Enterprise authentication via third party authentication support
First Claim
1. A method comprising:
- transmitting, by a computing device to an authentication device via a network, a request to authenticate a client device application via a forms login protocol;
retrieving, by the computing device from the authentication device via the network, an authentication challenge and a first credential form requesting a first authentication credential, wherein the first credential form is generated, by an extension device connected to the authentication device, based on information received from an authentication service associated with the client device application, the extension device being configured with one or more authentication protocols of the authentication service associated with the client device application;
transmitting, by the computing device to the client device application via the network, the first credential form and the authentication challenge;
receiving, by the computing device from the client device application via the network, the first authentication credential and a response to the authentication challenge;
transmitting, by the computing device to the authentication service via the extension device, the first authentication credential and the response to the authentication challenge; and
transmitting, by the computing device via the network and in response to a successful validation of the first authentication credential and a successful response to the authentication challenge, an approval of the request made by the client device application to authenticate via the forms login protocol.
8 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are disclosed for providing approaches to enterprise authentication via third party authentication support. The methods and systems may include transmitting, by a computing device to an authentication device, a request to authenticate a client device application via a forms login protocol, and transmitting, by the computing device to the client device application, a first credential form retrieved from an authentication device generated by an extension device. The methods and systems may also include receiving, by the computing device from the client device application, a first authentication credential, and transmitting, by the computing device to the authentication service via the extension device, the first authentication credential. The methods and systems may also include transmitting, by the computing device and in response to a successful validation of the first authentication credential, an approval of the request made by the client device application to authenticate via the forms login protocol.
-
Citations
23 Claims
-
1. A method comprising:
-
transmitting, by a computing device to an authentication device via a network, a request to authenticate a client device application via a forms login protocol; retrieving, by the computing device from the authentication device via the network, an authentication challenge and a first credential form requesting a first authentication credential, wherein the first credential form is generated, by an extension device connected to the authentication device, based on information received from an authentication service associated with the client device application, the extension device being configured with one or more authentication protocols of the authentication service associated with the client device application; transmitting, by the computing device to the client device application via the network, the first credential form and the authentication challenge; receiving, by the computing device from the client device application via the network, the first authentication credential and a response to the authentication challenge; transmitting, by the computing device to the authentication service via the extension device, the first authentication credential and the response to the authentication challenge; and transmitting, by the computing device via the network and in response to a successful validation of the first authentication credential and a successful response to the authentication challenge, an approval of the request made by the client device application to authenticate via the forms login protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 21)
-
-
14. A system, comprising:
-
at least one processor; and at least one memory storing instructions that, when executed by the at least one processor, cause the system to perform; transmitting, by a computing device to an authentication device via a network, a request to authenticate a client device application via a forms login protocol; retrieving, by the computing device from the authentication device via the network, an authentication challenge and a first credential form requesting a first authentication credential, wherein the first credential form is generated, by an extension device connected to the authentication device, based on information received from an authentication service associated with the client device application, the extension device being configured with one or more authentication protocols of the authentication service associated with the client device application; transmitting, by the computing device to the client device application via the network, the first credential form and the authentication challenge; receiving, by the computing device from the client device application, the first authentication credential and a response to the authentication challenge; transmitting, by the computing device to the authentication service via the extension device, the first authentication credential and the response to the authentication challenge; and transmitting, by the computing device via the network and in response to a successful validation of the first authentication credential and a successful response to the authentication challenge, an approval of the request made by the client device application to authenticate via the forms login protocol. - View Dependent Claims (15, 16, 17, 22)
-
-
18. One or more non-transitory computer-readable storage media having instructions stored thereon, that when executed by one or more processors, cause the one or more processors to perform:
-
transmitting, by a computing device to an authentication device via a network, a request to authenticate a client device application on a user device via a forms login protocol; retrieving, by the computing device from the authentication device via the network, an authentication challenge and a first credential form requesting a first authentication credential, wherein the first credential form is generated, by an extension device connected to the authentication device, based on information received from an authentication service associated with the client device application, the extension device being configured with one or more authentication protocols of the authentication service associated with the client device application; transmitting, by the computing device to the client device application via the network, the first credential form and the authentication challenge and; receiving, by the computing device from the client device application via the network, the first authentication credential and a response to the authentication challenge; transmitting, by the computing device to the authentication service via the extension device, the first authentication credential and the response to the authentication challenge; and transmitting, by the computing device and in response to a successful validation of the first authentication credential and a successful response to the authentication challenge, an approval of the request made by the client device application to authenticate via the forms login protocol. - View Dependent Claims (19, 20, 23)
-
Specification