Abstract:
Disclosed are various approaches for implementing an application authentication wrapper. An authentication request, such as a Kerberos request, is created for authenticating the computing device. The authentication request is encrypted to generate an encrypted authentication request. The encrypted authentication request is then forwarded to a reverse proxy server. An encrypted authentication response is received from the reverse proxy server. The encrypted authentication response, such as a Kerberos response, is then decrypted to generate a corresponding authentication response, which is then forwarded to the computing device that generated the authentication request.
Abstract:
Systems herein include thin clients that operate with managed profile-based virtual machines. This can allow users to utilize personal user devices in an enterprise environment without subjecting sensitive enterprise credentials to the user device. A management server can determine a profile associated with the user device. Based on the profile, a virtual machine can be instantiated at a thin server, remotely from the thin client. The profile-specific virtual machine can include a particular guest operating system, guest applications, security features, or functionality. The instance of the virtual machine can communicate graphics information from a guest application to the thin client, and the thin client can communicate user interface events to the instance for controlling the guest application.
Abstract:
A method is disclosed for providing physical access credentials to a client device. The method may include receiving a request for a physical access credential, where the first request includes at least one user access credential and at least one physical access point identifier. The method may also include determining whether the request should be granted based at least in part on the at least one user access credential. The method may further include, in response to determining that the request should be granted, sending the physical access credential associated with the physical access point.
Abstract:
A method is disclosed for providing physical access credentials to a client device. The method may include receiving a request for a physical access credential, where the first request includes at least one user access credential and at least one physical access point identifier. The method may also include determining whether the request should be granted based at least in part on the at least one user access credential. The method may further include, in response to determining that the request should be granted, sending the physical access credential associated with the physical access point.
Abstract:
Disclosed are various examples for facilitating network speed testing on behalf of a client device that is associated with an enterprise. In a client device that can be a managed device managed by a management service, a network testing profile can be obtained which specifies a testing schedule as well as a network testing endpoint with which network testing can be conducted. Results of the network speed test can be transmitted to the management service, which can determine if the network speed implicates a compliance rule associated with the client device or an enterprise with which the client device is associated.
Abstract:
Advanced multi-factor authentication is disclosed. Data describing a change in a spatial position of a computing device from a first point in time to a second point in time may be captured. Data describing a change in a spatial position of an object within a field of view of the computing device from the first point in time to the second point in time may further be captured. Access to at least one resource may be authorized when the data describing the change in the spatial position of the object within the field of view of the computing device from the first point in time to the second point in time is expected based at least in part on the data describing the change in the spatial position of the computing device from the first point in time to the second point in time.
Abstract:
Disclosed are various embodiments for facilitating the encryption of files as well as facilitating requiring a user to employ an authenticator device in order to access a file that is encrypted or otherwise secured. The authenticator device can provide an authenticator code in which a security key used to access a secured file can be embedded. An additional layer of encryption can also be applied in the authenticator code.
Abstract:
Disclosed are various embodiments for restricting usage of a mobile device when a user is driving a vehicle. In one embodiment, it is determined that a mobile device is in use by a driver of an active vehicle. A functionality of the mobile device is then restricted based at least in part on determining that the mobile device is in use by the driver of the active vehicle. For example, a touch screen of the mobile device may be disabled, and the use of a hands-free interface may be made mandatory.
Abstract:
Disclosed are various embodiments for restricting usage of a mobile device when a user is driving a vehicle. In one embodiment, it is determined that a mobile device is in use by a driver of an active vehicle. A functionality of the mobile device is then restricted based at least in part on determining that the mobile device is in use by the driver of the active vehicle. For example, a touch screen of the mobile device may be disabled, and the use of a hands-free interface may be made mandatory.
Abstract:
Disclosed are various examples for facilitating network speed testing on behalf of a client device that is associated with an enterprise. In a client device that can be a managed device managed by a management service, a network testing profile can be obtained which specifies a testing schedule as well as a network testing endpoint with which network testing can be conducted. Results of the network speed test can be transmitted to the management service, which can determine if the network speed implicates a compliance rule associated with the client device or an enterprise with which the client device is associated.