User Authentication Based on Network Context

Example systems and methods of user authentication based on network context are presented. In one example, a command to authenticate a user of a computing device is received in response to a request transmitted from the computing device to access a computing solution. In response to the command, a d...

Full description

Saved in:
Bibliographic Details
Main Author ZLATAREV STEPHAN
Format Patent
LanguageEnglish
Published 24.07.2014
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Example systems and methods of user authentication based on network context are presented. In one example, a command to authenticate a user of a computing device is received in response to a request transmitted from the computing device to access a computing solution. In response to the command, a determination is made whether a network address corresponding to the request matches at least one network address associated with a protected network. Based on the network address corresponding to the request not matching the at least one network address associated with the protected network, authentication of the user is initiated at an identity provider corresponding to the computing solution. Otherwise, based on the network address corresponding to the request matching the at least one network address associated with the protected network, authentication of the user is delegated to an identity management system located within the protected network.
Bibliography:Application Number: US201313746995