Patent classifications
H04L61/4523
Network vulnerability detection
A method for monitoring a directory environment of a computer network to detect vulnerabilities. The method comprises, at a first computer on the computer network, changing a configuration of the directory environment and, with a replication service, replicating the change at a second computer on the computer network. The method further comprises extracting information relating to the change from the replication service and using the extracted information to detect a vulnerability in the directory environment.
Security platform for service provider network environments
Techniques for providing a securing platform for service provider network environments are disclosed. In some embodiments, a system/process/computer program product for providing a securing platform for service provider network environments includes communicating with an orchestrator and/or another network element on a service provider network to identify a subscriber with a new IP flow using a security platform; associating the subscriber with the new IP flow at the security platform; and determining a security policy to apply at the security platform to the new IP flow based on the subscriber.
Preauthorized domain join
Disclosed are various approaches for preauthorizing the joining of a client device to a domain managed by a cloud-based directory service. An authorization token can be generated prior to a client device joining the domain. The authorization token can be subsequently installed on a client device at an OEM facility. When a user first logs into the client device, the client device can send the authorization token to the cloud-based directory service in lieu of administrative credentials to prove that the client device has been previously authorized to join the domain.
Preauthorized domain join
Disclosed are various approaches for preauthorizing the joining of a client device to a domain managed by a cloud-based directory service. An authorization token can be generated prior to a client device joining the domain. The authorization token can be subsequently installed on a client device at an OEM facility. When a user first logs into the client device, the client device can send the authorization token to the cloud-based directory service in lieu of administrative credentials to prove that the client device has been previously authorized to join the domain.
Methods and systems for searching directory access groups
Methods and systems for searching directory access groups are disclosed. A set of groups associated with a logon user is determined. The set of groups is partitioned into one or more disjoint subsets, wherein each of the disjoint subsets is represented by a data representation including a root node and one or more intermediate nodes. For each of the disjoint subsets, the disjoint subset is path compressed to flatten a structure of the data representation representing the disjoint subset. The data representation is cached to a database cache.
Dynamic path selection and data flow forwarding
Various techniques for dynamic path selection and data flow forwarding are disclosed. For example, various systems, processes, and computer program products for dynamic path selection and data flow forwarding are disclosed for providing dynamic path selection and data flow forwarding that can facilitate preserving/enforcing symmetry in data flows as disclosed with respect to various embodiments.
SECURE AUTHENTICATION AND EXECUTION OF APPLICATIONS ON SHARED DEVICES
A method is disclosed. For example, the method executed by a processor of a shared device includes receiving an identification of a user, connecting to a remote server that stores authentication modules and applications, requesting an authentication module and an application stored on the remote server that is associated with the identification of the user, storing the authentication module and the application temporarily on a non-resident memory of the shared device, and executing the application in response to authentication of the user based on log-in information that was received via the authentication module.
SECURE AUTHENTICATION AND EXECUTION OF APPLICATIONS ON SHARED DEVICES
A method is disclosed. For example, the method executed by a processor of a shared device includes receiving an identification of a user, connecting to a remote server that stores authentication modules and applications, requesting an authentication module and an application stored on the remote server that is associated with the identification of the user, storing the authentication module and the application temporarily on a non-resident memory of the shared device, and executing the application in response to authentication of the user based on log-in information that was received via the authentication module.
METHOD FOR REMOTELY MANAGING ACTIVE DIRECTORY
An Active Directory (AD) of a cloud server maintains a set of cloud computing resources, each having a current configuration for managing the a resource on the cloud server. A set of changes of the current configuration to achieve a desired configuration for the resource are determined, and translated to a set of operations of a configuration framework required to achieve the desired configuration. A set of operations associated with a Group Policy Object (GPO) of the resource is determined. Upon determining conformance with the GPO, at least one script is generated to implement the set of operations, and which is executed over a remote management interface to carry out the set of operations to achieve the desired configuration for the resource.
DYNAMIC PATH SELECTION AND DATA FLOW FORWARDING
Various techniques for dynamic path selection and data flow forwarding are disclosed. For example, various systems, processes, and computer program products for dynamic path selection and data flow forwarding are disclosed for providing dynamic path selection and data flow forwarding that can facilitate preserving/enforcing symmetry in data flows as disclosed with respect to various embodiments.