection address, and determining addition of the redirection address to a list of valid redirection addresses. - View Dependent Claims (19, 20)
-
Specification