Systems and methods for providing a smart group
First Claim
1. A system comprising:
- a device intermediary to a plurality of clients and one or more servers;
a policy manager configured on the device to establish a policy group to represent one or more access configurations for accessing one or more resources of the one or more servers,an interface of the policy manager configured to receive a configuration of a login point of the policy group that specifies a uniform resource locator to access the one or more resources;
wherein the interface of the policy manager is configured to receive a selected authentication method from a plurality of authentication methods to configure for the login point; and
wherein the interface of the policy manager is configured to provide a selection of one or more authorization methods assigned to the selected authentication method from a plurality of authorization methods configured on the device, the selection of one or more authorization methods assigned to the selected authentication method is different from a second selection of one or more authentication methods assigned to a second authentication method of the plurality of authentication methods.
8 Assignments
0 Petitions
Accused Products
Abstract
The present invention is directed towards systems and methods for establishing and applying a policy group to control a user'"'"'s access to an identified resource. A policy group representing an aggregate of one or more access configurations for a user to access one or more identified resources may be established via a policy manager. The policy group may include a login point component representing an entry point to access the identified resource. The login point may be configured via the policy manager to specify a uniform resource locator for the entry point. One or more authentication and authorization methods may be selected for the login point component. The device may receive a request to access the uniform resource locator. The device may initiate the policy group for evaluation. The device may initiate, with the user, one or more authentication and authorization methods specified by the login point component.
-
Citations
20 Claims
-
1. A system comprising:
-
a device intermediary to a plurality of clients and one or more servers; a policy manager configured on the device to establish a policy group to represent one or more access configurations for accessing one or more resources of the one or more servers, an interface of the policy manager configured to receive a configuration of a login point of the policy group that specifies a uniform resource locator to access the one or more resources; wherein the interface of the policy manager is configured to receive a selected authentication method from a plurality of authentication methods to configure for the login point; and wherein the interface of the policy manager is configured to provide a selection of one or more authorization methods assigned to the selected authentication method from a plurality of authorization methods configured on the device, the selection of one or more authorization methods assigned to the selected authentication method is different from a second selection of one or more authentication methods assigned to a second authentication method of the plurality of authentication methods. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising
a device intermediary to a plurality of clients and one or more servers; -
a policy group, configured on the device, to represent one or more access configurations for accessing one or more resources of the one or more servers, wherein configuration of a login point of the policy group specifies a uniform resource locator to access the one or more resources; wherein the device is configured to receive a request from a client to access a uniform resource locator of a server of the one or more servers corresponding to the login point of the policy group; wherein the device is configured to initiate, responsive to the request and the policy group, an authentication method specified by the login point from a plurality of different authentication methods configured on the device; and wherein the device is configured to select an authorization method from one or more authorization methods selected and assigned to the authentication method via configuration of the login point, selection of the one or more authorization methods assigned to the authentication method is different from a second selection of one or more authentication methods assigned to a second authentication method of the plurality of authentication methods. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification