Conjuring and providing profiles that manage execution of mobile applications
First Claim
1. A method, comprising:
- displaying, by one or more computing devices, a user interface that displays one or more policy settings for a managed application that is to be made available for download to a mobile device, wherein each of the one or more policy settings provides a constraint to be enforced by the mobile device prior to the managed application being provided access to at least one resource that is accessible through an access gateway;
receiving input via the user interface that creates or modifies a user authorization or user identification setting of the one or more policy settings, wherein the user authorization or user identification setting specifies a condition for authorizing or identifying a user in connection with the managed application being provided access to the at least one resource;
producing a policy file for the managed application that includes the user authorization or user identification setting, wherein the policy file is assigned to a first user role;
providing the policy file such that the policy is available for download to the mobile device;
receiving additional input specifying one or more additional policy settings, wherein the one or more additional policy settings includes an additional user authorization or user identification setting that specifies a constraint different from the one or more constraints that are specified by the user authorization or user identification setting;
producing an additional policy file for the managed application that includes the one or more additional policy settings, wherein the additional policy file is assigned to a second user role that is different from the first user role; and
providing the additional policy file for download in accordance with a requesting user that is assigned the second user role.
6 Assignments
0 Petitions
Accused Products
Abstract
Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user interface may be generated that allows an IT administrator or other operator to set, change and/or add to policy settings. The policy settings can be formatted into a policy file and be made available for download to a mobile device, such as via an application store or to be pushed to the mobile device as part of a data push service. The mobile device, based on the various settings included in the policy file, may perform various actions to enforce the security constraints that are represented by the policy. The various settings that can be included in a policy are numerous and some examples and variations thereof are described in connection with the example embodiments discussed herein.
479 Citations
20 Claims
-
1. A method, comprising:
-
displaying, by one or more computing devices, a user interface that displays one or more policy settings for a managed application that is to be made available for download to a mobile device, wherein each of the one or more policy settings provides a constraint to be enforced by the mobile device prior to the managed application being provided access to at least one resource that is accessible through an access gateway; receiving input via the user interface that creates or modifies a user authorization or user identification setting of the one or more policy settings, wherein the user authorization or user identification setting specifies a condition for authorizing or identifying a user in connection with the managed application being provided access to the at least one resource; producing a policy file for the managed application that includes the user authorization or user identification setting, wherein the policy file is assigned to a first user role; providing the policy file such that the policy is available for download to the mobile device; receiving additional input specifying one or more additional policy settings, wherein the one or more additional policy settings includes an additional user authorization or user identification setting that specifies a constraint different from the one or more constraints that are specified by the user authorization or user identification setting; producing an additional policy file for the managed application that includes the one or more additional policy settings, wherein the additional policy file is assigned to a second user role that is different from the first user role; and providing the additional policy file for download in accordance with a requesting user that is assigned the second user role. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 20)
-
-
12. An apparatus, comprising:
-
at least one processor; and memory storing executable instructions configured to, when executed by the at least one processor, cause the apparatus to; display a user interface that displays one or more policy settings for a managed application that is to be made available for download to a mobile device, wherein each of the one or more policy settings provides a constraint to be enforced by the mobile device prior to the managed application being provided access to at least one resource that is accessible through an access gateway; receive input via the user interface that creates or modifies a user authorization or user identification setting of the one or more policy settings, wherein the user authorization or user identification setting specifies a condition for authorizing or identifying a user in connection with the managed application being provided access to the at least one resource; produce a policy file for the managed application that includes the user authorization or user identification setting, wherein the policy file is assigned to a first user role; provide the policy file such that the policy is available for download to the mobile device; receive additional input specifying one or more additional policy settings, wherein the one or more additional policy settings includes an additional user authorization or user identification setting that specifies a constraint different from the one or more constraints that are specified by the user authorization or user identification setting; produce an additional policy file for the managed application that includes the one or more additional policy settings, wherein the additional policy file is assigned to a second user role that is different from the first user role; and provide the additional policy file for download in accordance with a requesting user that is assigned the second user role. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. One or more non-transitory computer-readable media storing instructions configured to, when executed, cause at least one computing device to:
-
display a user interface that displays one or more policy settings for a managed application that is to be made available for download to a mobile device, wherein each of the one or more policy settings provides a constraint to be enforced by the mobile device prior to the managed application being provided access to at least one resource that is accessible through an access gateway; receive input via the user interface that creates or modifies a user authorization or user identification setting of the one or more policy settings, wherein the user authorization or user identification setting specifies a condition for authorizing or identifying a user in connection with the managed application being provided access to the at least one resource; produce a policy file for the managed application that includes the user authorization or user identification setting, wherein the policy file is assigned to a first user role; provide the policy file such that the policy is available for download to the mobile device; receive additional input specifying one or more additional policy settings, wherein the one or more additional policy settings includes an additional user authorization or user identification setting that specifies a constraint different from the one or more constraints that are specified by the user authorization or user identification setting; produce an additional policy file for the managed application that includes the one or more additional policy settings, wherein the additional policy file is assigned to a second user role that is different from the first user role; and provide the additional policy file for download in accordance with a requesting user that is assigned the second user role.
-
Specification