Secure configuration of authentication servers
First Claim
Patent Images
1. A method comprising:
- identifying a plurality of nodes in communication with an authentication server in a network, each node identified by a node identifier;
assigning a plurality of secrets to the plurality of nodes so that each respective secret is assigned to a respective node and associated with its node identifier;
automatically generating a data structure comprising a list of associations between the assigned secrets and the node identifiers;
securing the data structure; and
sending the data structure to store in the authentication server, the authentication server using the assigned secrets to perform authentication for the plurality of nodes.
7 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the invention are directed to automatically populating a database of names and secrets in an authentication server by sending one or more lists of one or more names and secrets by a network management software to an authentication server. Furthermore, some embodiments provide that the lists being sent are encrypted and/or embedded in otherwise inconspicuous files.
56 Citations
25 Claims
-
1. A method comprising:
-
identifying a plurality of nodes in communication with an authentication server in a network, each node identified by a node identifier; assigning a plurality of secrets to the plurality of nodes so that each respective secret is assigned to a respective node and associated with its node identifier; automatically generating a data structure comprising a list of associations between the assigned secrets and the node identifiers; securing the data structure; and sending the data structure to store in the authentication server, the authentication server using the assigned secrets to perform authentication for the plurality of nodes. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer readable medium comprising computer executable instructions configured to cause a processor to perform a method comprising:
-
identifying a plurality of nodes in communication with an authentication server in a network, each node identified by a node identifier; assigning a plurality of secrets to the plurality of nodes so that each respective secret is assigned to a respective node and associated with its node identifier; automatically generating a data structure comprising a list of associations between the assigned secrets and the node identifiers; securing the data structure; and sending the data structure to store in the authentication server, the authentication server using the assigned secrets to perform authentication for the plurality of nodes. - View Dependent Claims (13, 14, 15)
-
-
16. A device comprising a processor and a memory, the memory comprising a plurality of instructions executable at the processor and configured to cause the processor to:
-
identify a plurality of nodes in communication with an authentication server in a network, each node identified by a node identifier; assign a plurality of secrets to the plurality of nodes so that each respective secret is assigned to a respective node and associated with its node identifier; automatically generate a data structure comprising a list of associations between the assigned secrets and the node identifiers; secure the data structure; and send the data structure to store in the authentication server, the authentication server using the assigned secrets to perform authentication for the plurality of nodes. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23)
-
-
24. A network comprising:
-
a plurality of nodes; a computer executing an authentication management application; and an authentication server, wherein the computer executing the authentication management application is configured to identify a plurality of nodes in communication with the authentication serve in a network, each node identified by a node identifier; assign a plurality of secrets to the plurality of nodes so that each respective secret is assigned to a respective node and associated with its node identifier, automatically generate a data structure comprising a list of associations between the assigned secrets and the node identifiers, secure the data structure, and send the data structure to store in the authentication server; and the authentication server is configured to use the assigned secrets to perform authentication for the plurality of nodes. - View Dependent Claims (25)
-
Specification