Abstract:
A virtual directory server (VDS) provided according to an aspect of the present disclosure maintains attribute data identifying a corresponding set of stored attributes associated with each data source, with each data source storing values for associated set of stored attributes. Upon receiving a first request based on query attributes, the VDS identifies a set of data sources based on the stored attribute data, with each data source storing values for at least one of the query attributes. The VDS then forms constituent requests, with each constituent request having a corresponding pruned filter suitable for the respective data source. The constituent requests are sent to the respective data sources. The VDS forms a final response from the constituent responses received from the corresponding data sources by joining the constituent entries, and sends the final response to a client system from which the first request is received.
Abstract:
A virtual directory server (VDS) provided according to an aspect of the present disclosure maintains attribute data identifying a corresponding set of stored attributes associated with each data source, with each data source storing values for associated set of stored attributes. Upon receiving a first request based on query attributes, the VDS identifies a set of data sources based on the stored attribute data, with each data source storing values for at least one of the query attributes. The VDS then forms constituent requests, with each constituent request having a corresponding pruned filter suitable for the respective data source. The constituent requests are sent to the respective data sources. The VDS forms a final response from the constituent responses received from the corresponding data sources by joining the constituent entries, and sends the final response to a client system from which the first request is received.
Abstract:
Methods, devices, and systems are described for enrolling a user's bring-your-own-device for secure connection to a company's enterprise computer network. From her mobile device, user clicks on a uniform resource locator (URL) to connect with the login web page on the enterprise network. After authentication, checks are performed to verify that the user has authorization to enroll the type of electronic device, and the profile is installed on the device. A notification is sent to the device by a server on the enterprise network, and a secure workspace application is pushed to the device along with configuration data that automatically links the workspace with the parent device enrollment. Once the user launches the secure workspace application the workspace access configuration data and initializes enrollment with the enterprise network, resulting in a linking of the secure workspace application with its parent device enrollment. The workspace is registered as a child of the parent device, and the lifecycle of the workspace is thus linked to that of the parent.
Abstract:
Methods, devices, and systems are described for enrolling a user's bring-your-own-device for secure connection to a company's enterprise computer network. From her mobile device, user clicks on a uniform resource locator (URL) to connect with the login web page on the enterprise network. After authentication, checks are performed to verify that the user has authorization to enroll the type of electronic device, and the profile is installed on the device. A notification is sent to the device by a server on the enterprise network, and a secure workspace application is pushed to the device along with configuration data that automatically links the workspace with the parent device enrollment. Once the user launches the secure workspace application the workspace access configuration data and initializes enrollment with the enterprise network, resulting in a linking of the secure workspace application with its parent device enrollment. The workspace is registered as a child of the parent device, and the lifecycle of the workspace is thus linked to that of the parent.