SYSTEMS AND METHODS FOR AN EXTENSIBLE AUTHENTICATION FRAMEWORK
First Claim
1. A method for providing credential gathering requirements separate from a client that gathers credentials from a user, the method comprising:
- (a) receiving, by an agent executing on a client, credential gathering requirements from a device intermediary to the client and one or more servers, the credential gathering requirements identifying a credential type and an input field type;
(b) displaying, by the agent via a user interface, a user interface element corresponding to the input field type and to input a credential identified by the credential type; and
(c) transmitting, by the agent to the device for authentication, the credential received from the user via the user interface element.
7 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure describes systems and methods of an authentication framework to implement varying authentication schemes in a configurable and extendable manner. This authentication framework provides a level of abstraction in which requirements for credential gathering and authentication workflow are independent from the agents or authentication implementation that does the credential gathering and authentication workflow. A higher level of abstraction and a more comprehensive authentication framework allows handling the associated authentication transactions of complex authentication schemes without requiring any specific understanding of their internals. For example, the requirements to gather certain credentials for a particular authentication scheme may be configured and maintained separately from the client-side authentication agent that gathers the credentials. The flexible, configurable and extendable authentication framework supports a wide variety of authentication scheme and supports third party, proprietary and customized authentication schemes.
-
Citations
20 Claims
-
1. A method for providing credential gathering requirements separate from a client that gathers credentials from a user, the method comprising:
-
(a) receiving, by an agent executing on a client, credential gathering requirements from a device intermediary to the client and one or more servers, the credential gathering requirements identifying a credential type and an input field type; (b) displaying, by the agent via a user interface, a user interface element corresponding to the input field type and to input a credential identified by the credential type; and (c) transmitting, by the agent to the device for authentication, the credential received from the user via the user interface element. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of providing authentication implementation information for implementing a specified authentication scheme by an agent of a client, the method comprising:
-
(a) receiving, by an agent executing on a client, authentication implementation information from a device intermediary to the client and one or more servers, the authentication implementation information identifying an authentication scheme, an authenticator and one or more parameters for authenticating via the authenticator; (b) obtaining, by the agent, the one or more parameters of the authentication implementation information to perform the authentication scheme identified by the authentication implementation information; and (c) communicating, by the agent, the one or more parameters to the authenticator identified by the authentication implementation information. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A method for providing an authentication flow type for authenticating via a specified logon point, the method comprising:
-
(a) receiving, by an agent executing on a client, a logon point configuration from a device intermediary to the client and one or more servers, the login point configuration identifying an authentication flow type; (b) detecting, by the agent, a request to access a logon point corresponding to the logon point configuration; and (c) executing, by the agent responsive to the detection, an authentication flow identified by the authentication flow type. - View Dependent Claims (18, 19, 20)
-
Specification