Secure configuration of authentication servers
First Claim
Patent Images
1. A method comprising:
- assigning a plurality of secrets to a plurality of nodes of a network, so that each respective secret is assigned to a respective node and associated with a node identifier of the respective node; and
generating a data structure comprising the assigned secrets and the node identifiers that the respective secrets are associated with;
wherein an authentication server is configured to obtain the assigned secrets from the data structure and to use the assigned secrets to perform authentication for the plurality of nodes.
7 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the invention are directed to automatically populating a database of names and secrets in an authentication server by sending one or more lists of one or more names and secrets by a network management software to an authentication server. Furthermore, some embodiments provide that the lists being sent are encrypted and/or embedded in otherwise inconspicuous files.
66 Citations
25 Claims
-
1. A method comprising:
-
assigning a plurality of secrets to a plurality of nodes of a network, so that each respective secret is assigned to a respective node and associated with a node identifier of the respective node; and generating a data structure comprising the assigned secrets and the node identifiers that the respective secrets are associated with; wherein an authentication server is configured to obtain the assigned secrets from the data structure and to use the assigned secrets to perform authentication for the plurality of nodes. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer readable medium comprising computer executable instructions configured to cause a processor to perform a method comprising:
-
assigning a plurality of secrets to a plurality of nodes of a network, so that each respective secret is assigned to a respective node and associated with a node identifier of the respective node; and generating a data structure comprising the assigned secrets and the node identifiers that the respective secrets are associated with; wherein an authentication server is configured to obtain the assigned secrets from the data structure and to use the assigned secrets to perform authentication for the plurality of nodes. - View Dependent Claims (13, 14, 15)
-
-
16. A device comprising a processor and a memory, the memory comprising a plurality of instructions executable at the processor and configured to cause the processor to:
-
assign a plurality of secrets to a plurality of nodes of a network, so that each respective secret is assigned to a respective node and associated with a node identifier of the respective node; and generate a data structure comprising the assigned secrets and the node identifiers that the respective secrets are associated with; wherein an authentication server is configured to obtain the assigned secrets from the data structure and to use the assigned secrets to perform authentication for the plurality of nodes. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23)
-
-
24. A network comprising:
-
a plurality of nodes; a computer executing an authentication management application; and an authentication server, wherein the computer executing the authentication management application is configured to assign a plurality of secrets to a plurality of nodes of a network, so that each respective secret is assigned to a respective node and associated with a node identifier of the respective node, and generate a data structure comprising the assigned secrets and the node identifiers that the respective secrets are associated with; and the authentication server is configured to obtain the assigned secrets from the data structure, and use the assigned secrets to perform authentication for the plurality of nodes. - View Dependent Claims (25)
-
Specification