G06F21/41

REMAPPING OF UNIFORM RESOURCE LOCATORS FOR ACCESSING NETWORK APPLICATIONS

Described embodiments provide systems, methods, non-transitory computer-readable medium for using a single sign-on (SSO) to access an application. A client application on a client device in communication with an identity provider and an application on a remote computing device. The client application can authenticate a user via an identity provider to establish an authentication session. The client application can identify a request to access a uniform resource locator (URL) of the application hosted on the remote computing device. The client application can determine that a configuration of the client application identifies a remapped URL for the URL is available. The client application can access the remapped URL instead of the URL to cause the user to use the authentication session of the identity provider and be redirected from the identity provider to a link of the application on the remote computing device.

CRYPTOGRAPHIC BINDING OF NATIVE APPLICATION AND EXTERNAL BROWSER SESSIONS

Systems and methods are provided for receiving information associated with a final single sign-on page from a native browser, extracting a public key from the information associated with the final single sign-on page, generating a single sign-on token to bind a browser session and a native application session, associating the single sign-on token with the public key extracted from the information associated with the final single sign-on page, and encrypting the single sign-on token with the public key to bind the browser session and the native application session.

AGGREGATION OF USER AUTHORIZATIONS FROM DIFFERENT PROVIDERS IN A HYBRID CLOUD ENVIRONMENT
20230015789 · 2023-01-19 ·

An example method of aggregating authorization information for a user accessing a service executing in a virtualized computing system includes: receiving, at an authorities aggregating service (AAS) executing in the virtualized computing system, a request for an authorization context for the user from the service; requesting, by the AAS, authorization information from at least one authorization source registered with the AAS for the user; generating the authorization context by aggregating the authorization information; and returning the authorization context to the service.

SYSTEM AND METHOD FOR AUTO-PROVISIONING AI-BASED DIALOG SERVICE

A method of auto-provisioning AI-based dialog services for a plurality of target applications includes storing a plurality of dialog templates, generating a deployment object associating one or more of the dialog templates with a target application from among the plurality of target applications, extracting textual data from the target application, assembling the extracted textual data into inquiries or inquiry responses according to the one or more dialog templates associated with the deployment object, and deploying an AI-based dialog service to the target application based on the assembled inquiries or inquiry responses. Each of the dialog templates may include one or more sets of common inquiries or common inquiry responses.

SYSTEM AND METHOD FOR AUTO-PROVISIONING AI-BASED DIALOG SERVICE

A method of auto-provisioning AI-based dialog services for a plurality of target applications includes storing a plurality of dialog templates, generating a deployment object associating one or more of the dialog templates with a target application from among the plurality of target applications, extracting textual data from the target application, assembling the extracted textual data into inquiries or inquiry responses according to the one or more dialog templates associated with the deployment object, and deploying an AI-based dialog service to the target application based on the assembled inquiries or inquiry responses. Each of the dialog templates may include one or more sets of common inquiries or common inquiry responses.

User interfaces for managing user account passwords

In some embodiments, an electronic device presents a weak password warning in a password management user interface that includes information about the user account with which the password is associated. In some embodiments, an electronic device presents a weak password warning in a login user interface.

User interfaces for managing user account passwords

In some embodiments, an electronic device presents a weak password warning in a password management user interface that includes information about the user account with which the password is associated. In some embodiments, an electronic device presents a weak password warning in a login user interface.

Unified Workspace for Thin, Remote, and SAAS Applications

Application-manager software authenticates a user of a client device over a channel. The authentication operation is performed using a directory service. The application-manager software presents a plurality of applications in a GUI displayed by the client device. The plurality of applications depends on the authentication, the client device, and the channel. And the plurality of applications includes a thin application and a software-as-a-service (SaaS) application. The application-manager software receives a selection as to an application from the user. If the selection is for the SaaS application, the application-manager software provisions the SaaS application. The provision includes automatically logging the user onto an account with a provider of the SaaS application using a single sign-on and connecting the user to the account so that the user can interact with the SaaS application. If the selection is for the thin application, the application manager software launches the thin application.

HYBRID AUTHENTICATION SYSTEMS AND METHODS

Disclosed are hybrid authentication systems and methods that enable users to seamlessly sign-on between cloud-based services and on-premises systems. A cloud-based authentication service receives login credentials from a user and delegates authentication to an on-premises authentication service proxy. The login credentials can be passed by the cloud-based authentication service to the on-premises authentication service proxy, for instance, as an access token in an authentication header. The access token can be a JavaScript Object Notation (JSON) Web Token (JWT) token that is digitally signed using JSON Web Signature. Some embodiments utilize a tunnel connection through which the cloud-based authentication service communicates with the on-premises authentication service proxy. Some embodiments leverage an on-premises identity management system for user management and authentication. In this way, there is no need for a cloud-based system to separately maintain and manage a user identity management system and/or having to sync with an on-premises identity management system.

Automatic building system control restrictions based on physical presence defined by access control event information and knowledge base system
11553338 · 2023-01-10 · ·

A method of controlling a building system is provided. The method comprising: receiving an action request to adjust a building device from a user device; obtaining a token from a previous action request from the user device to adjust the building device when a token exists from a previous action request; transmitting the token for validation within the building device; and adjusting the building device when the token has been validated.