Automated authentication of software applications using a limited-use token
First Claim
1. A method comprising:
- intercepting a first request for a resource stored on a server, wherein the first request originates from a first software application executing on a client device, wherein the first software application comprises a web browser, wherein the web browser is authenticated with an intermediate device by actual authentication credentials associated with a user;
issuing a temporary token from the intermediate device to the client device when the requested resource will result in the first software application launching a second software application external to the web browser on the client device, wherein the intermediate device is located between the client device and the server, and wherein the temporary token is valid for a limited time and for a limited number of uses and is based in part on the actual authentication credentials;
receiving a second request from the second software application to access the resource, wherein the second request includes the temporary token, and wherein the second request identifies a type of the second software application;
in response to determining, by the intermediate device, that the temporary token is valid based in part on the actual authentication credentials associated with the user, forwarding the second request to the server;
intercepting, by the intermediate device, a response from the server based in part on the second request;
injecting the actual authentication credentials into the response as an application-specific cookie, wherein the application-specific cookie is specific to the second software application and based in part on the type of the second software application; and
forwarding the response including the application-specific cookie to the client device to replace the temporary token.
12 Assignments
0 Petitions
Accused Products
Abstract
In general, the invention is directed to techniques of automated authentication of network-enabled software applications launched by a web browser. For example, an intermediate device, such as a Virtual Private Network (VPN) gateway, intercepts communications between a client device and a server. The gateway device automatically issues a temporary token to the client device when the web browser requests a resource that will result in the launch of an additional software application external to the web browser. This temporary token is only valid for a limited time and a limited number of uses. Subsequently, the gateway device uses the temporary token to authenticate the second software application, thereby avoiding passing user credentials from the web browser to the second application on the client device via an insecure persistent cookie.
270 Citations
18 Claims
-
1. A method comprising:
-
intercepting a first request for a resource stored on a server, wherein the first request originates from a first software application executing on a client device, wherein the first software application comprises a web browser, wherein the web browser is authenticated with an intermediate device by actual authentication credentials associated with a user; issuing a temporary token from the intermediate device to the client device when the requested resource will result in the first software application launching a second software application external to the web browser on the client device, wherein the intermediate device is located between the client device and the server, and wherein the temporary token is valid for a limited time and for a limited number of uses and is based in part on the actual authentication credentials; receiving a second request from the second software application to access the resource, wherein the second request includes the temporary token, and wherein the second request identifies a type of the second software application; in response to determining, by the intermediate device, that the temporary token is valid based in part on the actual authentication credentials associated with the user, forwarding the second request to the server; intercepting, by the intermediate device, a response from the server based in part on the second request; injecting the actual authentication credentials into the response as an application-specific cookie, wherein the application-specific cookie is specific to the second software application and based in part on the type of the second software application; and forwarding the response including the application-specific cookie to the client device to replace the temporary token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A network device comprising a control unit having one or more processors:
-
a network interface to intercept a first request for a resource, wherein the first request originates from a first software application executing on a client device, wherein the first software application comprises a web browser, and wherein the web browser is authenticated by the network device using actual authentication credentials associated with a user; a token creation module operable by the control unit to create a temporary token when the resource is associated with a second software application that will result in the first software application launching the second software application external to the web browser, wherein the temporary token is valid for a limited time and a limited number of uses and is based in part on the actual authentication credentials; wherein the network interface receives a second request from the second software application to access the resource, wherein the second request includes the temporary token, and wherein the second request identifies a type of the second software application; a secure socket layer (SSL) virtual private network (VPN) manager operable by the control unit to, in response to determining that the temporary token is valid based in part on the actual authentication credentials associated with the user, forward the second request to a server; wherein the SSL VPN manager intercepts a response from the server based in part on the second request and injects the actual authentication credentials into the response as an application-specific cookie, wherein the application-specific cookie is specific to the second software application and based in part on the type of the second software application; and wherein the network interface forwards the response including the application-specific cookie to the client device to replace the temporary token. - View Dependent Claims (13, 14, 15)
-
-
16. A system comprising:
-
a client device on which a first software application and a second software application execute, the first software application issuing a first request for a resource, wherein the first software application comprises a web browser; a resource server for providing the client device with access to the resource; and an intermediate device located between the client device and the resource server, wherein the intermediate device intercepts the first request and issues a temporary token to the client device when the requested resource is associated with the second software application that will result in the first software application launching the second software application external to the web browser, and wherein the web browser is authenticated with the intermediate device by actual authentication credentials associated with a user, wherein the temporary token is valid for a limited time and for a limited number of uses and is based in part on the actual authentication credentials, receives a second request from the second software application to access the resource, wherein the second request includes the temporary token, wherein the second request identifies a type of the second software application, in response to determining that the temporary token is valid based in part on the actual authentication credentials associated with the user, forwards the second request to the resource server, intercepts a response from the resource server based in part on the second request and injecting the actual authentication credentials into the response as an application-specific cookie, wherein the application-specific cookie is specific to the second software application and based in part on the type of the second software application, and forwards the response including the application-specific cookie to the client device to replace the temporary token. - View Dependent Claims (17)
-
-
18. A non-transitory computer-readable medium comprising instructions for causing a programmable processor of an intermediate network device to:
-
Intercept, with an intermediate network device located between a client device and a server, a first request from a first software application executing on the client device, wherein the first software application comprises a web browser, wherein the web browser is authenticated by the intermediate network device using actual authentication credentials associated with a user; issue a temporary token to the client device when the first request identifies a resource associated with a second software application that will result in the first software application launching a second software application external to the web browser, wherein the temporary token is valid for a limited time and for a limited number of uses and is based in part on the actual authentication credentials; receives a second request from the second software application to access the resource, wherein the second request includes the temporary token, wherein the second request identifies a type of the second software application; in response to determining that the temporary token is valid based in part on the actual authentication credentials associated with the user, forwarding the second request to the server; intercept a response from the server based in part on the second request and injecting the actual authentication credentials into the response as an application-specific cookie, wherein the application-specific cookie is specific to the second software application and based in part on the type of the second software application; and forward the response including the application-specific cookie to the client device to replace the temporary token.
-
Specification