Traditional means of authenticating access to computer systems and computer applications involve knowing a username and password. This results in a password being an important piece of information that needs to be protected since a password leak could lead to unauthorized access to computer systems or applications resulting in business losses. Remembering a multitude of usernames and passwords can be cumbersome and error-prone for a typical user, which can potentially lead to insecure practices such as using the same passwords across applications and systems which in turn increases the risk when a password is leaked.
Traditional two-factor authentication systems overcome some of these problems by using a physical token and password whereby just the loss of password does not compromise security. However, two-factor authentication can be expensive to install, use, maintain, and administer. In addition, many users are more familiar with single username and password use, and introducing a physical token and/or other means of delivering and using software tokens can result in productivity loss caused by having to adjust to a new security regime. Furthermore, various legacy applications and systems do not support two-factor authentication.
Restricting access to computer systems and applications to a select few individuals, carefully disseminating credential information, frequently changing passwords, monitoring, and auditing access are other traditional means of securing password use. But all of these approaches can be prone to human error resulting in password leakage either by accident, due to malware, phishing or some other cyber-attack.
Additionally, the storing and distributing of information across the internet by means of remote databases, web servers, web clients and web browsers, etc., has introduced another opportunity for insecurity that is not easily controlled due to the anonymous nature of the internet. In some scenarios, if the security of a computer has been compromised unbeknownst to the user, any information such as username and password entered by the user is thereby compromised as well.
When granting internal system access to third-party entities, the challenges of securing credentials multiply as an organization may not have complete control over security, operating, and business practices of a third-party.
Based on the foregoing, there is a need for secure and automated credential handling such that credentials are not revealed except at the point of need and transported to the endpoint or application (such as a web application) using cryptographically sound transport mechanisms.
According to one embodiment of the present disclosure, a method of selecting a web application, selecting a credential or credentials, and injecting said credential or credentials is described. In one embodiment, a method provides login access to a web endpoint by an accessor. In this scenario, an accessor using an access console may select the web endpoint from a list of endpoints to which a user or agent of a user may have access and requests access. Since the accessor has login access to the selected web endpoint, a privileged access management appliance (PAM appliance) will establish a session between a protocol agent that has network connectivity to that web endpoint and the accessor. Generally, the PAM appliance provides, in certain embodiments, an automated credential selection, injection and access mechanism that is secure, easy to use, provides granular access controls, and is implemented in a turn-key fashion. Similarly, the protocol agent directly connects with a web endpoint and facilitates the credential injection process (in various embodiments, with and without a connection to the PAM appliance).
Once the session between the protocol agent and the PAM appliance is established, the PAM appliance queries a credential manager to securely extract credentials that are available for this accessor on the selected web endpoint. The credentials are shown to the accessor as aliases of the actual credentials (e.g., code names, nick names, etc.). If only one credential is available or based on the accessor's choice when multiple credentials are available, the selected partial credential information is sent to the protocol agent by the PAM appliance. The protocol agent now requests the full credential information for the selected credential, and the full credential information is transported securely from the credential manager to the protocol agent via the PAM appliance. At no point in transport of credentials would the accessor or accessor's machine have access to the full credential information either encrypted or otherwise. At no point in transport would the PAM appliance have unencrypted access to the full credential information. Similarly, in one embodiment, the PAM appliance does not hold the keys for decryption of the credentials either. Once the transport is successfully completed to the protocol agent, the protocol agent launches an embedded web browser (or other web application), accesses the webs endpoint, and may securely inject the credential information for a successful login. The protocol agent may monitor the injection process and upon receiving a successful injection status, may establish a remote control session of a web site with the accessor. During the injection or if the injection were to fail, the accessor may not have access to the website, embedded web browser, web endpoint or to the protocol agent.
In various embodiments, methods for injecting credentials into web endpoints include programmatic injection of JavaScript, proxy-based credential injection into a protocol stream, automatically entering keystrokes into password fields, etc. In one embodiment, credentials are transported over a TLS data stream and may be protected by a single use private-public key pair valid for the duration of a single transfer. Establishment of this key-pair and encryption and decryption of credentials may be handled at the last process in the execution chain just before handing off a clear text credential to a web application or web site, and clear text credentials exists for the shortest duration of time possible in a secure memory buffer. Establishment of a remote control session of a web application or web site at the protocol agent may aid in creating a securely audited and recorded web session. The protocol agent may establish a controlled, monitored, and secure recording stream with the appliance such that the accessor does not have an opportunity to manipulate the recording stream thereby maintaining the integrity of the recorded session. The PAM appliance may maintain the integrity of the recording stream by interrupting the remote web site or web application access of the accessor if any anomalies, lag, or lack of data are detected in the recording stream from the protocol agent to the PAM appliance.
In some embodiments, the accessor may have access to two types of credentials for use: a non-privileged credential for login and a privileged credential to access sensitive information within the web site or web application. The accessor may gain access to the web endpoint using the non-privileged credential via a process described before. Once logged in and accessing the web endpoint, in access console, the accessor can chose a user interface (UI) mechanism to trigger a request for injecting privileged credentials into a specific area of the web endpoint. When the accessor chooses an area of the web page, the embedded web browser triggers the protocol agent to request privileged credentials specific to that area of the web endpoint, via the PAM appliance. In one embodiment, the PAM appliance forwards the request to the credential manager on behalf of the accessor. The mechanism to securely retrieve credentials and injection follows the same process as described in the prior embodiments.
For example, an organization may implement an embodiment of the present disclosure to prevent its employees, who should have access to its social media accounts (e.g., LinkedIn®, Facebook®, Twitter®, Instagram®, etc.), from actually possessing the login credentials for those accounts. Thus, if any one employee's computing device or personal files were comprised, the malicious individual who comprised the same could not gain access to the organization's social media accounts. Continuing with this example, when an employee wishes to navigate to www.facebook.com, he or she would select the web endpoint for Facebook in the access console, which automatically triggers the protocol agent to request the Facebook page and ready it for credential injection. Accordingly, the PAM appliance, as described herein, would forward the credentials request to the credential manager, which, if appropriately validated, would provide the requested credentials to the protocol agent (via the PAM appliance) for injection into the webpage. Once injected, the employee would be able to access and use the Facebook account. Furthermore, if the employee were to leave the company, his/her access can be easily denied without having to reset passwords, etc.
Apparatuses, methods, and systems for credential handling for secure and automated access to endpoints or applications is described. In the following description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It is apparent, however, to one skilled in the art that the embodiments of the disclosure may be practiced without these specific details or with an equivalent arrangement. In other instances, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the embodiments of the disclosure.
When embodiments are described with respect to a wired network, it is contemplated that these embodiments have applicability to other networks including wireless systems. Similarly when embodiments are described with respect to computing devices they have applicability to physical, virtual, mobile, handheld, headless, and graphical devices and systems. Similarly when embodiments are described with respect to web applications, they have applicability to web sites, web clients, web servers, regardless of whether or not the applications include graphical elements.
As will be understood by one skilled in the art, the term and meaning of endpoint as used in the present disclosure is non-limiting to a local client. An endpoint or endpoint system may be, in various embodiments, a web client/web application, a web browser, a remote client, an end client, etc. In general, it should be understood based on the descriptions herein that the term endpoint may relate to any entity (e.g., computing device, processor, web application, web resource, etc.) that is a location or destination for information to be routed or addressed, such as credentials.
In one embodiment, a PAM appliance 101 (e.g., along with or configured with a credential manager 107) provides, in certain embodiments, an automated credential selection, injection and access mechanism that is secure, easy to use, provides granular access controls, and implemented in a turn-key fashion. For the purposes of illustration, the appliance 101 can be deployed by an organization and accessed by entities that are either internal or external to that organization. In certain embodiments, the PAM appliance 101 can be implemented to accommodate access, credential selection, and injection from mobile systems and means to contact those mobile systems even when disconnected from the PAM appliance 101.
In the scenario of
Additionally, the PAM appliance 101 has the capability of allowing on-demand product use from anywhere in the world. For example, as long as the network appliance is deployed and accessible via a public IP address, an accessor or administrator can log in to his/her account via a web interface hosted on the network appliance or use a mobile application to connect to and gain access to the appliance or the endpoint and automatically select and inject credentials as long as he or she has such access.
An access console (e.g., local client, accessor application/client, or web client/web application, etc.) can be downloaded from a web interface for remote and secure access to endpoints, request credentials when needed, monitor ongoing sessions, and verify granted access. Also, an endpoint console (e.g., remote client, endpoint application/client, or web client/web application, etc.) can be downloaded from an administrative interface hosted on the PAM appliance 101—this endpoint client 103 can be further distributed to endpoints to enable them for secure remote access and credential injection. In another embodiment these clients can be downloaded from a third party's hosted or organization's self-hosted download location or mobile application store. In various embodiments, a protocol agent can be downloaded from an administrative interface hosted on the PAM appliance 101. This protocol agent further can be distributed to non-interconnected networks to enable them for remote and secure access and credential injection for web sites/web applications that are internal to those networks. Similar to endpoint clients 103, a protocol agent may be configured to automatically uninstall at the end of access period, session, or a certain number of web sessions for additional security.
The appliance 101, in various embodiments, executes applications that can receive, handle, manage, and dispatch system or data messages to and from the access consoles, protocol agents, web applications, and endpoint clients via a secure connection (e.g., 256-bit Advance Encryption Standard (AES) Transport Layer Security (TLS)).
As seen in
According to one embodiment, the operation 100B of the accessor system 105 is depicted in
Referring now to
According to one embodiment of the present disclosure, the process of the accessor system 105 interacting with the protocol agent 115 in order to communicate with a web endpoint 103 is described in process 100D of
By way of example, two example approaches to selecting and injecting credentials according to various embodiments are described. In one embodiment, one approach provides login access to an endpoint by an accessor. In this scenario, an accessor, using an access console, selects the endpoint from a list of endpoints to which he or she has access and requests access. Since the accessor has login access to the selected endpoint, the PAM appliance 101 will establish a session between the endpoint and the accessor. Once the session is established, the PAM appliance 101 may contact the credential manager 107 to securely extract credentials that are available for this accessor system 105 on the endpoint system 103. Only the names, nick names, or other identification information of the credential may be shown to the accessor system 105 as choices. If only one credential is available or based on accessor choice when multiple are available, full credential information may be transported securely from the credential manager 107 to the requested endpoint via the PAM appliance 101.
In one embodiment, at no point in transport of credentials would the accessor or accessor's machine have access to the full credential information either encrypted or otherwise. Once the transport is successfully completed to an endpoint, the endpoint client will securely inject the credential information for a successful login. By way of example, injection mechanisms can range from programmatic methods like Windows Credential Provider, proxy-based credential injection into protocol stream, to automatically enter keystrokes or otherwise copy credential information into password fields, etc. In one embodiment, credentials are transported over a TLS data stream and are protected by a single use private-public key pair valid for the duration of a single transfer. In one embodiment, establishment of this key-pair, encryption and decryption of credentials is handled at a last process in the execution chain just before handing off a clear text credential to an application or OS process and clear text credential exists for the shortest duration of time possible.
In one embodiment, credential information may be “rotated” after injection. In various embodiments, rotation of credential information includes modifying the credential information after it has been injected into an endpoint. According to various aspects of the present disclosure, rotating credential information further includes creating new usernames, new passwords, or a combination thereof, in order to further protect against security breaches. In some embodiments, rotating credentials includes re-associating preexisting usernames and passwords without the need to create new credentials. For example, a password corresponding to a particular username may be swapped with a new password after injection into an endpoint, or after a predetermined number of injections. In various embodiments, because users may not have access to password information, they are generally unaware that the rotation process has occurred. In particular embodiments, the PAM system facilitates the credential information rotation and, in response, the credential manager is updated. In other embodiments, the credential information is rotated by the protocol agent after completion of access by the accessor device. In certain embodiments, rotating credential information allows for increased integrity of the credential information as well as the endpoints being accessed.
In another approach, the accessor has access to two types of credentials for use: a non-privileged credential for login and a privileged credential (e.g., for use as Run As in Windows environments). Under this scenario or embodiment, an accessor will gain access to the endpoint using the non-privileged credential, for instance, via a process described previously. Once logged in and accessing the endpoint, via an access console, the accessor can chose a UI mechanism to run applications on the end point as a different user. The UI mechanism is either shown as part of the access console where the accessor chooses an application from a list or types a freeform command, or it is shown on the end point, through screen sharing, as part of selecting an application or command that should be run as a different user. Upon selection of the application or command, the PAM appliance 101 will contact the credential manager 107 on behalf of the accessor, securely retrieve credentials, and, if only one is available, transport it to endpoint for use to launch the selected application or command using the provided credential. If multiple privileged credentials are available, a list of names, nicknames, or other identifiers of the credentials are displayed to the accessor. In one embodiment, at no point in transport of the credentials would the accessor or accessor's machine have access to the full credential information either encrypted or otherwise. Windows specific mechanisms are outlined for illustrative purposes—similar mechanisms exist and are available for use on other operating systems and platforms. In one embodiment, accessors 105, administrators 113, and endpoints 103 can either be internal or external to the organization that owns PAM appliance 101. Credential selection and injection can be enforced in any combination of available credentials, location, method of use, grouping, privilege level, and approval. In one embodiment, an accessor can gain access to a credential only for a particular endpoint for a certain duration and only on a certain day and only when accessing from a desktop computer on the internal LAN of the organization, etc. As another embodiment, an accessor can access a credential for use on any endpoint but only at a certain time of day for certain duration and only for a certain application on the endpoint while not on the internal network but can use that credential for any application while on the internal network of the organization. These embodiments are provided by way of illustration and not limitation. Accordingly, it is contemplated that any temporal or other restriction or policy can be applied to control access to credentials.
In one embodiment, the credential manager 107 can store, retrieve, and manage credentials by itself or make use of a pre-existing credential handling entity. When using a pre-existing entity, the credential manager 107 can act as middleware to integrate with a single or a plurality of credential handling and management entities.
In one embodiment, the protocol agent 315 connects to the end point using Remote Desktop Protocol (RDP) and connects to the PAM appliance 101 using a proprietary protocol. In this embodiment, RDP access is restricted to the endpoints from the public internet, but since the protocol agent 315 can connect outbound to the appliance and can connect using RDP inbound to the endpoint on local LAN, the protocol agent 315 has effectively and securely bridged access between disparate networks and protocols. In other embodiments protocols like Virtual Network Computing (VNC), Secure Shell (SSH), Hypertext Transfer Protocol (HTTP), HTTPS, Open Database Connectivity (ODBC), and Intel® vPro™ are bridged. While accessing endpoint via a protocol agent 315, an accessor can request, select, and inject credentials. This selection and injection would follow a similar model as described above. In cases where endpoint credential injection directly at the endpoint is not feasible, the protocol agent 315 is used to affect credential injection. In this method full credential information does not traverse through the accessor machine. Similarly, in another embodiment, full credential information is not provided to the endpoint either. In such embodiments, the protocol agent 315 has access to the full credential for use on endpoint. In certain embodiments mechanisms such as Kerberos and NT LAN Manager (NTLM) are used to establish a session between an accessor's access console and an endpoint either directly or via the PAM appliance
In one embodiment, a plurality of accessors 305 can access the system at any given time. While the accessors 305 are in access sessions with endpoints 303 they can invite other accessors 305 into their session to provide guidance or help. Invited accessors 305 can select and inject credentials available to them on this endpoint 303 based on the selection criteria as defined by the administrator and enforced by the credential manager 307 and/or PAM appliance 101.
In certain embodiments, the PAM appliance 101, credential manager 307, and protocol agent 315 may comprise the same appliance.
In addition to the above described inter-router communication, the MRS can communicate with other modules within the application, including the appliance application, endpoint application, and the access console application, for example. These router instances provide the means for delivering the appropriate messages to destination modules within their respective applications.
In addition, the MRS 401a can communicate with other modules in a manner similar to that described above. By way of example, the MRSm 401a can communicate with the web interface 411, a message manager 401b, a message processor module 401c (includes chat, permission, logging, etc), a present/training 401d, a secure layer module 401f (e.g., SSL wrapper module), and a recorder module 401g. The web interface 411 can communicate with other application modules via the MRS 401a.
In an exemplary embodiment, the web interface 411 includes the following: (1) a network configuration web interface; (2) a User/Admin web interface which includes but not limited to user profile configuration, log reporting interface, and administrative user interface. According to one embodiment, the web interface provides functions for configuring the appliance 401 to be deployed and integrated into the network infrastructure of the installer. In one embodiment, all other interfaces can communicate through the MRSm 401a or to a storage module 401e directly.
For ensuring proper dispatching of system messages received at the MRSm 401a, a message manager 401b can be used in this exemplary embodiment. These messages can include such data as chat data, session system data logging, system message posting, and system message queries, etc.
The message processor module 401c receives system messages from MRSm 401a via the message manager module 401b. These messages can include such data as approval requests, notification requests, approval responses, session system data logging, system message posting, system message queries, permissions queries, and storage data retrievals, etc.
The viewer module 401d is configured to reduce the amount of screen update data transmitted from the client-side. In an exemplary embodiment, the viewer module 401d includes the following components (not shown): a viewer component, and one or more remote screen image servers. These servers collect RSI change updates and send them on to the RSI viewer via the MRSm 401a. The viewer component receives RSI update data from a client-side (remote-side in this case) server via the MRSm 401a and then sends the data off to the active servers to be transmitted to the appropriate destination. The main stream of RSI update data can be transmitted to the appropriate client via the MRSm 401a. Another stream of screen update data is transmitted to the recorder module 401g to be written into the storage module 401e.
The SSL module 401f ensures that the data transfer between the appliance 401 and the accessor and endpoint system (403 and 405) is encrypted, e.g., 256-bit AES SSL encryption over links 417 and 419.
In one embodiment, the remote access and control appliance 401 utilizes an operating system (OS) 401h that supports a variety of applications. For example, a web server application can run on top of the OS 401h to provide web hosting capabilities. The OS 401h can also support SSL. The SSL wrapper module 401f provides SSL over Transmission Control Protocol (TCP) or other network protocols.
As described, in one embodiment, the network appliance utilizes an OS 401h with a web server for providing web hosting capabilities. The routing and handling module (e.g., MRSm) 401a, which is a transport layer atop the OS 401h, provides various network facilities. Accordingly, MRSm 401a provides the generic means of transporting data from one system to another.
The MRSm 401a of the network appliance 401 can communicate with the endpoint application of endpoint system 405, and the accessor application of the accessor system 403 or another appliance.
Under this example, the accessor system 403 and endpoint system 405 include operating systems 403a, 405a; backend components 403b, 405b; and GUIs 403c, 405c. The backend components 403b of the accessor system 403 can include a MRSm 403d, a message manager module 403e, and a file transfer manager module 403f The module 403f interfaces with a storage module 403g, which is configured to store retrieved content stemming from the operation of the file transfer manager module 403f. The backend components 403b also include a RSI manager module 403h. Yet another module 403i (i.e., OS interface module), which is integral to the backend components 403b, provides communication interfaces to the OS 403a. As shown, the backend components 405b of the endpoint system 405 resemble that of the backend components 403b of the accessor system 403: a MRSm 405d, a message manager module 405e, and a file transfer manager module 405f, a storage module 405g, a RSI manager module 405h, an OS interface module 405i.
As for the GUI 403c, the accessor system 403 can provide a number of interfaces depending on the applications. For instance, the GUI 403c can include a chat interface 403j, a file transfer interface 403k, a queue interface 403l, and a viewer 403m. In this example, the endpoint system 405 utilizes a chat interface 405j and a viewer 405k. The GUI 403c can include other interfaces such as remote command shell, system diagnostics, and system information to name a few. The GUI 405c can include application specific chooser interface to only allow specific application viewing.
As explained with respect to the operation of the network appliance 401, the MRSm 403d is the medium for handling all messages coming to the accessor application 421 and all messages sent from the accessor application 421. The MRSm 403d communicates with the message manager 403e, a RSI manager 403h, and the file-transfer manager modules 403f The system messages, session data, and chat data are delivered to the message manager module 403e. The MRSm 403d sends, as well as receives, system/control messages and RSI update data to and from the RSI manager module 403h. The MRSm 403d interacts with the file-transfer manager 403f in sending and receiving system messages and file-transfer data.
The file-transfer manager 403f handles all remote-to-local and local-to-remote (i.e. between the accessor system and the endpoint system) reading and writing of files. The system messages and file-transfer data are received and sent through the MRSm 403d. Notably, the file-transfer interface module 403k on the GUI component 403c receives data from the MRSm 403d and sends all data directly to the MRSm 403d. Assuming the permissions to the endpoint file system access have been granted, the processes and steps involved in transferring a file from accessor storage 403g to the endpoint storage 405g include an initiation of a file transfer from the file-transfer GUI, a system command message sent to the MRSm 403d. MRSm 403d delivers the command to the file-transfer manager module 403f to execute on constructing the data to be sent to MRSm 405d of the endpoint system 405 via the MRSm 403d. A system notification message is delivered to the message manager 403e via MRSm 403d to be displayed in the chat GUI 403j after being delivered there by the message manager 403e. The processes and steps involved in transferring a file from the endpoint to the accessor include an initiation from the file-transfer GUI 405k, a system command message sent to the file-transfer manager 405f via the endpoint MRSm 405d. The file-transfer manager 405f constructs a proper remote file transfer request, which is then sent through the endpoint MRSm 405d to the accessor MRSm 403d through the MRSm 401a on the appliance. The accessor MRSm 403d receives the request command, delivering it to the remote file-transfer manager 403f, which in turn, receives the file system data requested to be transmitted back to the endpoint MRSm 405d by the accessor MRSm 403d through the MRSm 401a on the appliance. The accessor MRS 403d delivers the file system data received from the endpoint MRS 405d to the file-transfer manager 403f for processing and storing in the local file system storage 403g. Also, a system notification message as well as a file-transfer GUI refresh command is delivered to the file-transfer GUI 403k via the dispatcher 403e from the MRS 403d.
The RSI manager modules 403h and 405h, in one embodiment, includes the following components: a RSI updater, which “paints” the RSI viewer GUIs 403m and 405k with RSI screen update data; RSI server, which utilizes the OS communication interface modules 403i and 405i. The OS communication interface modules 403i and 405i interfaces with the OS system 403a and 405a for detecting and listening for screen and system updates, collecting these updates, and packaging and encoding these updates into data to be then sent to the viewing system via the respective MRSm's.
The RSI manager modules 403h and 405h can also provide the capability of reverse viewing. In this mode, the viewing of the remote system is reversed to being viewed by the remote system.
The network appliance 401 also permit support representatives to predict and lower the total cost of ownership (TCO) vis-à-vis the ASP model, in which the support representatives are typically charged a monthly fee. With the network appliance 401, representatives can predict their budget without monthly fees, surcharges or overages.
In step 501, the PAM appliance 101 receives an access request for an endpoint device 103 (e.g., web end point) by an accessor device 105. In some embodiments, the endpoint device 103 is one of a plurality of endpoint devices within a network (or on the Internet), and the PAM appliance 101 manages access rights to the plurality of endpoint devices within the network. In one embodiment, the PAM appliance 101 also manages network traffic among the plurality of endpoint devices, the accessor device 105, the credential manager 107, and other systems of the network (e.g., administrator device 113). In some embodiments, the access request may also be for privileged resources at the endpoint device 103 and not just only for access to the endpoint itself, but specific to the resource. Which may then proceed with the same process of providing access to the resource, thus the access is specific to the privileged resource of the endpoint 103 and not just the endpoint 103 in general.
In step 503, the PAM appliance 101 queries a credential manager 107 for credential information available for the accessor device 105 to access the endpoint device 103 based on an access policy assigned to the endpoint device 103. In one embodiment, the credential information may include non-privileged and privileged information, of which non-privileged information may be transmitted to the endpoint client for login of the accessor device 103 into the endpoint device 103.
In step 505, the PAM appliance 101 transmits the credential information to an endpoint client (e.g., an application or web client) of the endpoint device 103 to log the accessor device 105 into the endpoint device. In certain embodiments, the credential information is transmitted to the endpoint client 103 using a secure data stream and/or an encryption mechanism (e.g., use of encryption keys valid for the duration of a single transfer). In certain embodiments the endpoint client may log the accessor device 105 into the endpoint device 103 through an injection mechanism. The injection mechanism may include a programmatic method, a proxy-based credential injection into a protocol stream, an automatic keystroke entry, and/or a copying of the credential information into corresponding log-in fields.
In step 601, the PAM appliance 101 determines that a plurality of credentials are available for the accessor device 105 and/or user of the accessor device 105 as queried from the credential manager 107, in order to provide access to the endpoint device 103 by the accessor device 105. In one embodiment, the plurality of credentials are privileged credentials, where the privileged credentials are also not provided to the accessor device 105 or an accessor client (e.g., application or web client).
In step 603, the PAM appliance 101 then transmits the identification information of the plurality of credentials (as well as privileged credentials) to the accessor device 105 and/or user of the accessor device without transmitting the plurality of credentials in full. The accessor device 105 then selects the credential information to use for access to the endpoint device 103, by selecting from a list generated using the identification information to represent the plurality of credentials. In some embodiments, each of the plurality of credentials may have a specific identification information associated with it. The identification information for the credentials may include name, nickname, and/or other identifier for the credential.
As mentioned, the network appliance 101, in an exemplary embodiment, can be a 1U rack-mountable server hardware. However, it is contemplated that configurations other than those illustrated in
As earlier described, the network appliance 101, in an exemplary embodiment, can be a virtual appliance. Such software appliance can be run in a virtual environment. For instance, an image of the operating system and base software application can be installed on a virtual machine. Virtualization provides an abstraction layer that separates the operating system from the hardware, as to permit resource sharing. In this matter, different virtual machines (using heterogeneous operating systems) can co-exist on the same hardware platform.
The processes described herein may be implemented via software, hardware (e.g., general processor, Digital Signal Processing (DSP) chip, an Application Specific Integrated Circuit (ASIC), Field Programmable Gate Arrays (FPGAs), etc.), firmware or a combination thereof. Such exemplary hardware for performing the described functions is detailed below.
In various embodiments, the computer system 800 may be coupled via the bus 801 to a display 811, such as a cathode ray tube (CRT), liquid crystal display, active matrix display, or plasma display, for displaying information to a computer user. An input device 813, such as a keyboard including alphanumeric and other keys, in one embodiment, is coupled to the bus 801 for communicating information and command selections to the processor 803. Another type of user input device is a cursor control 815, such as a mouse, a trackball, or cursor direction keys, for communicating direction information and command selections to the processor 803 and for controlling cursor movement on the display 811.
According to an embodiment of the disclosure, the processes described herein are performed by the computer system 800, in response to the processor 803 executing an arrangement of instructions contained in main memory 805. Such instructions can be read into main memory 805 from another computer-readable medium, such as the storage device 809. Execution of the arrangement of instructions contained in main memory 805 causes the processor 803 to perform the process steps described herein. One or more processors in a multiprocessing arrangement may also be employed to execute the instructions contained in main memory 805. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement the embodiment of the disclosure. Thus, embodiments of the disclosure are not limited to any specific combination of hardware circuitry and software.
The computer system 800 also includes a communication interface 817 coupled to bus 801. The communication interface 817 generally provides a two-way data communication coupling to a network link 819 connected to a local network 821. For example, the communication interface 817 may be a digital subscriber line (DSL) card or modem, an integrated services digital network (ISDN) card, a cable modem, a telephone modem, or any other communication interface to provide a data communication connection to a corresponding type of communication line. As another example, communication interface 817 may be a local area network (LAN) card (e.g. for Ethernet™ or an Asynchronous Transfer Model (ATM) network) to provide a data communication connection to a compatible LAN. Wireless links can also be implemented. In any such implementation, communication interface 817 sends and receives electrical, electromagnetic, or optical signals that carry digital data streams representing various types of information. Further, the communication interface 817 can include peripheral interface devices, such as a Universal Serial Bus (USB) interface, a PCMCIA (Personal Computer Memory Card International Association) interface, etc. Although a single communication interface 817 is depicted in
The network link 819 typically provides data communication through one or more networks to other data devices. For example, the network link 819 may provide a connection through local network 821 to a host computer 823, which has connectivity to a network 825 (e.g. a wide area network (WAN) or the global packet data communication network now commonly referred to as the “Internet”) or to data equipment operated by a service provider. The local network 821 and the network 825 both use electrical, electromagnetic, or optical signals to convey information and instructions. The signals through the various networks and the signals on the network link 819 and through the communication interface 817, which communicate digital data with the computer system 800, are exemplary forms of carrier waves bearing the information and instructions.
The computer system 800 can send messages and receive data, including program code, through the network(s), the network link 819, and the communication interface 817. In the Internet example, a server (not shown) might transmit requested code belonging to an application program for implementing an embodiment of the invention through the network 825, the local network 821 and the communication interface 817. The processor 803 may execute the transmitted code while being received and/or store the code in the storage device 809, or other non-volatile storage for later execution. In this manner, the computer system 800 may obtain application code in the form of a carrier wave.
The term “computer-readable medium” as used herein refers to any medium that participates in providing instructions to the processor 803 for execution. Such a medium may take many forms, including but not limited to non-volatile media, volatile media, and transmission media. Non-volatile media include, for example, optical or magnetic disks, such as the storage device 809. Volatile media include dynamic memory, such as main memory 805. Transmission media include coaxial cables, copper wire and fiber optics, including the wires that comprise the bus 801. Transmission media can also take the form of acoustic, optical, or electromagnetic waves, such as those generated during radio frequency (RF) and infrared (IR) data communications. Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, any other magnetic medium, a CD-ROM, CDRW, DVD, any other optical medium, punch cards, paper tape, optical mark sheets, any other physical medium with patterns of holes or other optically recognizable indicia, a RAM, a PROM, and EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave, or any other medium from which a computer can read.
Various forms of computer-readable media may be involved in providing instructions to a processor for execution. For example, the instructions for carrying out at least part of the embodiments of the invention may initially be borne on a magnetic disk of a remote computer. In such a scenario, the remote computer loads the instructions into main memory and sends the instructions over a telephone line using a modem. A modem of a local computer system receives the data on the telephone line and uses an infrared transmitter to convert the data to an infrared signal and transmit the infrared signal to a portable computing device, such as a personal digital assistant (PDA) or a laptop. An infrared detector on the portable computing device receives the information and instructions borne by the infrared signal and places the data on a bus. The bus conveys the data to main memory, from which a processor retrieves and executes the instructions. The instructions received by main memory can optionally be stored on storage device either before or after execution by processor.
In one embodiment, the chip set 900 includes a communication mechanism such as a bus 901 for passing information among the components of the chip set 900. A processor 903 has connectivity to the bus 901 to execute instructions and process information stored in, for example, a memory 905. The processor 903 may include one or more processing cores with each core configured to perform independently. A multi-core processor enables multiprocessing within a single physical package. Examples of a multi-core processor include two, four, eight, or greater numbers of processing cores. Alternatively or in addition, the processor 903 may include one or more microprocessors configured in tandem via the bus 901 to enable independent execution of instructions, pipelining, and multithreading. The processor 903 may also be accompanied with one or more specialized components to perform certain processing functions and tasks such as one or more digital signal processors (DSP) 907, or one or more application-specific integrated circuits (ASIC) 909. A DSP 907 typically is configured to process real-world signals (e.g., sound) in real time independently of the processor 903. Similarly, an ASIC 909 can be configured to performed specialized functions not easily performed by a general purposed processor. Other specialized components to aid in performing the inventive functions described herein include one or more field programmable gate arrays (FPGA) (not shown), one or more controllers (not shown), or one or more other special-purpose computer chips.
The processor 903 and accompanying components have connectivity to the memory 905 via the bus 901. The memory 905 includes both dynamic memory (e.g., RAM, magnetic disk, writable optical disk, etc.) and static memory (e.g., ROM, CD-ROM, etc.) for storing executable instructions that when executed perform the inventive steps described herein to presenting a slideshow via a set-top box. The memory 905 also stores the data associated with or generated by the execution of the inventive steps.
While the invention has been described in connection with a number of embodiments and implementations, the invention is not so limited but covers various obvious modifications and equivalent arrangements, which fall within the purview of the appended claims.
This application is a continuation application of U.S. Non-Provisional patent application Ser. No. 15/634,317, filed on Jun. 27, 2017, and entitled “SYSTEMS, METHODS, AND APPARATUSES FOR CREDENTIAL HANDLING,” which is a continuation-in-part application of U.S. Non-Provisional application Ser. No. 15/133,641, filed on Apr. 20, 2016, and entitled “METHOD AND APPARATUS FOR CREDENTIAL HANDLING,” which claims the benefit of and priority to the earlier filing date under 35 U.S.C. § 119(e) of U.S. Provisional Application Ser. No. 62/150,051, filed on Apr. 20, 2015, and entitled “METHOD AND APPARATUS FOR CREDENTIAL HANDLING,” and also claims the benefit of and priority to the earlier filing date under 35 U.S.C. § 119(e) of U.S. Provisional Application Ser. No. 62/355,083, filed on Jun. 27, 2016, and entitled “SYSTEMS, METHODS, AND APPARATUSES FOR CREDENTIAL HANDLING,” the entireties of which are herein incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
5719786 | Nelson | Feb 1998 | A |
6123737 | Sadowsky | Sep 2000 | A |
6327579 | Crawford | Dec 2001 | B1 |
6353446 | Vaughn et al. | Mar 2002 | B1 |
6466654 | Cooper et al. | Oct 2002 | B1 |
7117529 | Odonnell | Oct 2006 | B1 |
7240102 | Kouznetsov et al. | Jul 2007 | B1 |
7346922 | Miliefsky | Mar 2008 | B2 |
7373553 | Trip et al. | May 2008 | B2 |
7376538 | Eatough | May 2008 | B1 |
7539627 | Schmidt | May 2009 | B2 |
7539733 | Mohammed et al. | May 2009 | B2 |
7565700 | Bellwood et al. | Jul 2009 | B2 |
7587588 | Clemmons et al. | Sep 2009 | B2 |
7680944 | Taghizadeh | Mar 2010 | B1 |
7908401 | Chang | Mar 2011 | B2 |
7941848 | Yadav et al. | May 2011 | B2 |
7958247 | Abu-Samaha | Jun 2011 | B2 |
8024399 | Reisman | Sep 2011 | B2 |
8112513 | Margulis | Feb 2012 | B2 |
8156205 | Forsberg | Apr 2012 | B1 |
8166310 | Harrison et al. | Apr 2012 | B2 |
8321540 | Webb-Johnson | Nov 2012 | B2 |
8335831 | Fan | Dec 2012 | B2 |
8434129 | Kannappan | Apr 2013 | B2 |
8527774 | Fallows | Sep 2013 | B2 |
8850516 | Hrebicek | Sep 2014 | B1 |
8880616 | Schuelke | Nov 2014 | B2 |
8924459 | Gagne et al. | Dec 2014 | B2 |
8966075 | Chickering et al. | Feb 2015 | B1 |
9055055 | Strand | Jun 2015 | B1 |
9178773 | Tassone | Nov 2015 | B1 |
9246979 | Bomgaars | Jan 2016 | B2 |
9305182 | Berls | Apr 2016 | B1 |
9712514 | Brieman | Jul 2017 | B2 |
9754303 | Jagtap | Sep 2017 | B1 |
20010036176 | Girard | Nov 2001 | A1 |
20010051890 | Burgess | Dec 2001 | A1 |
20020075844 | Hagen | Jun 2002 | A1 |
20020091819 | Melchione | Jul 2002 | A1 |
20020120749 | Widegren et al. | Aug 2002 | A1 |
20020161895 | Appian et al. | Oct 2002 | A1 |
20020169783 | Kreulen et al. | Nov 2002 | A1 |
20030004791 | Kojima | Jan 2003 | A1 |
20030008265 | Helmick et al. | Jan 2003 | A1 |
20030009754 | Rowley | Jan 2003 | A1 |
20030018704 | Polychronidis | Jan 2003 | A1 |
20030023476 | Gainey | Jan 2003 | A1 |
20030033308 | Patel | Feb 2003 | A1 |
20030065731 | Mohammad | Apr 2003 | A1 |
20030065738 | Yang | Apr 2003 | A1 |
20030084010 | Bigus | May 2003 | A1 |
20030093530 | Syed | May 2003 | A1 |
20030093692 | Porras | May 2003 | A1 |
20030120135 | Gopinathan et al. | Jun 2003 | A1 |
20030120557 | Evans | Jun 2003 | A1 |
20030131084 | Pizzorni | Jul 2003 | A1 |
20030149740 | Wookey | Aug 2003 | A1 |
20030225905 | Scifres et al. | Dec 2003 | A1 |
20030233432 | Davis et al. | Dec 2003 | A1 |
20040001514 | Wookey et al. | Jan 2004 | A1 |
20040003073 | Krzyzanowski et al. | Jan 2004 | A1 |
20040153712 | Owhadi et al. | Aug 2004 | A1 |
20040173059 | Klein | Sep 2004 | A1 |
20040249975 | Tuck et al. | Dec 2004 | A1 |
20050038827 | Hooks | Feb 2005 | A1 |
20050050319 | Suraski | Mar 2005 | A1 |
20050080897 | Braun et al. | Apr 2005 | A1 |
20050132030 | Hopen | Jun 2005 | A1 |
20050177869 | Savage | Aug 2005 | A1 |
20050190769 | Smith | Sep 2005 | A1 |
20050234824 | Gill | Oct 2005 | A1 |
20050289226 | Mohammed et al. | Dec 2005 | A1 |
20060010485 | Gorman | Jan 2006 | A1 |
20060017551 | Neher | Jan 2006 | A1 |
20060031537 | Boutboul | Feb 2006 | A1 |
20060047927 | King et al. | Mar 2006 | A1 |
20060053447 | Krzyzanowski et al. | Mar 2006 | A1 |
20060064582 | Teal | Mar 2006 | A1 |
20060072721 | Wisniewski | Apr 2006 | A1 |
20060159243 | Mangione et al. | Jul 2006 | A1 |
20060248522 | Lakshminarayanan | Nov 2006 | A1 |
20060271968 | Zellner | Nov 2006 | A1 |
20060277287 | McCall et al. | Dec 2006 | A1 |
20070021138 | Allen et al. | Jan 2007 | A1 |
20070033265 | Anderson et al. | Feb 2007 | A1 |
20070044034 | Nieves | Feb 2007 | A1 |
20070047459 | Kadaba | Mar 2007 | A1 |
20070054686 | Allen | Mar 2007 | A1 |
20070067098 | Zelentsov | Mar 2007 | A1 |
20070130457 | Kamat et al. | Jun 2007 | A1 |
20070143824 | Shahbazi | Jun 2007 | A1 |
20070176787 | Iten et al. | Aug 2007 | A1 |
20070180501 | Yadav et al. | Aug 2007 | A1 |
20070218875 | Calhoun et al. | Sep 2007 | A1 |
20070239884 | Karmakar | Oct 2007 | A1 |
20070253418 | Shirt et al. | Nov 2007 | A1 |
20070255604 | Seelig | Nov 2007 | A1 |
20070260673 | Shenfiled | Nov 2007 | A1 |
20070268837 | Melton | Nov 2007 | A1 |
20070294368 | Bomgaars | Dec 2007 | A1 |
20070299953 | Walker | Dec 2007 | A1 |
20070300291 | Bomgaars | Dec 2007 | A1 |
20080010480 | Hurley et al. | Jan 2008 | A1 |
20080034060 | Fisher | Feb 2008 | A1 |
20080040441 | Maes | Feb 2008 | A1 |
20080065236 | Bristol | Mar 2008 | A1 |
20080091454 | Fisher | Apr 2008 | A1 |
20080172574 | Fisher | Jul 2008 | A1 |
20080184241 | Headrick et al. | Jul 2008 | A1 |
20080244705 | Cromer | Oct 2008 | A1 |
20090007217 | Birger | Jan 2009 | A1 |
20090019367 | Cavagnari | Jan 2009 | A1 |
20090052675 | Levow et al. | Feb 2009 | A1 |
20090077184 | Brewer et al. | Mar 2009 | A1 |
20090164554 | Wei | Jun 2009 | A1 |
20090187651 | Schuckenbrock et al. | Jul 2009 | A1 |
20090199276 | Schneider | Aug 2009 | A1 |
20090201303 | Westerhoff | Aug 2009 | A1 |
20090248794 | Helms | Oct 2009 | A1 |
20090271472 | Scheifler et al. | Oct 2009 | A1 |
20090299793 | Guzel | Dec 2009 | A1 |
20100071043 | Babula et al. | Mar 2010 | A1 |
20100138270 | Werth | Jun 2010 | A1 |
20100154009 | Del Sordo | Jun 2010 | A1 |
20100169497 | Klimentiev | Jul 2010 | A1 |
20100192020 | Van Riel | Jul 2010 | A1 |
20100192146 | Stay | Jul 2010 | A1 |
20100257596 | Ngo et al. | Oct 2010 | A1 |
20100281519 | Das et al. | Nov 2010 | A1 |
20110099604 | Zhou | Apr 2011 | A1 |
20110107406 | Frost et al. | May 2011 | A1 |
20110154231 | Cherdon | Jun 2011 | A1 |
20110191799 | Raza | Aug 2011 | A1 |
20110273294 | Harwell | Nov 2011 | A1 |
20110276683 | Goldschlag | Nov 2011 | A1 |
20110277027 | Hayton | Nov 2011 | A1 |
20110302629 | Whitson et al. | Dec 2011 | A1 |
20120005746 | Wei et al. | Jan 2012 | A1 |
20120117212 | Fries | May 2012 | A1 |
20120147894 | Mulligan | Jun 2012 | A1 |
20120265976 | Spiers et al. | Oct 2012 | A1 |
20120311564 | Khalid | Dec 2012 | A1 |
20120331524 | Mower et al. | Dec 2012 | A1 |
20130081112 | Kelly | Mar 2013 | A1 |
20130114610 | Polcyn | May 2013 | A1 |
20140013409 | Halageri | Jan 2014 | A1 |
20140172783 | Suzuki | Jun 2014 | A1 |
20140173594 | Ng et al. | Jun 2014 | A1 |
20140188676 | Marmolejo-Meillon | Jul 2014 | A1 |
20140337834 | Adogla | Nov 2014 | A1 |
20150020164 | Tankov | Jan 2015 | A1 |
20150067171 | Yum | Mar 2015 | A1 |
20150089620 | Manza | Mar 2015 | A1 |
20150200821 | Sade | Jul 2015 | A1 |
20150227926 | Grigg | Aug 2015 | A1 |
20150264035 | Waterhouse | Sep 2015 | A1 |
20150304292 | Dulkin | Oct 2015 | A1 |
20150350019 | Terayama | Dec 2015 | A1 |
20150381593 | Low | Dec 2015 | A1 |
20160234198 | Breiman | Aug 2016 | A1 |
20160286003 | Pessis | Sep 2016 | A1 |
20160299790 | Wagner | Oct 2016 | A1 |
20160301675 | Wiles | Oct 2016 | A1 |
20160308876 | Smith, III | Oct 2016 | A1 |
20160308906 | Hasson | Oct 2016 | A1 |
20170300687 | Cherukuri | Oct 2017 | A1 |
20180248916 | Hasson | Aug 2018 | A1 |
Number | Date | Country |
---|---|---|
2005032892 | Apr 2005 | WO |
Number | Date | Country | |
---|---|---|---|
20190205524 A1 | Jul 2019 | US |
Number | Date | Country | |
---|---|---|---|
62355083 | Jun 2016 | US | |
62150051 | Apr 2015 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15634317 | Jun 2017 | US |
Child | 16292880 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15133641 | Apr 2016 | US |
Child | 15634317 | US |