Abstracting credentials for mobile client authentication
First Claim
Patent Images
1. A method comprising:
- receiving, by a proxy server computer, an authentication request from a mobile user device for access to a web application hosted in a cloud, wherein the authentication request comprises initial user credentials that are embedded in the mobile user device, and wherein the authentication request to the web application is routed to the proxy server computer via a Virtual Private Network (VPN) in view of a configuration profile of the mobile user device indicating that requests from a specific domain be routed to the proxy server computer;
determining that the authentication request is a candidate for modification based on the initial user credentials in the authentication request;
modifying, by the proxy server computer, the authentication request to include replacement user credentials that correspond to the initial user credentials; and
transmitting the modified authentication request to the web application in the cloud, wherein the web application determines whether the modified authentication request is valid based on the replacement user credentials.
2 Assignments
0 Petitions
Accused Products
Abstract
A computing system receives an authentication request from a user device for access to a web application hosted in a cloud and determines that the authentication request is a candidate for modification based on initial user credentials in the authentication request. The computing system modifies the authentication request to include replacement user credentials that correspond to the initial user credentials and transmits the modified authentication request to the web application in the cloud. The web application determines whether the modified authentication request is valid based on the replacement user credentials.
-
Citations
18 Claims
-
1. A method comprising:
-
receiving, by a proxy server computer, an authentication request from a mobile user device for access to a web application hosted in a cloud, wherein the authentication request comprises initial user credentials that are embedded in the mobile user device, and wherein the authentication request to the web application is routed to the proxy server computer via a Virtual Private Network (VPN) in view of a configuration profile of the mobile user device indicating that requests from a specific domain be routed to the proxy server computer; determining that the authentication request is a candidate for modification based on the initial user credentials in the authentication request; modifying, by the proxy server computer, the authentication request to include replacement user credentials that correspond to the initial user credentials; and transmitting the modified authentication request to the web application in the cloud, wherein the web application determines whether the modified authentication request is valid based on the replacement user credentials. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
-
a memory; and a processing device coupled with the memory to; receive, by a proxy server computer executing the processing device, an authentication request from a mobile user device for access to a web application hosted in a cloud, wherein the authentication request comprises initial user credentials that are embedded in the mobile user device, and wherein the authentication request to the web application is routed to the proxy server computer via a Virtual Private Network (VPN) in view of a configuration profile of the mobile user device indicating that requests from a specific domain be routed to the proxy server computer; determine that the authentication request is a candidate for modification based on the initial user credentials in the authentication request; modify the authentication request to include replacement user credentials that correspond to the initial user credentials; and transmit the modified authentication request to the web application in the cloud, wherein the web application determines whether the modified authentication request is valid based on the replacement user credentials. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer readable storage medium including instructions that, when executed by a processing device, cause the processing device to perform a method comprising:
-
receiving, by a proxy server computer executing the processing device, an authentication request from a mobile user device for access to a web application hosted in a cloud, wherein the authentication request comprises initial user credentials that are embedded in the mobile user device, and wherein the authentication request to the web application is routed to the proxy server computer via a Virtual Private Network (VPN) in view of a configuration profile of the mobile user device indicating that requests from a specific domain be routed to the proxy server computer; determining that the authentication request is a candidate for modification based on the initial user credentials in the authentication request; modifying the authentication request to include replacement user credentials that correspond to the initial user credentials; and transmitting the modified authentication request to the web application in the cloud, wherein the web application determines whether the modified authentication request is valid based on the replacement user credentials. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification