Security enhancement through application access control
First Claim
1. A method of enhancing security in a collaboration environment through application access control, the method comprising:
- receiving, on a console associated with a web-based collaboration system in the collaboration environment, settings associated with one or more available applications for collaboration, wherein the one or more available applications are configurable by a user with appropriate permissions via the web-based collaboration system;
providing, by the web-based collaboration system, the one or more available applications to a first collaborator and a second collaborator included in multiple collaborators of the collaboration environment, wherein providing the one or more available applications includes making the one or more available applications selectable by the first collaborator and the second collaborator;
receiving, from the first collaborator, a selection associated with an application of the one or more available applications via one of multiple user devices associated with the first collaborator;
integrating, by the web-based collaboration system, the application for use by the first collaborator via the web-based collaboration system;
applying, by the web-based collaboration system, security settings to accounts associated with the multiple collaborators configured by the user with the appropriate permissions, wherein the security settings include setting exceptions based on one or more of content or location-based criteria associated with the first collaborator, and include allowing or restricting access by a mobile device from the multiple user devices associated with the first collaborator;
identifying that the application includes default settings enforced on accounts associated with the first collaborator and the second collaborator of the multiple collaborators, wherein the default settings include either edit access or view access for the first collaborator and the second collaborator enforced by the web-based collaboration system, wherein the application is included in the one or more available applications for collaboration by the first collaborator and the second collaborator of the multiple collaborators; and
upon detecting an attempt to delete the application from the web-based collaboration system by the second collaborator in the multiple collaborators, preventing deletion of the application, wherein the application includes the default settings.
4 Assignments
0 Petitions
Accused Products
Abstract
Security enhancement through application access control for cloud-based services and/or storage accounts is disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system, for providing, via the collaboration environment, applications for use by a user in the collaboration environment. The applications are selectable by a user, through the collaboration environment, for use in interaction and engagement with other users in the collaboration environment in collaboration sessions. The applications that are visible or available for use by the user is configurable by another user (e.g., administrator or IT specialist) with appropriate permissions, though a designated console.
589 Citations
30 Claims
-
1. A method of enhancing security in a collaboration environment through application access control, the method comprising:
-
receiving, on a console associated with a web-based collaboration system in the collaboration environment, settings associated with one or more available applications for collaboration, wherein the one or more available applications are configurable by a user with appropriate permissions via the web-based collaboration system; providing, by the web-based collaboration system, the one or more available applications to a first collaborator and a second collaborator included in multiple collaborators of the collaboration environment, wherein providing the one or more available applications includes making the one or more available applications selectable by the first collaborator and the second collaborator; receiving, from the first collaborator, a selection associated with an application of the one or more available applications via one of multiple user devices associated with the first collaborator; integrating, by the web-based collaboration system, the application for use by the first collaborator via the web-based collaboration system; applying, by the web-based collaboration system, security settings to accounts associated with the multiple collaborators configured by the user with the appropriate permissions, wherein the security settings include setting exceptions based on one or more of content or location-based criteria associated with the first collaborator, and include allowing or restricting access by a mobile device from the multiple user devices associated with the first collaborator; identifying that the application includes default settings enforced on accounts associated with the first collaborator and the second collaborator of the multiple collaborators, wherein the default settings include either edit access or view access for the first collaborator and the second collaborator enforced by the web-based collaboration system, wherein the application is included in the one or more available applications for collaboration by the first collaborator and the second collaborator of the multiple collaborators; and upon detecting an attempt to delete the application from the web-based collaboration system by the second collaborator in the multiple collaborators, preventing deletion of the application, wherein the application includes the default settings. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A non-transitory computer readable storage medium having instructions stored thereon, which when executed by the one or more processors, cause the one or more processors to:
-
responsive to receiving settings associated with one or more available applications via a console associated with a web-based collaboration system in a collaboration environment; provide, by the web-based collaboration system in the collaboration environment, the one or more available applications to a first collaborator and a second collaborator included in the multiple collaborators of the collaboration environment, wherein the providing includes making the one or more available applications selectable by the multiple collaborators, wherein the one or more available applications are configurable via the web-based collaboration system, wherein the settings are initiated by a user having appropriate permissions in the collaboration environment; responsive to receiving from the first collaborator included in the multiple collaborators a selection associated with an application of the one or more available applications via one of multiple user devices associated with the first collaborator; integrate the selected application for use by the first collaborator of the multiple collaborators through the web-based collaboration system; applying, by the web-based collaboration system, mobile security settings configured by the user with the appropriate permissions to accounts associated with the multiple collaborators, wherein the security settings include setting exceptions based on one or more of content or location-based criteria associated with the first collaborator, and include allowing or restricting access by a mobile device from the multiple user devices associated with the first collaborator; enforcing the mobile security settings on the accounts associated with the multiple collaborators; identifying that the selected application includes default settings enforced on accounts associated with the first collaborator and the second collaborator of the multiple collaborators of the collaboration environment, wherein the default settings include either edit access or view access for the first collaborator and the second collaborator enforced by the web-based collaboration system, wherein the application is included in the one or more available applications for collaboration by the first collaborator and the second collaborator of the multiple collaborators; and upon detecting an attempt to delete the application from the web-based collaboration system by the second collaborator in the multiple collaborators, preventing deletion of the application, wherein the application includes the default settings. - View Dependent Claims (15, 16, 17)
-
-
18. A method of enhancing security of corporate content in a cloud environment through configurable use of native and third-party applications, the method comprising:
-
receiving settings associated with the native and the third-party applications, the settings including an identification of the third-party applications that are allowable for use by collaborators in accessing the corporate content in the cloud environment; wherein, the third-party applications are made allowable via selection by a user having appropriate administrative permissions through a console associated with a web-based collaboration system of the cloud environment; presenting a list of the third-party applications that are allowable to a first collaborator and a second collaborator included in the collaborators, wherein the third-party applications on the list are selectable by the collaborators for use in accessing the corporate content in the cloud environment; wherein the list of the third-party applications that are selectable by the collaborators is specific to an enterprise to which the corporate content relates; receiving a selection from the first collaborator of the collaborators, the selection indicating a set of third-party applications of the third-party applications on the list that are selected for use by the first collaborator in accessing the corporate content in the cloud environment via one of multiple user devices associated with the first collaborator; integrating, the set of third-party applications for use by the first collaborator via the web-based collaboration system; applying security settings to accounts associated with the collaborators configured by the user with the appropriate permissions, wherein the security settings include setting exceptions based on the accessed corporate content or location-based criteria associated with the first collaborator included in the collaborators, and include allowing or restricting access by a mobile device from the multiple user devices associated with the first collaborator; identifying that the selected set of third-party applications include default settings enforced on accounts associated with the first collaborator and the second collaborator of the collaborators of the cloud environment, wherein the default settings include either edit access or view access for the first collaborator and the second collaborator enforced by the web-based collaboration system, wherein the selected set of third-party applications are included on the list of the third-party applications for collaboration by the first collaborator and the second collaborator of the collaborators; and upon detecting an attempt to delete a application from the selected set of third-party applications by the second collaborator in the collaborators, preventing deletion of the application, wherein the application includes the default settings. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification