Step-up authentication for single sign-on

    公开(公告)号:US10171241B2

    公开(公告)日:2019-01-01

    申请号:US15430748

    申请日:2017-02-13

    Applicant: VMware, Inc.

    Abstract: A method for authenticating a user seeking access to first and second resources that have different authentication levels. The method includes receiving a primary token that is associated with a first authentication event of the user and authenticates the user to access the first resource, and receiving a first request to access the second resource. The method further includes receiving first credentials of the user. The method further includes, responsive to validating the first credentials, generating a second authentication event, associating the second authentication event with the primary token, and issuing a first secondary token that authenticates the user to access the second resource.

    Dynamic registration of an application with an enterprise system

    公开(公告)号:US09723058B2

    公开(公告)日:2017-08-01

    申请号:US13914366

    申请日:2013-06-10

    Applicant: VMware, Inc.

    Inventor: Emily Hong Xu

    CPC classification number: H04L67/10 G06F21/335 G06F21/45

    Abstract: A computer-implemented method for automatically registering an application with an enterprise system. The method includes, obtaining the application associated with the enterprise system, wherein the application is pre-configured for subsequent registration with the enterprise system such that the registration establishes a trust relationship between the application and the enterprise system. The method further includes installing the application on a host device, and in conjunction with installing the application, automatically requesting the registration of the application with the enterprise system.

    Dynamic registration of an application with an enterprise system

    公开(公告)号:US10484462B2

    公开(公告)日:2019-11-19

    申请号:US16056945

    申请日:2018-08-07

    Applicant: VMware, Inc.

    Inventor: Emily Hong Xu

    Abstract: A computer-implemented method for automatically registering an application with an enterprise system is disclosed. The method accesses an application utilizable with the enterprise system. Generates an application access template for the application, including: generating information specific to the application that is able to be utilized with the enterprise system, and generating parameters specific to the application that is able to be utilized with the enterprise system. The method defines, in the application access template, a basic authorization protocol information; and utilizes the application access template for a subsequent dynamic registration of the application with the enterprise system.

    HARDWARE CAPACITY MANAGEMENT IN A MULTI-CLOUD COMPUTING SYSTEM

    公开(公告)号:US20240412158A1

    公开(公告)日:2024-12-12

    申请号:US18330153

    申请日:2023-06-06

    Applicant: VMware, Inc.

    Abstract: An example method of managing hardware capacity in a multi-cloud computing system includes: obtaining, by a hardware inventory service executing in the multi-cloud computing system, hardware information for physical servers, in a public cloud, for which a customer has a subscription entitling bare-metal management of the physical servers; maintaining, by the hardware inventory service, an inventory of hardware capacity comprising a physical server pool that includes the physical servers; receiving, at the hardware inventory service, a request to consume the hardware capacity; and providing, by the hardware inventory service, a response to the request that identifies the physical server pool for deploying software to execute therein.

    Mechanism of passing security tokens through both untrusted and validating intermediaries

    公开(公告)号:US10735400B2

    公开(公告)日:2020-08-04

    申请号:US15895844

    申请日:2018-02-13

    Applicant: VMware, Inc.

    Abstract: Disclosed is a system and technique for validating a user for a single sign on without exposing secure information about the user to any part of the system except the connection server and the identity provider. In the technique, instead of relying directly on a SAML assertion, the technique uses an artifact representing the assertion and wraps the artifact in an access token. The access token is able to carry the artifact through one or more gateways on its way to a connection server without revealing any security information. Upon the access token being verified by either the gateway or the connection server, the artifact can be extracted from the access token and verification of the user for the single sign on can proceed between only the connection server and the identity provider.

Patent Agency Ranking