发明名称 Systems and methods for providing a smart group
摘要 The present invention is directed towards systems and methods for establishing and applying a policy group to control a user's access to an identified resource. A policy group representing an aggregate of one or more access configurations for a user to access one or more identified resources may be established via a policy manager. The policy group may include a login point component representing an entry point to access the identified resource. The login point may be configured via the policy manager to specify a uniform resource locator for the entry point. One or more authentication and authorization methods may be selected for the login point component. The device may receive a request to access the uniform resource locator. The device may initiate the policy group for evaluation. The device may initiate, with the user, one or more authentication and authorization methods specified by the login point component.
申请公布号 US8839346(B2) 申请公布日期 2014.09.16
申请号 US201012840632 申请日期 2010.07.21
申请人 Citrix Systems, Inc. 发明人 Murgia Marco;Tomlin Larry;Bojer Ivan;Kann Jong;Rafiq Pierre
分类号 H04L9/32;H04L29/06 主分类号 H04L9/32
代理机构 Foley & Lardner LLP 代理人 Foley & Lardner LLP ;McKenna Christopher J.;Pua Paul M. H.
主权项 1. A method for establishing a policy group to aggregate access configurations to control a user's access to an identified resource, the method comprising: a) establishing, via a policy manager executing on a device intermediary to a plurality of clients and one or more servers, a policy group representing an aggregate of one or more access configurations for a user to access via the device one or more identified resources of the one or more servers, the policy group comprising a login point component representing an entry point to access the one or more identified resources; b) configuring, via the policy manager, the login point component to specify a uniform resource locator for the entry point; c) selecting, via the policy manager from a plurality of authentication methods, one or more authentication methods for the login point component, the plurality of authentication methods comprising a first authentication method to which a first set of at least one authorization method is assigned, different from a second set of at least one authorization method assigned to a second authentication method of the plurality of authentication methods; and d) selecting, via the policy manager from a plurality of authorization methods, one or more authorization methods for the login point component based on the one or more selected authentication methods, each of the selected authentication methods assigned with at least one authorization method.
地址 Fort Lauderdale FL US