Systems and methods for providing a smart group
First Claim
1. A method for establishing a policy group to aggregate access configurations to control a user'"'"'s access to an identified resource, the method comprising:
- a) establishing, via a policy manager executing on a device intermediary to a plurality of clients and one or more servers, a policy group representing an aggregate of one or more access configurations for a user to access via the device one or more identified resources of the one or more servers, the policy group comprising a login point component representing an entry point to access the one or more identified resources;
b) configuring, via the policy manager, the login point component to specify a uniform resource locator for the entry point;
c) selecting, via the policy manager from a plurality of authentication methods, one or more authentication methods for the login point component, the plurality of authentication methods comprising a first authentication method to which a first set of at least one authorization method is assigned, different from a second set of at least one authorization method assigned to a second authentication method of the plurality of authentication methods; and
d) selecting, via the policy manager from a plurality of authorization methods, one or more authorization methods for the login point component based on the one or more selected authentication methods, each of the selected authentication methods assigned with at least one authorization method.
7 Assignments
0 Petitions
Accused Products
Abstract
The present invention is directed towards systems and methods for establishing and applying a policy group to control a user'"'"'s access to an identified resource. A policy group representing an aggregate of one or more access configurations for a user to access one or more identified resources may be established via a policy manager. The policy group may include a login point component representing an entry point to access the identified resource. The login point may be configured via the policy manager to specify a uniform resource locator for the entry point. One or more authentication and authorization methods may be selected for the login point component. The device may receive a request to access the uniform resource locator. The device may initiate the policy group for evaluation. The device may initiate, with the user, one or more authentication and authorization methods specified by the login point component.
20 Citations
20 Claims
-
1. A method for establishing a policy group to aggregate access configurations to control a user'"'"'s access to an identified resource, the method comprising:
-
a) establishing, via a policy manager executing on a device intermediary to a plurality of clients and one or more servers, a policy group representing an aggregate of one or more access configurations for a user to access via the device one or more identified resources of the one or more servers, the policy group comprising a login point component representing an entry point to access the one or more identified resources; b) configuring, via the policy manager, the login point component to specify a uniform resource locator for the entry point; c) selecting, via the policy manager from a plurality of authentication methods, one or more authentication methods for the login point component, the plurality of authentication methods comprising a first authentication method to which a first set of at least one authorization method is assigned, different from a second set of at least one authorization method assigned to a second authentication method of the plurality of authentication methods; and d) selecting, via the policy manager from a plurality of authorization methods, one or more authorization methods for the login point component based on the one or more selected authentication methods, each of the selected authentication methods assigned with at least one authorization method. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for applying a policy group to control a user'"'"'s access to an identified resource, the method comprising:
-
a) identifying, by a device intermediary to a plurality of clients and one or more servers, a policy group representing an aggregate of one or more access configurations for a user to access via the device one or more identified resources of the one or more servers, the policy group comprising a login point component representing an entry point to access the one or more identified resources; b) receiving, by the device, a request of the user to access a uniform resource locator corresponding to the entry point specified by the login point component; c) initiating, by the device from a plurality of authentication methods, one or more authentication methods specified by the login point component with the user, the plurality of authentication methods comprising a first authentication method to which a first set of at least one authorization method is assigned, different from a second set of at least one authorization method assigned to a second authentication method of the plurality of authentication methods; and d) selecting, by the device from a plurality of authorization methods one or more authorization methods for the login point component based on the selected one or more authentication methods, each of the one or more selected authentication methods assigned with at least one authorization method. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A system for providing a policy group to aggregate access configurations to control a specific user'"'"'s access to a specific resource, the system comprising:
-
a device intermediary to a plurality of clients and one or more servers; a policy manager of the device establishing a policy group representing an aggregate of one or more access configurations for a user to access via the device one or more identified resources of the one or more servers; a login point component of the policy group representing an entry point to access the one or more identified resources, the login point component specifying a uniform resource locator for the entry point; and wherein via the policy manager one or more authentication methods are selected for the login point component from a plurality of authentication methods, the plurality of authentication methods comprising a first authentication method to which a first set of at least one authorization method is assigned, different from a second set of at least one authorization method assigned to a second authentication method of the plurality of authentication methods; and
from a plurality of authorization methods, one or more authorization methods are selected for the login point component based on the one or more selected authentication methods, each of the one or more selected authentication methods assigned with at least one authorization method.
-
Specification