System and method to apply network traffic policy to an application session
First Claim
1. A method for applying a security policy to an application session, comprising:
- (a) recognizing the application session between a network and an application via a security gateway;
(b) determining by the security gateway a user identity of the application session using information about the application session, wherein the determining comprises;
(b1) determining the user identity from an application session record for the application session, wherein the application session record comprises the user identity used for accessing the network through a host, a host identity for the host, and an application session time, wherein a creating of the application session record comprises;
(b1i) querying an identity server by sending the host identity and the application session time in the application session record, wherein the identity server comprises an access session record for an access session between a second host and the network, wherein the access session record comprises a second user identity used for accessing the network through the second host, a second host identity for the second host, and an access session time;
(b1ii) comparing by the identity server the host identity in the application session record with the second host identity in the access session record, and comparing the access session time with the application session time;
(b1iii) returning by the identity server the second user identity in the access session record, if the host identity in the application session record matches the second host identity in the access session record, and if the access session time matches the application session time; and
(b1iv) storing the second user identity as a network user identity used for accessing the network in the application session record;
(c) obtaining by the security gateway the security policy comprising network parameters mapped to the user identity; and
(d) applying the security policy to the application session by the security gateway.
3 Assignments
0 Petitions
Accused Products
Abstract
Method for applying a security policy to an application session, includes: recognizing the application session between a network and an application via a security gateway; determining by the security gateway a user identity of the application session using information about the application session; obtaining by the security gateway the security policy comprising network parameters mapped to the user identity; and applying the security policy to the application session by the security gateway. The user identity may be a network user identity or an application user identity recognized from packets of the application session. The security policy may comprise a network traffic policy mapped and/or a document access policy mapped to the user identity, where the network traffic policy is applied to the application session. The security gateway may further generate a security report concerning the application of the security policy to the application session.
-
Citations
23 Claims
-
1. A method for applying a security policy to an application session, comprising:
-
(a) recognizing the application session between a network and an application via a security gateway; (b) determining by the security gateway a user identity of the application session using information about the application session, wherein the determining comprises; (b1) determining the user identity from an application session record for the application session, wherein the application session record comprises the user identity used for accessing the network through a host, a host identity for the host, and an application session time, wherein a creating of the application session record comprises; (b1i) querying an identity server by sending the host identity and the application session time in the application session record, wherein the identity server comprises an access session record for an access session between a second host and the network, wherein the access session record comprises a second user identity used for accessing the network through the second host, a second host identity for the second host, and an access session time; (b1ii) comparing by the identity server the host identity in the application session record with the second host identity in the access session record, and comparing the access session time with the application session time; (b1iii) returning by the identity server the second user identity in the access session record, if the host identity in the application session record matches the second host identity in the access session record, and if the access session time matches the application session time; and (b1iv) storing the second user identity as a network user identity used for accessing the network in the application session record; (c) obtaining by the security gateway the security policy comprising network parameters mapped to the user identity; and (d) applying the security policy to the application session by the security gateway. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer program product for applying a security policy to an application session, the computer program product comprising:
-
a non-transitory computer readable storage medium having computer readable program code embodied therewith, the computer readable program code configured to; recognize the application session between a network and an application via a security gateway; determine a user identity of the application session using information about the application session, wherein the determine comprises; determine the user identity from an application session record for the application session, wherein the application session record comprises the user identity used for accessing the network through a host, a host identity for the host, and an application session time, wherein a create of the application session record comprises; query an identity server by sending the host identity and the application session time in the application session record, wherein the identity server comprises an access session record for an access session between a second host and the network, wherein the access session record comprises a second user identity used for accessing the network through the second host, a second host identity for the second host, and an access session time; compare by the identity server the host identity in the application session record with the second host identity in the access session record, and compare the access session time with the application session time; return by the identity server the second user identity in the access session record, if the host identity in the application session record matches the second host identity in the access session record, and if the access session time matches the application session time; and store the second user identity as a network user identity used for accessing the network in the application session record; obtain the security policy comprising network parameters mapped to the user identity; and apply the security policy to the application session. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A system, comprising:
-
a corporate directory comprising a plurality of security policies; and a security gateway, wherein the security gateway; recognizes an application session between a network and an application via the security gateway; determines a user identity of the application session using information about the application session, wherein the determines comprises; determines the user identity from an application session record for the application session, wherein the application session record comprises the user identity used for accessing the network through a host, a host identity for the host, and an application session time, wherein a create of the application session record comprises; queries an identity server by sending the host identity and the application session time in the application session record, wherein the identity server comprises an access session record for an access session between a second host and the network, wherein the access session record comprises a second user identity used for accessing the network through the second host, a second host identity for the second host, and an access session time; compares by the identity server the host identity in the application session record with the second host identity in the access session record, and compare the access session time with the application session time; returns by the identity server the second user identity in the access session record, if the host identity in the application session record matches the second host identity in the access session record, and if the access session time matches the application session time; and stores the second user identity as a network user identity used for accessing the network in the application session record; obtains from the corporate direction the security policy of the plurality of security policies comprising network parameters mapped to the user identity; and applies the security policy to the application session. - View Dependent Claims (21, 22, 23)
-
Specification