×

User authentication based on network context

  • US 9,021,558 B2
  • Filed: 01/22/2013
  • Issued: 04/28/2015
  • Est. Priority Date: 01/22/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • receiving, in response to a request transmitted from a computing device to access a computing solution, a command to authenticate a user of the computing device;

    determining, in response to receiving the command, whether a network address corresponding to the request matches at least one network address associated with a protected network;

    initiating, in response to the network address corresponding to the request not matching the at least one network address associated with the protected network, authentication of the user via a first number of authentication mechanisms defined via a stack of pluggable authentication modules at an identity provider corresponding to the computing solution; and

    delegating, in response to the network address corresponding to the request matching the at least one network address associated with the protected network, the authentication of the user via a second number, that is greater than the first number, of authentication mechanisms defined via a stack of pluggable authentication modules to an identity management system located within the protected network.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×