SYSTEMS AND METHODS FOR ROLE-BASED COMPUTER SECURITY CONFIGURATIONS

An apparatus includes a processor operatively coupled to a memory. The processor detects a software application installed on a client computing device, and/or usage data. Detected usage data is associated with a current user of the client computing device and with the software application. The proce...

Full description

Saved in:
Bibliographic Details
Main Authors TEMPEL, Mark Robert, JUNCKER, Rob, DENINNO, Randy, PETERS, Travis
Format Patent
LanguageEnglish
French
German
Published 20.04.2022
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:An apparatus includes a processor operatively coupled to a memory. The processor detects a software application installed on a client computing device, and/or usage data. Detected usage data is associated with a current user of the client computing device and with the software application. The processor identifies a user role for the current user based on the software application and/or usage data. The processor applies a security configuration to the client computing device based on the user role. The security configuration limits access by the current user to a portion of the software application. The processor sends an identifier of the user role to an administrative server for storage in an Active Directory (AD) database.
Bibliography:Application Number: EP20180710658