Embodiments described herein provide for configuring a station device, such as a mobile or portable computing device, to access an enterprise network through an intermediate network. The intermediate network may correspond to a network that enables an individual to roam within a site or location of the enterprise network.
According to an embodiment, a computing device may be configured to communicate with an enterprise network. A computer file may be generated from a remote resource for purpose of enabling configurations needed by the computing device to be pre-specified. In one embodiment, the computer file includes a plurality of configuration items that are to be used with a network setup application, which is to be operated on the computing device. On the computing device, the network setup application is executable to enable connectivity between that computing device and the enterprise network through one or more network access points of the enterprise network. Once generated, the computer file can be transferred to the computing device. The network setup application may programmatically incorporate the configuration items of the computer file in its setup procedure for establishing connectivity between the computing device and one or more network access points.
A method such as described in the preceding paragraph may be performed remotely from the computing device that is to be configured. In one embodiment, a method such as described may be performed on the terminal or work station of an administrator of an enterprise network, on behalf of a user of the enterprise network.
According to another embodiment, a computing device may be configured to communicate with an enterprise network by receiving a configuration file that includes a plurality of configuration items. A network setup application may be executed to enable connectivity with the enterprise network through one or more network access points of the enterprise network. Executing the network setup application includes automatically using configuration items from the computer file.
In one embodiment, a station device with Wi-Fi communication capabilities can be provided a data file for enabling automatic, or partially or substantially automatic, configuration and operation of a setup procedure for initiating recognition between the device and a Wi-Fi access point of the enterprise network. The configuration data, in connection with instructions that execute with a setup application, enable automation of certain steps in which a computing device is configured for a Wi-Fi network of a larger enterprise network. Such a setup procedure allows the station device (e.g, device on which wireless connectivity is provided) to connect and communicate with an enterprise network. Such communications, when performed through the setup procedure, can accommodate security settings, tunneling and other features that accompany the use of such wireless networks in an enterprise network setting.
Embodiments described herein provide for using pre-specified configuration data with a Wi-Fi (or other similar network) setup procedure. Such a network set up procedure may be performed to initiate ongoing wireless connectivity with an enterprise network, so that the user performing the setup requires no advanced knowledge or expertise performing the setup.
In one embodiment, data required for a Wi-Fi setup procedure is specified before a user initiates a setup procedure for the first time. In one embodiment, such data is provided to a station device prior to a setup procedure being performed, so that the Wi-Fi setup procedure becomes substantially automated. For example, under an embodiment, a user simply loads the configuration data as a file or otherwise, and then performs actions for connecting to a Wi-Fi access point of the enterprise network to perform the first Wi-Fi setup of the particular device with the enterprise network for the first time. For example, the user may simply bring the station device into range of an access point, where a Wi-Fi setup application automatically detects the access point and utilizes stored or pre-specified configuration data for the enterprise network to connect.
Numerous types of computing devices may be used with embodiments described herein. As mentioned, one type of computer telephony device for use with an embodiment is a wireless, mobile computing device, sometimes called the “smart phone” or hybrid devices. Such devices are generally small enough to fit in one hand, and provide cellular telephony features in combination with other applications, such as contact applications for managing contact records, calendar applications for managing and scheduling events, task applications for keeping lists, and camera applications for capturing images. Many types of messaging transports may be provided on such mobile computing devices, including SMS, MMS, email and instant messaging.
Other types of computing devices are contemplated for use with one or more embodiments described herein. Such computing devices include a desktop computer, laptop, personal digital assistant (PDA) or other computing device that can support messaging and messaging applications.
One or more embodiments described herein provide that methods, techniques and actions performed by a computing device are performed programmatically, or as a computer-implemented method. Programmatically means through the use of code, or computer-executable instructions. A programmatically performed step may or may not be automatic.
Additionally, or more embodiments described herein may be implemented using modules. A module may include a program, a subroutine, a portion of a program, or a software component or a hardware component capable of performing one or more stated tasks or functions, or alternatively, a hardware component configured through software or other programmatic elements. As used herein, a module can exist on a hardware component independently of other modules, or a module can be a shared element or process of other modules, programs or machines.
The use of terms such as “component” or “element”, when presented in the context of software or programming, may refer to code that can be executed to perform a stated function or task. Such code may execute or be shared with other components or elements, even when a component or element is described or shown to be disparate from other components.
Furthermore, one or more embodiments described herein may be implemented through the use of instructions that are executable by one or more processors. These instructions may be carried on a computer-readable medium. Machines shown in figures below provide examples of processing resources and computer-readable mediums on which instructions for implementing embodiments of the invention can be carried and/or executed. In particular, the numerous machines shown with embodiments of the invention include processor(s) and various forms of memory for holding data and instructions. Examples of computer-readable mediums include permanent memory storage devices, such as hard drives on personal computers or servers. Other examples of computer storage mediums include portable storage units, such as CD or DVD units, flash memory (such as carried on many cell phones and personal digital assistants (PDAs)), Secure Digital (SD) memory cards, and magnetic memory. Computers, terminals, network enabled devices (e.g. mobile devices such as cell phones) are all examples of machines and devices that utilize processors, memory, and instructions stored on computer-readable mediums.
Overview
The mobile device 120 may include a Wi-Fi setup application 122 that can be executed one time (or intermittingly after certain events) to establish an available wireless connection between the device and the enterprise network 132. Once the available wireless connection is established, the mobile device 120 may have the ability to make future connections with the enterprise network 132 by simply communicating with an access point of the enterprise network. For example, once the initial setup is performed through use of the Wi-Fi setup application 122, future connections and wireless data exchange sessions may be conducted by a user simply bringing a mobile station in operative proximity of a wireless access point, or by a user performing a manual operation to trigger the connectivity when in range of the wireless access point.
According to on embodiment, computer station 110 may generate an output file 115 that contains configuration data for use by a given class of computing devices (e.g. devices that operate a particular platform or run a particular setup application) or by an individual device. The computer station 110 may run a configuration application 112 that creates the output file 115 specifically for the Wi-Fi setup application 122 running on the mobile device 120. The configuration data contained in the output file 115 may contain all configuration data necessary for enabling a setup procedure initiated by the Wi-Fi setup application 122 to be successfully completed and connect to enterprise network 132. An example of the configuration data that can be contained in the output file 115 is shown with
Under an embodiment, the configuration application 112 may be executed by an administrator of the enterprise network 132, or by someone who has sufficient knowledge of the enterprise network 132 to specify the various data items contained in the output file 115. As mentioned, once the output file 115 is created, it can be copied and used by multiple users of the enterprise network 132. For example, one configuration file can be copied and used by all users of the enterprise network 132, or by a class of users of that network (all those users who have a particular device and/or operating system platform, or run a specific Wi-Fi setup application). In one implementation, configuration application 112 may be in the form of a wizard or guide application, specifying prompts for entry of data items, and specifying a sequence by which the data items are to be submitted. In another implementation, configuration application 112 may be in the form of a software program (e.g. command line interpreter (cli)) to interpret the commands written as a software script. Once data items are entered by, for example, a network administrator, the application 112 generates the output file 115.
The configuration application 112 may automatically generate the output file 115 to have a format (e.g. date format), structure, and/or syntax that is recognizable and usable by the Wi-Fi setup application 122. For example, in an embodiment in which the mobile computing device 120 operates a PALM OS operating system, the file type of the output file 115 may correspond to PALMOSDatabase (“PDB”). To this end, one embodiment provides that the configuration application 112 is configured for a type or class of the setup procedure, so that the output file is indeed recognizable by the setup application 122. The output file 115 may be transferred, programmatically or manually, onto a transfer environment 102. The transfer environment 102 may correspond to any location that a user of the mobile device 120 can access and copy the output file 115. For example, the transfer environment 102 may correspond to a file location on a shared drive or directory of the enterprise network 132 (or other network), an email transmitted to an email address that the mobile device 120 can access, a secure digital (SD) card or other portable memory that can be inserted into the mobile device, or other location that can communicate data to the mobile device 120 (or even another device under the control of a common user).
From the transfer environment 102, the output file 115 may be copied to reside on the mobile device 120. On an instance when a Wi-Fi setup is first performed, using the WiFi access point of the enterprise network 132, the output file 115 may be called or otherwise used by the setup application 122. In one embodiment, individual configurations contained in the output file 115 are carried into the setup application 122 to enable completion of the initial setup procedure. As mentioned, once the initial setup procedure is performed, the mobile device 120 may be brought into connectivity with the enterprise network 132 through a Wi-Fi data exchange 134. The user may simply walk into proximity of an access point, or manually initiate the exchange when in range. While under one implementation, the Wi-Fi data exchange 134 is convention, the initial setup procedure is greatly simplified and not repeated.
In an embodiment, a method such as described by
From the perspective of an administrator, for example, an embodiment may appreciate that the administrator may need to specify configuration items for a setup procedure such as described just one time. An output of the setup procedure may accommodate numerous users of an enterprise network. As such, the work load for configuring multiple devices for local Wi-Fi connectivity to an enterprise network is greatly reduced.
Examples of the configuration data 312 include: authentication type, tunnel data, security certificates data including any private key and its value, initial identity, and optionally the network user's username and password. In one embodiment, some of the configuration data 312, such as username and password, is entered by the user of the computing device seeking Wi-Fi connectivity, and not the administrator. This allows the administrator to create one file containing more sophisticated configuration data, and enabling the user to enter during the setup procedure more simple data such as username and password (which the user can create during the setup procedure). In another embodiment, such information may be entered by the user after the first setup is performed.
In an embodiment such as shown by
What one or more embodiments provide is the establishment of an auto-configuration file for use with a Wi-Fi setup application. The auto-configuration file (or quasi-auto-configuration file) enables the user of a computing device that is to perform an initial network setup procedure (such as the Wi-Fi example of
At the same time, an embodiment provides that a single file is capable of being used by multiple users for purpose of configuring a setup procedure for establishing initial connectivity with an enterprise network, such as described with an embodiment provided above. This allows administrative work of enabling individual devices to be scaled: for example, one file can service numerous users and devices for the enterprise network.
Moreover, a computing device may carry more than one configuration file for Wi-Fi access points of different access points. For example, a user may use one output file of configuration data for a first enterprise network, then travel as a guest to another location of another enterprise network. At the other location, the user may have utilize the same setup application, but use a different output file of configuration data.
Among other uses, embodiments described herein enable accommodation of guest users at the location of an enterprise network. For example, an enterprise network site often accommodates guests who are to be provided certain network privileges (e.g. contractors etc.). The duration of the visit time by such individuals may often be measured by hours or days, and with the widespread use of mobile computing devices, it is often advantageous, if not hospitable, to enable at least limited network connectivity to such individuals. In one embodiment, such a guest user may enter the site of an enterprise network and be provided a file for a guest user access session. The file may be communicated to the user through various means, such as through Bluetooth connectivity with another station, through an email, or otherwise. Once the guest user has the file, he can initiate a setup procedure using the configuration data provided on the output file provided him, and thus have access to an enterprise network through a Wi-Fi access point.
In an embodiment such as provided, additional network protection may be achieved in that the guest user may be shielded from seeing many of the configurations used for enabling the setup procedure. Thus, the user may be denied the ability to copy the configuration data for use on a device when entering the premise of the enterprise network, unless the operator(s) of the enterprise network expressly provide him the output file. To this end, the configuration data of the output file may be encrypted, and the setup application that uses the configuration data may be provided an encryption key programmatically or otherwise.
With reference to
With regard to tunneling protocol, the entries may be provided by a network administrator, based on, for example, the choice of Authentication Protocol (see above). For example, the administrator may enter as a field value “EAP-TLS” or “LEAP”, in which case no tunnel protocol is necessary for the enterprise network. When this value is entered, the field for the tunneling protocol is inactive. Alternatively, a specific tunneling protocol may be used in the case where the value entered, such as, for example: EAP-TTLS: PAP (“Packet Authentication Protocol”), CHAP (“Challenge-Handshake Authentication Protocol”), MSCHAP (“Microsoft Challenge Handshake Authentication Protocol”), MSCHAPv2 (“Microsoft Challenge Handshake Authentication Protocol version 2”), EAP-GTC (password), EAP-MD5-Challenge (“Extensible Authentication Protocol-Message Digest 5-Challenge”), EAP-MSCHAPv2, EAP-PEAP (“Extensible Authentication Protocol-Protected Extensible Authentication Protocol”): MSCHAPv2, GTC (password).
Another set of fields or values for configuration items that can be handled by output file 115 are those for username and password. In one embodiment, these fields are optional. For example, on a RADIUS type server, separate fields may be provided for designation of a user's username and password. The administrator may leave these fields blank, in which case the user may fill out these fields on the device (based on Authentication Protocol selection) to connect successfully. Such fields may not be active for some protocols, such as LEAP.
Another field or configuration item may correspond to initial identity. To keep the client identity secure from eavesdropping, this field may be used to log in anonymously and establish the tunnel. The actual login name and client credentials may then be passed through the secure tunnel. Such an approach may have particular application to the tunneled EAP-TTLS and EAP-PEAP protocols. The default value for this field must be left blank. The value for this initial identity is provided by the network administrators, typical values are “anonymous”, (e.g. anonymous@<company_name>.com”) or it can left blank. If the field is left blank, then the actual login name is also used to establish the tunnel.
Another configuration item that can be included in the output file 115 is a server certificate. For example, an administrator of the network may be enabled to select one of a plurality of certificates. In one implementation, a default file mask for CA certificate files must be set to “X.509 Certificate (*.der, *.cer, *.crt)”, and a user may have an option to change the file mask to “All Files (*.*)”. A certificate may also be removed from a profile created by the user (e.g. a listing of all configuration items in the output file 115).
One or more embodiments may provide a feature for a user to specify a client certificate. The selection for enabling such a feature may depend on the authentication method or protocol in place. For some authentication protocols (such as EAP-TLS), the client certificate may be a required field. For other methods, the client certificate can be set through selection of a user/administrator. In one implementation, once the check-box is selected, a “set” or “clear” (or similar equivalents) feature may be activated. A “Set” feature may be selected by, for example, a corresponding check-box that is checked. This allows an administrator to set the client certificate for an individual user. A default file mask may also be employed. The user must have an option to change the file mask to “All Files (*.*)”. With regard to a “Clear” feature, selection clears the client certificate that has been set before for an individual user.
User-Interfaces
In one embodiment, values of fields provided by the administrator are displayed in corresponding fields 422 on the user-interface 420. The values may be changed through manual entry or pull-down menu through inputs of the user of the station terminal. Alternatively, the user may edit the settings through another manual edit selection 424.
Hardware Diagram
Station terminal 502 may include memory 508, a processor 510, and one or more types of roaming network connectivity, shown in
Alternatives
While embodiments described herein are specific to application in Wi-Fi, embodiments described herein may extend to any network procedure or setup procedure. In some embodiments, computing devices may be provided auto-configuration files that can be used with just about any network setup procedure, including procedures to enable individuals to roam with a site or location.
Furthermore, while embodiments described herein specifically recite Wi-Fi setup procedures for gaining access to an enterprise network, one or more embodiments contemplate providing configuration data in a file for Wi-Fi setup procedures for connectivity to other networks, such as broadband Internet locals (e.g. “HotSpots”). In the latter case, procedures that the user would have needed to perform manually to logon through a hot spot may be performed automatically, through, for example, use of a configuration data file.
Although illustrative embodiments of the invention have been described in detail herein with reference to the accompanying drawings, it is to be understood that the invention is not limited to those precise embodiments. As such, many modifications and variations will be apparent to practitioners skilled in this art. Accordingly, it is intended that the scope of the invention be defined by the following claims and their equivalents. Furthermore, it is contemplated that a particular feature described either individually or as part of an embodiment can be combined with other individually described features, or parts of other embodiments, even if the other features and embodiments make no mention of the particular feature. Thus, the absence of describing combinations should not preclude the inventor from claiming rights to such combinations.
This application claims benefit of priority to U.S. Provisional Application entitled System and Method for Configuring a Station Device to Access an Enterprise Network,” filed Mar. 4, 2006, naming P. Gupta as inventor. The aforementioned priority application has attorney reference number (PALM-0987 (4219.PALM.PRov); and it is incorporated by reference herein.
Number | Date | Country | |
---|---|---|---|
60779157 | Mar 2006 | US |