SYSTEMS AND METHODS FOR ROLE-BASED COMPUTER SECURITY CONFIGURATIONS
An apparatus includes a processor operatively coupled to a memory. The processor detects a software application installed on a client computing device, and/or usage data. Detected usage data is associated with a current user of the client computing device and with the software application. The proce...
Saved in:
Main Authors | , , , |
---|---|
Format | Patent |
Language | English French German |
Published |
20.04.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | An apparatus includes a processor operatively coupled to a memory. The processor detects a software application installed on a client computing device, and/or usage data. Detected usage data is associated with a current user of the client computing device and with the software application. The processor identifies a user role for the current user based on the software application and/or usage data. The processor applies a security configuration to the client computing device based on the user role. The security configuration limits access by the current user to a portion of the software application. The processor sends an identifier of the user role to an administrative server for storage in an Active Directory (AD) database. |
---|---|
Bibliography: | Application Number: EP20180710658 |