Access control center auto configuration
First Claim
1. A system of controlling access by technical support personnel to a company'"'"'s computing system, the system comprising a memory storing instructions, said memory coupled to a processor executing said instructions to:
- receive identification information from the technical support personnel, the technical support personnel being physically and logically isolated from the company'"'"'s computing system;
authorize the technical support personnel to request a first approval;
obtain the first approval for the technical support personnel, the first approval authorizing the technical support personnel to request a second approval;
obtain the second approval for the technical support personnel, the second approval authorizing the technical support personnel to access the company'"'"'s computing system including a number of virtual desktops, wherein one of the number of virtual desktops is assigned to the technical support personnel operating a thin client terminal, based on a type of incident assigned to the technical support personnel and wherein the thin client terminal contains only specific remote access applications based on the type of incident assigned;
send user credentials through the thin client terminal displaying the one of the number of virtual desktops to access corresponding systems of the company'"'"'s computing system via the one of the number of virtual desktops, wherein the user credentials are sent through the background of the thin client terminal displaying the one of the number of virtual desktops and wherein the user credentials are utilized to access a number of features of the company'"'"'s computing system; and
automatically update configuration information for controlling access to the company'"'"'s computing system based on the first and second approvals.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems provide indirect and temporary access to a company'"'"'s IT infrastructure and business applications. The methods/systems involve establishing an access control center (ACC) to control the access that technical support personnel may have to the company'"'"'s IT infrastructure and business applications. Thin client terminals with limited functionality may then be set up in the ACC for use by the technical support personnel. The thin client terminals connect the technical support personnel to workstations outside the ACC that operate as virtual desktops. The virtual desktops in turn connect the technical support personnel to the IT infrastructure and business applications. An ACC application may be used to automatically establish the connection between the thin client terminals to the virtual desktops, and the virtual desktops to the IT infrastructure and business applications. The ACC application may include an auto configuration module for automatically configuring a root privilege manager and jump server.
-
Citations
21 Claims
-
1. A system of controlling access by technical support personnel to a company'"'"'s computing system, the system comprising a memory storing instructions, said memory coupled to a processor executing said instructions to:
-
receive identification information from the technical support personnel, the technical support personnel being physically and logically isolated from the company'"'"'s computing system; authorize the technical support personnel to request a first approval; obtain the first approval for the technical support personnel, the first approval authorizing the technical support personnel to request a second approval; obtain the second approval for the technical support personnel, the second approval authorizing the technical support personnel to access the company'"'"'s computing system including a number of virtual desktops, wherein one of the number of virtual desktops is assigned to the technical support personnel operating a thin client terminal, based on a type of incident assigned to the technical support personnel and wherein the thin client terminal contains only specific remote access applications based on the type of incident assigned; send user credentials through the thin client terminal displaying the one of the number of virtual desktops to access corresponding systems of the company'"'"'s computing system via the one of the number of virtual desktops, wherein the user credentials are sent through the background of the thin client terminal displaying the one of the number of virtual desktops and wherein the user credentials are utilized to access a number of features of the company'"'"'s computing system; and automatically update configuration information for controlling access to the company'"'"'s computing system based on the first and second approvals. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of controlling access by technical support personnel to a company'"'"'s computing system, the method comprising:
-
receiving identification information from the technical support personnel, the technical support personnel being physically and logically isolated from the company'"'"'s computing system; authorizing the technical support personnel to request a first approval; obtaining the first approval for the technical support personnel, the first approval authorizing the technical support personnel to request a second approval; obtaining the second approval for the technical support personnel, the second approval authorizing the technical support personnel to access the company'"'"'s computing system including a number of virtual desktops, wherein one of the number of virtual desktops is assigned to the technical support personnel operating a thin client terminal, based on a type of incident assigned to the technical support personnel and wherein the thin client terminal contains only specific remote access applications based on the type of incident assigned; sending user credentials through the thin client terminal displaying the one of the number of virtual desktops to access corresponding systems of the company'"'"'s computing system via the one of the number of virtual desktops, wherein the user credentials are sent through the background of the thin client terminal displaying the one of the number of virtual desktops and wherein the user credentials are utilized to access a number of features of the company'"'"'s computing system; and automatically updating configuration information for controlling access to the company'"'"'s computing system based on the first and second approvals. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium having computer-executable instructions for controlling access by technical support personnel to a company'"'"'s computing system, the computer-executable instructions executable by a processor to:
-
receive identification information from the technical support personnel, the technical support personnel being physically and logically isolated from the company'"'"'s computing system; authorize the technical support personnel to request a first approval; obtain the first approval for the technical support personnel, the first approval authorizing the technical support personnel to request a second approval; obtain the second approval for the technical support personnel, the second approval authorizing the technical support personnel to access the company'"'"'s computing system including a number of virtual desktops, wherein one of the number of virtual desktops is assigned to the technical support personnel operating a thin client terminal, based on a type of incident assigned to the technical support personnel and wherein the thin client terminal contains specific remote access applications based on the type of incident assigned; send user credentials through the thin client terminal displaying the one of the number of virtual desktops to access corresponding systems of the company'"'"'s computing system via the one of the number of virtual desktops, wherein the user credentials are sent through the background of the thin client terminal displaying the one of the number of virtual desktops and wherein the user credentials are utilized to access a number of features of the company'"'"'s computing system; and automatically update configuration information for controlling access to the company'"'"'s computing system based on the first and second approvals. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification