Connection leasing for hosted services
First Claim
1. A session host apparatus, comprising:
- a processor controlling operations of the session host apparatus; and
memory storing computer readable instructions that, when executed by the processor, cause the session host apparatus to establish a session with a session client by;
receiving a lease token associated with a session client, wherein the lease token is a self-sustaining package of cryptographically signed connection lease data from which the session host apparatus can determine whether the session client device is authorized to access one or more resources hosted by that session host, wherein the lease token comprises a plurality of data fields, each data field defining a different one of a lease ID, a set of one or more client devices, a set of one or more session hosts, and a set of one or more resources;
determining, based on the lease token, one or more resources, hosted by the session host apparatus, that the session client is authorized to access;
sending connection information to the session client based on the determined resources, after determining that the session client is authorized to access the one or more resources; and
establishing a session with the session client to provide access to the one or more determined resources.
8 Assignments
0 Petitions
Accused Products
Abstract
Aspects herein describe brokering hosted resources in a virtual desktop infrastructure (VDI) using connection leases to reduce demand on connection brokers and to allow hosted services to be maintained even in the event of a broker outage. When a client device desires to connect to a hosted resource (e.g., a hosted desktop or a hosted application), the client device may present a lease token to the session host. The lease token is a self-sustaining package of data from which a session host can determine whether the requesting client device is authorized to access one or more resources hosted by that session host. The lease token may be cryptographically signed to ensure its contents have not been altered, and further that the lease token originated from a trusted source. Lease tokens may be stored independently from a connection broker, thereby still being usable if the connection broker goes offline.
-
Citations
19 Claims
-
1. A session host apparatus, comprising:
-
a processor controlling operations of the session host apparatus; and memory storing computer readable instructions that, when executed by the processor, cause the session host apparatus to establish a session with a session client by; receiving a lease token associated with a session client, wherein the lease token is a self-sustaining package of cryptographically signed connection lease data from which the session host apparatus can determine whether the session client device is authorized to access one or more resources hosted by that session host, wherein the lease token comprises a plurality of data fields, each data field defining a different one of a lease ID, a set of one or more client devices, a set of one or more session hosts, and a set of one or more resources; determining, based on the lease token, one or more resources, hosted by the session host apparatus, that the session client is authorized to access; sending connection information to the session client based on the determined resources, after determining that the session client is authorized to access the one or more resources; and establishing a session with the session client to provide access to the one or more determined resources. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A connection broker apparatus, comprising:
-
a processor controlling operations of the connection broker apparatus; and memory storing computer readable instructions that, when executed by the processor, cause the connection broker apparatus to administer a connection lease by; receiving a connection request from a session client; based on the session client, determining; one or more session hosts the client is authorized to establish a session with, and one or more resources the client is authorized to access on said one or more session hosts; generating a lease token as a data package having a first data field identifying a lease number, a second data field identifying the one or more session hosts, a third data field identifying the one or more resources, and a fourth data field identifying the session client, wherein the lease token is a self-sustaining data package of cryptographically signed connection lease data from which the one or more session hosts can determine whether the session client device is authorized to access the one or more resources; cryptographically signing the lease token to verify that the lease token originated at the connection broker apparatus; and sending the signed lease token to a lease store for storage. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. A method comprising:
-
receiving a connection request at a connection broker apparatus from a session client; determining, based on the session client; one or more session hosts the client is authorized to establish a session with, and one or more resources the client is authorized to access on said one or more session hosts; generating a lease token as a data package having a first data field identifying a lease number, a second data field identifying the one or more session hosts, a third data field identifying the one or more resources, and a fourth data field identifying the session client; cryptographically signing the lease token to verify that the lease token originated at the connection broker apparatus, such that the lease token is a self-sustaining data package of cryptographically signed connection lease data from which the one or more session hosts can determine whether the session client device is authorized to access the one or more resources; and sending the signed lease token to a lease store for storage. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
Specification