×

Techniques for environment single sign on

  • US 8,281,381 B2
  • Filed: 08/03/2009
  • Issued: 10/02/2012
  • Est. Priority Date: 08/03/2009
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method implemented and residing in a non-transitory computer-readable storage medium that is executed by a processor to perform the method, comprising:

  • receiving, at the processor, a request from a principal on a first device to access a first protected resource;

    authenticating, by the processor, the principal for access to the first protected resource;

    establishing, by the processor, a first authentication session for the first device and a second authenticated session for a second device accessible to the principal, the first and second device comprising an environment with one another; and

    permitting, by the processor, the principal to access the first protected resource and one or more second protected resources, access is permitted from the first device and from the second device without re-authenticating, the first device acting as a forward proxy for the principal to access the second device and the first device and the second device packaged together as a set of virtual machines that form the environment.

View all claims
  • 16 Assignments
Timeline View
Assignment View
    ×
    ×