Techniques for environment single sign on
First Claim
Patent Images
1. A method implemented and residing in a non-transitory computer-readable storage medium that is executed by a processor to perform the method, comprising:
- receiving, at the processor, a request from a principal on a first device to access a first protected resource;
authenticating, by the processor, the principal for access to the first protected resource;
establishing, by the processor, a first authentication session for the first device and a second authenticated session for a second device accessible to the principal, the first and second device comprising an environment with one another; and
permitting, by the processor, the principal to access the first protected resource and one or more second protected resources, access is permitted from the first device and from the second device without re-authenticating, the first device acting as a forward proxy for the principal to access the second device and the first device and the second device packaged together as a set of virtual machines that form the environment.
16 Assignments
0 Petitions
Accused Products
Abstract
Techniques for environment single sign on are provided. Multiple identifiers for devices are associated as a single environment. A principal can be authenticated via any of the devices once to access protected resources and once authenticated the principal can access the protected resources from the other devices without re-authenticating.
-
Citations
20 Claims
-
1. A method implemented and residing in a non-transitory computer-readable storage medium that is executed by a processor to perform the method, comprising:
-
receiving, at the processor, a request from a principal on a first device to access a first protected resource; authenticating, by the processor, the principal for access to the first protected resource; establishing, by the processor, a first authentication session for the first device and a second authenticated session for a second device accessible to the principal, the first and second device comprising an environment with one another; and permitting, by the processor, the principal to access the first protected resource and one or more second protected resources, access is permitted from the first device and from the second device without re-authenticating, the first device acting as a forward proxy for the principal to access the second device and the first device and the second device packaged together as a set of virtual machines that form the environment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method implemented and residing in a non-transitory computer-readable storage medium that is executed by a processor to perform the method, comprising:
-
receiving, at the processor, a first identifier and a second identifier, the first identifier identifies a first device and the second identifier identifies a second device; associating, by the processor, the first identifier and the second identifier as a processing environment, the first device acting as a forward proxy and the first device and the second device packaged together as a set of virtual machines that form the processing environment; and allowing, by the processor, single sign-on authentication via the first device and the second device without re-authentication in response to the processing environment, the single sign-on authentication provides access to protected resources from both the first and second devices of the processing environment. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A multiprocessor-implemented system, comprising:
-
a proxy device; and a proxy service implemented and residing in a non-transitory computer-readable medium and to execute on the proxy device; wherein the proxy service is configured to manage multiple devices as a single environment and to permit authentication to multiple resources of the single environment to occur once without regard to which of the multiple devices initial authentication occurs from, the proxy device is a forward proxy and the proxy device and the multiple devices are packaged together as a set of virtual machines that form the single environment. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification