Configuring and providing profiles that manage execution of mobile applications
First Claim
1. A method, comprising:
- displaying, by one or more computing devices, a user interface that displays one or more policy settings for a managed application that is to be made available for download to a mobile device, wherein each of the one or more policy settings provides a constraint to be enforced by the mobile device prior to the managed application being provided access to at least one resource that is accessible through an access gateway;
receiving input via the user interface that creates or modifies a user authorization or user identification setting of the one or more policy settings, wherein the user authorization or user identification setting specifies a condition for authorizing or identifying a user in connection with the managed application being provided access to said at least one resource, and wherein the user authorization or user identification setting includes data specifying a ticket that is configured to provide authorization to create an application specific virtual private network (VPN) tunnel with the access gateway without requiring the user to provide credentials, an expiration period for the ticket, a manner in which the user is to log-on, or a certificate that is usable by the mobile device when responding to certificate challenges;
producing a policy file for the managed application that includes the user authorization or user identification setting; and
providing the policy file such that the policy is available for download to the mobile device.
8 Assignments
0 Petitions
Accused Products
Abstract
Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user interface may be generated that allows an IT administrator or other operator to set, change and/or add to policy settings. The policy settings can be formatted into a policy file and be made available for download to a mobile device, such as via an application store or to be pushed to the mobile device as part of a data push service. The mobile device, based on the various settings included in the policy file, may perform various actions to enforce the security constraints that are represented by the policy. The various settings that can be included in a policy are numerous and some examples and variations thereof are described in connection with the example embodiments discussed herein.
-
Citations
20 Claims
-
1. A method, comprising:
-
displaying, by one or more computing devices, a user interface that displays one or more policy settings for a managed application that is to be made available for download to a mobile device, wherein each of the one or more policy settings provides a constraint to be enforced by the mobile device prior to the managed application being provided access to at least one resource that is accessible through an access gateway; receiving input via the user interface that creates or modifies a user authorization or user identification setting of the one or more policy settings, wherein the user authorization or user identification setting specifies a condition for authorizing or identifying a user in connection with the managed application being provided access to said at least one resource, and wherein the user authorization or user identification setting includes data specifying a ticket that is configured to provide authorization to create an application specific virtual private network (VPN) tunnel with the access gateway without requiring the user to provide credentials, an expiration period for the ticket, a manner in which the user is to log-on, or a certificate that is usable by the mobile device when responding to certificate challenges; producing a policy file for the managed application that includes the user authorization or user identification setting; and providing the policy file such that the policy is available for download to the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus, comprising:
-
at least one processor; and memory storing executable instructions configured to, when executed by the at least one processor, cause the apparatus to; display a user interface that displays one or more policy settings for a managed application that is to be made available for download to a mobile device, wherein each of the one or more policy settings provides a constraint to be enforced by the mobile device prior to the managed application being provided access to at least one resource that is accessible through an access gateway; receive input via the user interface that creates or modifies a user authorization or user identification setting of the one or more policy settings, wherein the user authorization or user identification setting specifies a condition for authorizing or identifying a user in connection with the managed application being provided access to said at least one resource, and wherein the user authorization or user identification setting includes data specifying a ticket that is configured to provide authorization to create an application specific virtual private network (VPN) tunnel with the access gateway without requiring the user to provide credentials, an expiration period for the ticket, a manner in which the user is to log-on, or a certificate that is usable by the mobile device when responding to certificate challenges; produce a policy file for the managed application that includes the user authorization or user identification setting; and provide the policy file such that the policy is available for download to the mobile device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. One or more non-transitory computer-readable media storing instructions configured to, when executed, cause at least one computing device to:
-
display a user interface that displays one or more policy settings for a managed application that is to be made available for download to a mobile device, wherein each of the one or more policy settings provides a constraint to be enforced by the mobile device prior to the managed application being provided access to at least one resource that is accessible through an access gateway; receive input via the user interface that creates or modifies a user authorization or user identification setting of the one or more policy settings, wherein the user authorization or user identification setting specifies a condition for authorizing or identifying a user in connection with the managed application being provided access to said at least one resource, and wherein the user authorization or user identification setting includes data specifying a ticket that is configured to provide authorization to create an application specific virtual private network (VPN) tunnel with the access gateway without requiring the user to provide credentials, an expiration period for the ticket, a manner in which the user is to log-on, or a certificate that is usable by the mobile device when responding to certificate challenges; produce a policy file for the managed application that includes the user authorization or user identification setting; and provide the policy file such that the policy is available for download to the mobile device. - View Dependent Claims (19, 20)
-
Specification