H04L41/0869

SYSTEM AND METHOD FOR SECURE SINGLE SIGN ON USING SECURITY ASSERTION MARKUP LANGUAGE
20230060714 · 2023-03-02 ·

A method for providing secure single sign on includes receiving a first data object from an application hosting server, the first data object indicating at least a service provider name and identifying a configuration file corresponding to the service provider name, wherein the configuration file includes at least trusted identity information. The method also includes determining, using the configuration file corresponding to the service provider name, whether the first data object is valid and, in response to a determination that the first data object is valid, generating a response message.

SYSTEM AND METHOD FOR SECURE SINGLE SIGN ON USING SECURITY ASSERTION MARKUP LANGUAGE
20230060714 · 2023-03-02 ·

A method for providing secure single sign on includes receiving a first data object from an application hosting server, the first data object indicating at least a service provider name and identifying a configuration file corresponding to the service provider name, wherein the configuration file includes at least trusted identity information. The method also includes determining, using the configuration file corresponding to the service provider name, whether the first data object is valid and, in response to a determination that the first data object is valid, generating a response message.

LOW-OVERHEAD REAL-TIME CONFIGURATION DRIFT DETECTION
20230068310 · 2023-03-02 ·

A management controller may monitor an information handling system to detect an event associated with a change to a configuration setting by subscribing with an internal event bus to receive the event associated with the change in the configuration setting, and evaluate whether there is a discrepancy between a current configuration setting of the information handling system and a baseline configuration setting. If a configuration drift exists based on the discrepancy, then the configuration drift may be sent to a management console.

AGENT APPLICATION FOR MANAGING INFORMATION TECHNOLOGY INFRASTRUCTURES
20220329480 · 2022-10-13 ·

Methods and systems disclosed herein relate generally to systems and methods for configuring an agent application provisioned within a private information technology infrastructure. The agent application provisioned in a private information technology infrastructure receives a payload comprising a set of parameters that include information that identifies that an update of the agent application is available. The agent application parses the set of parameters to determine that the update of the agent application is available. The agent application receives an updated component for modifying one or more functions of the agent application. The agent application deactivates a component of the agent application that corresponds to the updated component. The agent application replaces the deactivated component of the agent application with the updated component, in which one or more other components of the agent application continue their respective operations.

DETECTION OF PARALLEL REDUNDANCY PROTOCOL TRAFFIC IN SOFTWARE DEFINED NETWORKS

This disclosure pertains to systems and methods for identifying and configuring a host in a software defined network (SDN) configured to communicate using a parallel redundancy protocol (PRP). In one embodiment, a system may include a first communication host and a second communication host configured to transmit information through a network. An SDN controller in communication with the network may include a PRP identification subsystem to monitor traffic transmitted by the first communication host to the second communication host, determine that the traffic comprises at least one data packet that conforms to PRP. Upon detection of a host configured to use PRP, a traffic routing subsystem creates a plurality of communication flows between the first communication host and the second communication host to route PRP traffic between the first communication host and the second communication host.

Configuration validation of a device

In some examples, the validation controller may comprise a processing resource and a memory resource storing machine readable instructions to cause the processing resource to perform a number of actions. In some examples, the validation controller may determine functional capabilities for a topology that includes a plurality of devices to be configured by the validation controller. The validation controller may compare a configuration element for the plurality of devices to the functional capabilities for the plurality of devices. The validation controller may validate the configuration element based on the comparison. The validation controller may also push the configuration element to the plurality of devices when the configuration element is validated.

Configuration validation of a device

In some examples, the validation controller may comprise a processing resource and a memory resource storing machine readable instructions to cause the processing resource to perform a number of actions. In some examples, the validation controller may determine functional capabilities for a topology that includes a plurality of devices to be configured by the validation controller. The validation controller may compare a configuration element for the plurality of devices to the functional capabilities for the plurality of devices. The validation controller may validate the configuration element based on the comparison. The validation controller may also push the configuration element to the plurality of devices when the configuration element is validated.

AUTONOMOUS AUDITING AND REMEDIATION OF IT ASSET RECORDS

Embodiments relate to the autonomous remediation of IT asset records in accordance with rules-based asset management policies. An IT asset record associated with an IT asset and having a first piece of IT asset information is received and evaluated for compliance in accordance with defined asset management rules. The asset management rules require the IT asset record to include both the first piece and a second piece of IT asset information. In view of the rules, a determination is made that the IT asset record requires remediation. Based on a determination that the IT asset record requires remediation, a decision-tree machine learning model is utilized to infer, based on IT asset information available in the IT asset record, at least the second piece of IT asset information to place the IT asset record in compliance with the asset management rules.

AUTO-DETECTION AND RESOLUTION OF SIMILAR NETWORK MISCONFIGURATION
20230111537 · 2023-04-13 ·

The system determines a syntax for each line in a switch configuration file. The system creates, based on the syntax, one or more groups of line specifications, wherein each line specification in a group includes matching terms or values specified by a user. The system generates and deploys a new configuration to a first device. The system obtains one or more changed lines by determining a difference between a pre-deployment state and a post-deployment state. The system identifies, based on the created groups of line specifications and a set of criteria, other devices to which to deploy the new configuration. A user selects a device of the identified other devices to which to deploy the new configuration. The system deploys the new configuration to the selected device and validates the deployed new configuration. The system displays a second list which indicates whether the deployed new configuration is successfully validated.

AUTO-DETECTION AND RESOLUTION OF SIMILAR NETWORK MISCONFIGURATION
20230111537 · 2023-04-13 ·

The system determines a syntax for each line in a switch configuration file. The system creates, based on the syntax, one or more groups of line specifications, wherein each line specification in a group includes matching terms or values specified by a user. The system generates and deploys a new configuration to a first device. The system obtains one or more changed lines by determining a difference between a pre-deployment state and a post-deployment state. The system identifies, based on the created groups of line specifications and a set of criteria, other devices to which to deploy the new configuration. A user selects a device of the identified other devices to which to deploy the new configuration. The system deploys the new configuration to the selected device and validates the deployed new configuration. The system displays a second list which indicates whether the deployed new configuration is successfully validated.