Abstract:
Methods and systems for routing a user request for a service to a version of the service in a geographical region associated with the user are described herein. The service may be deployed in multiple geographical regions, and the service may have multiple versions in each of the geographical regions. A user device may send a request for a service to a first server in a geographical region. The first server may determine whether the user is associated with the geographical region. Responsive to determining that the user is not associated with the geographical region, the first server may ask one or more servers in other geographical regions whether the user is associated with any of the other geographical regions.
Abstract:
Methods and systems for secure authentication of users based on unique device identifiers are described herein. A computing device may receive, from a user device, a device registration. The device registration may comprise authentication credentials, device information, and/or a public key. Based on the authentication credentials and/or the device information, a unique device identifier may be generated. A token may be generated based on the unique device identifier and sent to the user device. A request for content may be received from the user device. A nonce may be sent to the user device. The token and a signed version of the nonce may be received from the user device. The nonce may have been signed using a private key corresponding to the public key. Access to the content may be provided based on the token, the unique device identifier, and/or the signed version of the nonce.
Abstract:
Methods and systems for routing a user request for a service to a version of the service in a geographical region associated with the user are described herein. The service may be deployed in multiple geographical regions, and the service may have multiple versions in each of the geographical regions. A user device may send a request for a service to a first server in a geographical region. The first server may determine whether the user is associated with the geographical region. Responsive to determining that the user is not associated with the geographical region, the first server may ask one or more servers in other geographical regions whether the user is associated with any of the other geographical regions.
Abstract:
Aspects of the disclosure relate to extending single-sign-on to relying parties for federated logon providers. An enterprise identity provider server may receive a first authentication token previously issued to an enterprise server by the enterprise identity provider server. Subsequently, the enterprise identity provider server may retrieve, from a token store, a second authentication token associated with a federated identity service provided by a federated identity provider server. The enterprise identity provider server may refresh the second authentication token with the federated identity service provided by the federated identity provider server to obtain a refreshed authentication token. Finally, the enterprise identity provider server may send the refreshed authentication token to the enterprise server, which may enable user devices managed by the enterprise server to access one or more resources provided by a third party system using the federated identity service.
Abstract:
Methods and systems for performing multi-geographical processing of user requests are described herein. An order service computing device may receive a user request associated with a user and, based on the user request, may generate a user account associated with the user. The order service computing device may establish the user account at a geographic computing platform which may provide access to one or more computing resources and/or services. The order service computing device may receive one or more access requests corresponding to one or more computing resources and/or services associated with the geographic computing platform and/or other geographic computing platforms. The order service computing device may generate identifiers based on the one or more access requests which identify the one or more computing resources and/or services.
Abstract:
One or more aspects of this disclosure may relate to using a configurable server farm preference for an application, desktop or other hosted resource. Additional aspects may relate to moving server farm workloads based on the configurable server farm preference. Further aspects may relate to performing reboot cycles, a reboot schedule and on-demand rebooting. Yet further aspects may relate to staggering individual machine reboot operations over a specified period of time and performing reboot operations such that some machines are available for user sessions during a reboot cycle.
Abstract:
Methods and systems for centralizing disparate authentication servers using scopes are described herein. A computing device may receive, from a client device, a first access request comprising authentication credentials and first scope data. The computing device may then send, to at least one first authentication server associated with the at least one first resource server, a first token request. The computing device may then receive a first token and provide that token to the client device. The computing device may then receive, from the client device, a second access request comprising second scope data. The computing device may send, to at least one second authentication server associated with the at least one second resource server, a second token request. The computing device may then receive a second token and provide that token to the client device.
Abstract:
A method of providing access to digital resources using multiple user identities comprises receiving, from a client application, a first set of authentication tokens that authorize a user to acquire target data provided by a server application. The method further comprises receiving, from the client application, a second set of authentication tokens that authorize the same user to access a connected application. The method further comprises sending, to the server application, a first request to acquire the target data provided by the server application, the first request including the first set of authentication tokens and an identifier of the target data. The method further comprises receiving, from the server application, the target data. The method further comprises sending the target data from the application connector to the connected application in a second request that also includes the second set of authentication tokens.
Abstract:
Methods and systems for authentication using multiple identity providers are described herein. A first identity provider may receive, e.g., from a second identity provider, an indication of an authentication request. The first identity provider may retrieve, from a storage device, session information associated with the request. The first identity provider may authenticate, using one or more first functions, based on the session information, and based on authentication credentials received from a user, the user. Based on the authentication, the first identity provider may modify the session information. The second identity provider may authenticate, based on the session information and using one or more second functions, the user. The one or more second functions may comprise providing the user a token based on the session information. The session information may be subsequently deleted.
Abstract:
A computer system includes client devices operated by users collaborating on a project, and a collaboration server. Each client device remotely accesses web applications via a managed browser to be used by the users collaborating on the project. The collaboration server cooperates with the managed browsers to receive from the managed browsers data corresponding to actions performed by each user within the web applications, generate notifications based on the actions performed by the users within the web applications, and cause the managed browsers to display the notifications. The notifications are generated independent from the web applications.