Management of authentication discovery policy in a computer network
First Claim
1. A method of managing authentication information at a client running a native operating system, the client connectable to one or more servers in a computer network, comprising the steps of:
- at the client, issuing a set of calls to servers in the computer network to identify potential authentication locations;
in response to information gathered in response to the calls, generating a list identifying native server domains and non-native server domains against which a user of the client may authenticate;
displaying the list to an administrator; and
having the administrator take a given action to process the list to create an authentication policy.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of discovering native or non-native authentication server domains and managing information about such domains in a computer network. The various domains are “discovered” by issuing requests from the client to one or more of the servers in the network. Each response is then characterized as being from a native or non-native server, and a list of each such server type is then compiled at the client. The administrator may modify the list, for example, by adding or removing server domains, or may apply a discovery “policy” to tailor the way in which a user may access and interact with the discovered information.
90 Citations
22 Claims
-
1. A method of managing authentication information at a client running a native operating system, the client connectable to one or more servers in a computer network, comprising the steps of:
-
at the client, issuing a set of calls to servers in the computer network to identify potential authentication locations;
in response to information gathered in response to the calls, generating a list identifying native server domains and non-native server domains against which a user of the client may authenticate;
displaying the list to an administrator; and
having the administrator take a given action to process the list to create an authentication policy. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of managing authentication information at a client running a native operating system, the client connectable to one or more servers in a computer network, comprising the steps of:
-
at the client, issuing a set of calls to servers in the computer network to identify potential authentication locations;
in response to information gathered in response to the calls, generating a list identifying native server domains and non-native server domains against which a user of the client may authenticate;
applying a set of one or more policies to customize the list prior to presenting the list to a user seeking authentication. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method of managing authentication information at a client running a native operating system, the client connectable to one or more servers in a computer network, comprising the steps of:
-
at the client, issuing a set of calls to servers in the computer network to identify potential authentication locations;
in response to information gathered in response to the calls, generating a list identifying native server domains and non-native server domains against which a user of the client may authenticate;
augmenting the list of server domains to define a set of server domains for display to a user seeking authentication during a logon process; and
applying a set of one or more management policies that define how the user may interact with the list of server domains. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A computer program product in a computer-readable medium for enabling an administrator to manage authentication policy at a client running a native operating system, the client connectable to one or more servers in a computer network, the computer program product comprising:
-
means for issuing a set of calls to servers in the computer network to identify potential authentication locations;
means responsive to information gathered in response to the calls for generating a list identifying native server domains and non-native server domains against which a user of the client may authenticate;
means for modifying how the list is presented to a user seeking authentication; and
means for controlling how the user seeking to be authenticated interacts with the list. - View Dependent Claims (20, 21)
means for presenting the list of server domains discovered;
means responsive to the presenting means for allowing the administrator to select which domains are to be presented to the user seeking authentication; and
means for entering a name of an additional server domain that is to be presented to the user seeking authentication.
-
-
21. The computer program product as described in claim 19 wherein the controlling means comprises:
-
means for enabling the administrator to select whether the user is restricted to selecting one of the locations discovered and presented in the list of server domains; and
means for enabling the administrator to select whether the user is able to initiate a new discovery request from a logon panel.
-
-
22. A computer connectable to a computer network, comprising:
-
a processor;
a native operating system;
an authentication mechanism, comprising;
means for issuing a set of calls to servers in the computer network to identify potential authentication locations;
means responsive to information gathered in response to the calls for generating a list identifying native server domains and non-native server domains against which a user of the client may authenticate; and
means for managing the information in the list to establish an authentication policy.
-
Specification