Unified provisioning of applications on devices in an enterprise system
First Claim
1. A method comprising:
- identifying a user role associated with an identity for a user of an enterprise system;
retrieving device information of a first remote device registered for the identity to access the enterprise system;
determining, based on the user role, an account providing the identity with access to a first resource accessible in the enterprise system, wherein the first resource is accessible from the first remote device using a first application of a plurality of applications accessible to the user role;
configuring, by a computer system, the first application with connection information that enables the first application to connect to a first target system to access the first resource for the account using the first remote device, wherein the first target system provides access to the first resource;
configuring, by the computer system, the first application with access information that permits the first application to access the first resource, wherein the access information is based on access permitted to the user by the account; and
transmitting the first application to the first remote device upon configuring the first application with the connection information and the access information.
1 Assignment
0 Petitions
Accused Products
Abstract
The present disclosure relates generally to managing access to an enterprise system using remote devices. Techniques are disclosed for provisioning applications on remote devices to access resources in an enterprise system. Specifically, applications may be automatically configured with access information (e.g., account information) and connection information to access a resource in an enterprise system using a remote device. Configuring an application may include determining an account for accessing a resource using the application. An account may be provisioned if one has not been established. Upon configuring an application, the device access management system may provide a configured application to the remote device(s) for which the application is configured. Once the configured application is received, the application may be automatically installed on the remote device, after which the application may be executed to access a resource.
-
Citations
20 Claims
-
1. A method comprising:
-
identifying a user role associated with an identity for a user of an enterprise system; retrieving device information of a first remote device registered for the identity to access the enterprise system; determining, based on the user role, an account providing the identity with access to a first resource accessible in the enterprise system, wherein the first resource is accessible from the first remote device using a first application of a plurality of applications accessible to the user role; configuring, by a computer system, the first application with connection information that enables the first application to connect to a first target system to access the first resource for the account using the first remote device, wherein the first target system provides access to the first resource; configuring, by the computer system, the first application with access information that permits the first application to access the first resource, wherein the access information is based on access permitted to the user by the account; and transmitting the first application to the first remote device upon configuring the first application with the connection information and the access information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable medium comprising instructions stored thereon, that when executed on a processor, cause the processor to perform operations comprising:
-
identifying a user role associated with an identity for a user of an enterprise system; retrieving device information of a first remote device registered for the identity to access the enterprise system; determining, based on the user role, an account providing the identity with access to a first resource accessible in the enterprise system, wherein the first resource is accessible from the first remote device using a first application of a plurality of applications accessible to the user role; configuring, by a computer system, the first application with connection information that enables the first application to connect to a first target system to access the first resource for the account using the first remote device, wherein the first target system provides access to the first resource; configuring, by the computer system, the first application with access information that permits the first application to access the first resource, wherein the access information is based on access permitted to the user by the account; and transmitting the first application to the first remote device upon configuring the first application with the connection information and the access information. - View Dependent Claims (14)
-
-
15. A system comprising:
-
one or more processors; and a memory storing instructions that, when executed by the one or more processors, cause the one or more processors to; identify a user role associated with an identity for a user of an enterprise system; retrieve device information of a plurality of remote devices registered for the identity to access the enterprise system; determine, based on the user role, an account providing the identity with access to a first resource accessible in the enterprise system, wherein the first resource is accessible from the plurality of remote devices using a first application of a plurality of applications accessible to the user role; configure, by a computer system, the first application with connection information that enables the first application to connect to a first target system to access the first resource for the account using the plurality of remote devices, wherein the first target system provides access to the first resource; configure, by the computer system, the first application with access information that permits the first application to access the first resource, wherein the access information is based on access permitted to the user by the account; and transmit the first application to each of the plurality of remote devices upon configuring the first application with the connection information and the access information. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification