US20160219035A1 - Methods for providing secure access to network resources and devices thereof - Google Patents
Methods for providing secure access to network resources and devices thereof Download PDFInfo
- Publication number
- US20160219035A1 US20160219035A1 US14/943,780 US201514943780A US2016219035A1 US 20160219035 A1 US20160219035 A1 US 20160219035A1 US 201514943780 A US201514943780 A US 201514943780A US 2016219035 A1 US2016219035 A1 US 2016219035A1
- Authority
- US
- United States
- Prior art keywords
- management apparatus
- traffic management
- network traffic
- active directory
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/45—Network directories; Name-to-address mapping
- H04L61/4505—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
- H04L61/4523—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using lightweight directory access protocol [LDAP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/45—Network directories; Name-to-address mapping
- H04L61/4505—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
- H04L61/4511—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
Definitions
- This technology generally relates to methods and devices for providing secure access to network resources and, more particularly, to methods and devices for providing access to network resources secured through active directory servers without requiring a Domain Name Service (DNS) server lookup.
- DNS Domain Name Service
- Network resource utilization and traffic distribution in a network environment can be optimized using an intermediary network traffic management apparatus configured to communicate with client computing devices and content and/or service providers, such as one or more server computing devices.
- a network traffic management apparatus can be utilized to receive requests from client computing devices and communicate with the server computing devices to open connections that can be utilized to service the requests.
- Network traffic management apparatuses can be used in an asymmetric deployment, and disposed proximate either the client computing devices or server computing devices, or in a symmetric deployment, and disposed proximate both the client and server computing devices.
- a network traffic management apparatus is disposed proximate the server computing devices, such as between the server computing devices connected to a local area network (LAN) and a wide area network (WAN), such as the Internet.
- the network traffic management apparatus can perform a variety of functions including enforcing network security policies by facilitating authentication and authorization services. These services can be provided by one or more domain controllers or active directory servers (referred to herein as “active directory servers”) in communication with the network traffic management apparatus.
- the active directory servers can be managed by a domain name service (DNS) server that monitors the health of the active directory servers and responds to requests from the network traffic management apparatus for the Internet Protocol (IP) address of an active directory server that can provide the appropriate security services.
- DNS domain name service
- IP Internet Protocol
- a method for providing secure access to network resources includes receiving, with a network traffic management apparatus, an authentication request from a user of a client computing device, the request comprising credentials for the user.
- a connection is established, with the network traffic management apparatus, with a selected one of a plurality of active directory servers using a stored Internet Protocol (IP) address for the selected active directory server.
- IP Internet Protocol
- At least a portion of a fully qualified domain name of the selected active directory server is received, with the network traffic management apparatus, in response to an anonymous lightweight directory access protocol (LDAP) query sent to the selected active directory server using the established connection.
- LDAP anonymous lightweight directory access protocol
- a non-transitory computer readable medium having stored thereon instructions for providing secure access to network resources comprising machine executable code which when executed by a processor, causes the processor to perform steps including receiving an authentication request from a user of a client computing device, the request comprising credentials for the user.
- a connection is established with a selected one of a plurality of active directory servers using a stored Internet Protocol (IP) address for the selected active directory server.
- IP Internet Protocol
- At least a portion of a fully qualified domain name of the selected active directory server is received in response to an anonymous lightweight directory access protocol (LDAP) query sent to the selected active directory server using the established connection.
- LDAP anonymous lightweight directory access protocol
- a network traffic management apparatus including at least one of configurable hardware logic configured to be capable of implementing or a processor or a communication interface coupled to a memory and configured to be capable of executing instructions stored in the memory including receiving an authentication request from a user of a client computing device, the request comprising credentials for the user.
- a connection is established with a selected one of a plurality of active directory servers using a stored Internet Protocol (IP) address for the selected active directory server.
- IP Internet Protocol
- At least a portion of a fully qualified domain name of the selected active directory server is received in response to an anonymous lightweight directory access protocol (LDAP) query sent to the selected active directory server using the established connection.
- LDAP anonymous lightweight directory access protocol
- This technology provides a number of advantages including providing more effective methods, non-transitory computer readable medium and devices for providing secure access to network resources.
- DNS Domain Name Service
- a Domain Name Service (DNS) server lookup is not required to identify an IP address or fully qualified domain name of an active directory server to send a user authentication request.
- authentication requests are advantageously load balanced to active directory servers monitored by a network traffic management apparatus.
- FIG. 1 a block diagram of a network environment with an exemplary network traffic management apparatus
- FIG. 2 is a block diagram of the exemplary network traffic management apparatus
- FIG. 3 is a flowchart of an exemplary method for providing secure access to network resources
- FIG. 4 is a screenshot of an exemplary administrator interface used to configure the exemplary network traffic management apparatus.
- FIG. 5 is a timing diagram illustrating an exemplary method for providing secure access to network resources.
- FIG. 1 a block diagram is shown including an exemplary network environment 10 which incorporates an exemplary network traffic management apparatus 12 in an asymmetric deployment.
- the network traffic management apparatus 12 is coupled to a plurality of client computing devices 14 ( 1 )- 14 ( n ) through a local area network (LAN) 16 ( 1 ) and a wide area network (WAN) 18 and a plurality of server computing devices 20 ( 1 )- 20 ( n ), a plurality of active directory servers 22 ( 1 )- 22 ( n ), and a administrator device 24 through another LAN 16 ( 2 ), although the network traffic management apparatus 12 , client computing devices 14 ( 1 )- 14 ( n ), server computing devices 20 ( 1 )- 20 ( n ), active directory servers 22 ( 1 )- 22 ( n ), and/or administrator device 24 may be coupled together via other topologies.
- LAN local area network
- WAN wide area network
- the network environment 10 may include other network devices such as one or more routers and/or switches, for example.
- This technology provides a number of advantages including method, non-transitory computer readable medium, and network traffic management apparatus 12 that relatively efficiently implements network security policies to provide authentication and authorization services without communicating with a Domain Name Service (DNS) server.
- DNS Domain Name Service
- the network traffic management apparatus 12 may perform any number of functions, such as optimizing, securing, and load balancing the network traffic between the client computing devices 14 ( 1 )- 14 ( n ) and the server computing devices 20 ( 1 )- 20 ( n ).
- the network traffic management apparatus 12 includes at least one processor 26 , a memory 28 , optional configurable hardware logic 30 , and a communication interface 32 which are coupled together by a bus 34 , although the network traffic management apparatus 12 may include other types and numbers of elements in other configurations.
- the bus 34 is a hyper-transport bus, although other bus types and communication links may be used, such as PCI.
- the processor 26 of the network traffic management apparatus 12 may execute programmed instructions stored in the memory of the network traffic management apparatus 12 for the any number of the functions identified above for managing network traffic and/or optimizing service of resource requests.
- the processor 26 of the network traffic management apparatus 12 may comprise one or more CPUs or general purpose processors with one or more processing cores.
- the memory 28 of the network traffic management apparatus 12 stores these programmed instructions for one or more aspects of the present technology as described and illustrated herein, although some or all of the programmed instructions could be stored and executed elsewhere.
- a variety of different types of memory storage devices such as a random access memory (RAM) or a read only memory (ROM) in the system or a floppy disk, hard disk, CD ROM, DVD ROM, or other computer readable medium which is read from and written to by a magnetic, optical, or other reading and writing system that is coupled to the processor 26 , can be used for the memory 28 .
- the optional configurable hardware logic 30 of the network traffic management apparatus 12 may comprise specialized hardware configured to be capable of implementing one or more steps of this technology, as illustrated and described with reference to the examples herein.
- the optional configurable logic 30 may comprise one or more of field programmable gate arrays (FPGAs), field programmable logic devices (FPLDs), application specific integrated circuits (ASICs) and/or programmable logic units (PLUs).
- FPGAs field programmable gate arrays
- FPLDs field programmable logic devices
- ASICs application specific integrated circuits
- PLUs programmable logic units
- the communication interface 32 operatively couples and communicates between the network traffic management apparatus 12 , the client computing devices 14 ( 1 )- 14 ( n ), server computing devices 20 ( 1 )- 20 ( n ), and active directory servers 22 ( 1 )- 22 ( n ), which are all coupled together by the LANs 16 ( 1 )- 16 ( 2 ) and WAN 18 , although other types and numbers of communication networks or systems with other types and numbers of connections and configurations to other devices and elements.
- the LANs 16 ( 1 )- 16 ( 2 ) and WAN 18 can use TCP/IP over Ethernet and industry-standard protocols, including NFS, CIFS, SOAP, XML, LDAP, and SNMP, although other types and numbers of communication networks, can be used.
- the LANs 16 ( 1 )- 16 ( 2 ) in this example may employ any suitable interface mechanisms and network communication technologies including, for example, teletraffic in any suitable form (e.g., voice, modem, and the like), Public Switched Telephone Network (PSTNs), Ethernet-based Packet Data Networks (PDNs), combinations thereof, and the like.
- PSTNs Public Switched Telephone Network
- PDNs Ethernet-based Packet Data Networks
- the WAN may comprise any wide area network (e.g., Internet), although any other type of traffic network topology may be used.
- Each of the client computing devices 14 ( 1 )- 14 ( n ) and server computing devices 20 ( 1 )- 20 ( n ) includes a processor, a memory, an interface device, and a communication system, which are coupled together by a bus or other link, although other numbers and types of network devices could be used.
- the client computing devices 14 ( 1 )- 14 ( n ) may run interface applications, such as Web browsers, that may provide an interface to make requests for and receive content stored on one or more of the server computing devices via the LANs 16 ( 1 )- 16 ( 2 ) and/or WAN 18 .
- the server computing devices 20 ( 1 )- 20 ( n ) process requests received from requesting client computing devices 14 ( 1 )- 14 ( n ) via the LAN(s) 16 ( 1 )- 16 ( n ) and/or the WAN 18 according to the HTTP-based application RFC protocol or the CIFS or NFS protocol, for example.
- Various network processing applications such as CIFS applications, NFS applications, HTTP Web Server computing device applications, and/or FTP applications, may be operating on the server computing devices 20 ( 1 )- 20 ( n ) and transmitting data (e.g., files or Web pages) to the network traffic management apparatus 12 in response to requests from the client computing devices 14 ( 1 )- 14 ( n ).
- the server computing devices 20 ( 1 )- 20 ( n ) may provide data or receive data in response to requests directed toward the respective applications on the server computing devices 20 ( 1 )- 20 ( n ) from the client computing devices 14 ( 1 )- 14 ( n ).
- the server computing devices 20 ( 1 )- 20 ( n ) may be hardware or software or may represent a system with multiple server computing devices in a server computing device pool, which may include internal or external networks. Further, additional server computing devices may be coupled to one of the LANs 16 ( 1 )- 16 ( n ) and many different types of applications may be available on each of the server computing devices 20 ( 1 )- 20 ( n ).
- each of the active directory servers 22 ( 1 )- 22 ( n ) provides authentication and authorization services, based on a network security policy, allowing users of the client computing devices 14 ( 1 )- 14 ( n ) to access resources provided by the server computing devices 20 ( 1 )- 20 ( n ).
- the active directory servers 22 ( 1 )- 22 ( n ) each include a processor, a memory, and a communication interface, which are coupled together by a bus or other link, although other numbers and types of network devices could also be included in each of the active directory servers 22 ( 1 )- 22 ( n ).
- the administrator device 24 includes a processor, a memory, a communication interface, an input device, and a display device, which are coupled together by a bus or other link.
- a user of the administrator device 24 may communicate with the network traffic management apparatus 12 over the LAN 16 ( 2 ) to configure the network traffic management apparatus 12 , such as by establishing security and access policies and/or providing Internet Protocol (IP) addresses of the active directory servers 22 ( 1 )- 22 ( n ), for example, as described and illustrated in more detail later.
- IP Internet Protocol
- exemplary network environment 10 with the client computing devices 14 ( 1 )- 14 ( n ), network traffic management apparatus 12 , server computing devices 20 ( 1 )- 20 ( n ), active directory servers 22 ( 1 )- 22 ( n ), administrator device 24 , LANs 16 ( 1 )- 16 ( n ), and WAN 18 are described and illustrated herein, other types and numbers of systems, devices, components, and elements in other topologies can be used. It is to be understood that the systems of the examples described herein are for exemplary purposes, as many variations of the specific hardware and software used to implement the examples are possible, as will be appreciated by those skilled in the relevant art(s).
- two or more computing systems or devices can be substituted for any one of the systems or devices in any example. Accordingly, principles and advantages of distributed processing, such as redundancy and replication also can be implemented, as desired, to increase the robustness and performance of the devices and systems of the examples.
- the examples may also be implemented on computer system(s) that extend across any suitable network using any suitable interface mechanisms and traffic technologies, including by way of example only teletraffic in any suitable form (e.g., voice and modem), wireless traffic media, wireless traffic networks, cellular traffic networks, G3 traffic networks, Public Switched Telephone Network (PSTNs), Packet Data Networks (PDNs), the Internet, intranets, and combinations thereof.
- PSTNs Public Switched Telephone Network
- PDNs Packet Data Networks
- the Internet intranets, and combinations thereof.
- the examples may also be embodied as a non-transitory computer readable medium having instructions stored thereon for one or more aspects of the present technology as described and illustrated by way of the examples herein, which when executed by a processor, cause the processor to carry out the steps necessary to implement the methods of the examples, as described and illustrated herein.
- the network traffic management apparatus 12 obtains an Internet Protocol (IP) address for each of the plurality of active directory servers 22 ( 1 )- 22 ( n ).
- IP Internet Protocol
- the IP addresses can be provided by an administrator of the network traffic management apparatus 12 using the administrator device 24 , for example, and can be stored in the memory 28 of the network traffic management apparatus 12 , although the IP addresses can also be obtained from other locations and in other manners and can be stored elsewhere.
- the network traffic management apparatus 12 establishes a virtual server having a virtual IP address.
- the virtual IP address of the virtual server is associated with a virtual pool having a plurality of members, each of which corresponds to one of the active directory servers 22 ( 1 )- 22 ( n ).
- the virtual server is configured to open connections and facilitate TCP/IP communications with each of the active directory servers 22 ( 1 )- 22 ( n ) through the pool members.
- FIG. 4 a screenshot of an exemplary administrator interface 400 used to configure the network traffic management apparatus 12 is illustrated.
- the administrator interface 400 can be provided by the network traffic management apparatus 12 to the administrator device 24 via the WAN 18 , for example.
- an administrator using the administrator device 24 can input the IP address of each of the active directory servers 22 ( 1 )- 22 ( n ) corresponding to pool members (referred to in the administrator interface 400 as domain controllers) associated with the virtual server (referring to as “her hermes lab fp.f5net.com” in the administrator interface 400 ).
- the network traffic management apparatus 12 receives a request requiring authentication from a user of one of the client computing devices 14 ( 1 )- 14 ( n ).
- the request can include credentials for the user including a name and a realm (e.g., user@realm) which require authentication by one of the active directory servers 22 ( 1 )- 22 ( n ) prior to network resources hosted by the server computing devices 20 ( 1 )- 20 ( n ) being provisioned for and accessed by the user.
- the network traffic management apparatus 12 selects an active one of the active directory servers 22 ( 1 )- 22 ( n ) to service the request and provide the authentication services.
- the selection by the network traffic management apparatus 12 can be based on a load balancing policy established by an administrator of the network traffic management apparatus 12 using the administrator device 124 and stored in the memory 28 , for example.
- the network traffic management apparatus 12 can continuously or periodically monitor the active directory servers 22 ( 1 )- 22 ( n ) for various health-related characteristics such as performance, load, throughput, and round trip times of communications, for example, although any other health-related characteristics can also be monitored.
- the values for the monitored characteristics can be used by the network traffic management apparatus 12 to apply the load balancing policy, for example, although the load balancing can be performed by the network traffic management apparatus 12 based on other information or factors.
- the network traffic management apparatus 12 establishes a connection with an active the one of the active directory servers 22 ( 1 )- 22 ( n ) selected in step 306 .
- the connection can be a TCP/IP connection established between the virtual server established in the second step and the one of the active directory servers 22 ( 1 )- 22 ( n ).
- the connection can be established using the IP address of the one of the active directory servers 22 ( 1 )- 22 ( n ) obtained in step 300 .
- the network traffic management apparatus 12 can advantageously monitor the health of the active directory servers 22 ( 1 )- 22 ( n ), as well as select and establish a connection with one of the active directory servers 22 ( 1 )- 22 ( n ), without utilizing a DNS server.
- the network traffic management apparatus 12 sends an anonymous lightweight directory access protocol (LDAP) query to the selected one of the active directory servers 22 ( 1 )- 22 ( n ) using the connection established in step 308 .
- the anonymous LDAP query in this example does not include any user credentials but is utilized to obtain public information provided by the one of the active directory servers 22 ( 1 )- 22 ( n ), including at least a portion of the fully qualified domain name (FQDN) of the one of the active directory servers 22 ( 1 )- 22 ( n ).
- FQDN fully qualified domain name
- the network traffic management apparatus 12 may be configured to communicate with various network devices using IP addresses.
- an authentication protocol utilized to authenticate user credentials such as Kerberos for example, may utilize a FQDN, or portion thereof.
- the network traffic management apparatus 12 must use the FQDN of the selected, active one of the active directory servers 22 ( 1 )- 22 ( n ) in the ticket granting service request (TGS-REQ).
- the LDAP query sent in step 310 allows the network traffic management apparatus 12 to discover the FQDN of the selected one of the active director servers 22 ( 1 )- 22 ( n ) after the connection is established. Accordingly, in step 312 , in response to the LDAP query sent in step 310 , the network traffic management apparatus 12 receives at least a portion of the FQDN of the selected one of the active directory servers 22 ( 1 )- 22 ( n ).
- the network traffic management apparatus 12 attempts to authenticate the user credentials submitted in the third step by communicating with the selected one of the active directory servers 22 ( 1 )- 22 ( n ) according to an authentication protocol, such as Kerberos for example. If the network traffic management apparatus 12 determines in step 314 that the user of the one of the client computing devices 14 ( 1 )- 14 ( n ) is successfully authenticated, then the Yes branch is taken to step 316 .
- an authentication protocol such as Kerberos for example.
- the network traffic management apparatus 12 provides access to the user of the one of the client computing devise 14 ( 1 )- 14 ( n ) to network resources provisioned by the selected one of the active directory servers 22 ( 1 )- 22 ( n ).
- the network resources can be content or services hosted by one or more of the server computing devices 20 ( 1 )- 20 ( n ) and can be provisioned based on a security policy maintained by the selected one of the active directory servers 22 ( 1 )- 22 ( n ).
- the active directory servers 22 ( 1 )- 22 ( n ) can be configured to determine the network resources the users are authorized to access, based on a stored policy, and provision those resources accordingly.
- step 314 if the network traffic management apparatus 12 determines that the user of the one of the client computing devices 14 ( 1 )- 14 ( n ) is not successfully authenticated, then the No branch is taken to step 304 and an additional request requiring authentication is received, as described and illustrated earlier. It should be appreciated that any of steps 304 - 316 can occur in parallel for various users of the client computing devices 14 ( 1 )- 14 ( n ).
- the network traffic management apparatus 12 includes an access policy manager (APM) 500 , an access policy daemon 502 , and the virtual server 504 described and illustrated earlier with reference to step 302 of FIG. 3 , for example.
- the access policy manager (APM) 500 , access policy daemon 502 , and virtual server 504 can be modules comprising programmed instructions stored in the memory 28 of the network traffic management apparatus 12 and executable by the processor 26 of the network traffic management apparatus 12 , for example. Other modules can also be provided and can perform one or more of the steps described and illustrated with reference to FIG. 5 .
- a user of the client device 14 ( 1 ) sends an authentication request to the network traffic management apparatus 12 .
- the request is received by the access policy manager 500 of the network traffic management apparatus 12 , although the request can also be received by other modules.
- the access policy manager 500 determines based on the received request that an access policy is to be executed by the network traffic management apparatus 12 and communicates the determination to the access policy daemon 502 .
- the authentication request in this example includes credentials for the user of the client device 14 ( 1 ).
- step 508 in this example the access policy daemon of the network traffic management apparatus 12 initiates an anonymous LDAP query to the virtual server 504 in this example.
- the virtual server selects one of the active directory servers 22 ( 1 )- 22 ( n ) (active directory server 22 ( 1 ) in the example illustrated in FIG. 5 ).
- the active directory server 22 ( 1 ) can be selected based on a load balancing decision made based on health monitoring of the active directory servers 22 ( 1 )- 22 ( n ), for example, although the selection can be made based on other criteria.
- the virtual server 504 Upon selection of the active directory server 22 ( 1 ), the virtual server 504 forwards the anonymous LDAP query to the active directory server 22 ( 1 ) using an IP address of the active directory server 22 ( 1 ) previously stored, such as by an administrator of the network traffic management apparatus, for example.
- step 512 in this example the active directory server 22 ( 1 ) returns its FQDN, or a portion thereof, to the virtual server 504 of the network traffic management apparatus 12 in response to the anonymous LDAP query received in step 510 .
- step 514 the virtual server 504 of the network traffic management apparatus 12 forwards the anonymous LDAP query result to the access policy daemon 502 .
- the network traffic management apparatus 12 in this example learns the FQDN of the active directory server 22 ( 1 ) without ever communicating with a DNS server.
- the FQDN is used as described and illustrated later to execute an authentication protocol, such as Kerberos in this example.
- step 516 the access policy daemon 502 of the network traffic management apparatus 12 sends an AS-REQ message to the virtual server 504 to initiate Kerberos authentication, although other types of authentication protocols can also be used.
- the AS-REQ message in this example includes the user credentials received in step 506 .
- step 518 the virtual server 504 of the network traffic management apparatus 12 forwards the AS-REQ to the active directory server 22 ( 1 ).
- the active directory server 22 ( 1 ) responds to the received AS-REQ message with an AS-REP message, which in this example includes a ticket granting ticket (TGT).
- the virtual server 504 forwards the received AS-REP to the access policy daemon 502 .
- the access policy daemon 502 of the network traffic management device 12 sends a TGS-REQ with the TGT obtained in step 522 and the FQDN obtained in step 514 to the virtual server 504 .
- the virtual server 504 of the network traffic management apparatus 12 forwards the ticket granting server request (TGS-REQ) to the active directory server 22 ( 1 ).
- the active directory server 22 ( 1 ) sends an TGS-REP message to the virtual server 504 .
- the virtual server 504 of the network traffic management apparatus 12 forwards the TGS-REP to the access policy daemon 502 in step 530 .
- the execution of the access policy execution terminates and the access policy daemon 502 communicates with the access policy manager 500 to allow or deny the user of the client device 14 ( 1 ) access to resources stored by one or more of the server computing devices 20 ( 1 )- 20 ( n ) depending on the contents of the TGS-REP and/or the outcome of the execution of the authentication protocol. While steps 516 - 530 generally correspond with the Kerberos authentication protocol, other authentication protocols can also be used in other examples.
- a network traffic management apparatus can provide secure access to network resources relatively efficiently without utilizing third party libraries requiring a DNS server look-up.
- an enterprise network administrator can input IP addresses of active directory servers to a network traffic management apparatus which can monitor the health of the active directory servers and load balance user authentication requests to the active directory servers via connections with an internal virtual server.
- the internal virtual server can learn the fully qualified domain name of an active, selected one of the active directory servers using an anonymous LDAP query. Accordingly, aspects of the authentication functionality can be implemented with a relatively efficient network traffic management apparatus, thereby improving user response time, throughput, and utilization of the active directory server pool.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
A method, non-transitory computer readable medium, and network traffic management apparatus that receives an authentication request from a user of a client computing device, the request comprising credentials for the user. A connection is established with a selected one of a plurality of active directory servers using a stored Internet Protocol (IP) address for the selected active directory server. At least a portion of a fully qualified domain name of the selected active directory server is received in response to an anonymous lightweight directory access protocol (LDAP) query sent to the selected active directory server using the established connection. The user of the client computing device is authenticated using the at least a portion of the fully qualified domain name and the credentials.
Description
- This application is a continuation of prior U.S. patent application Ser. No. 14/192,255, filed Feb. 27, 2014, and claims the benefit of U.S. Provisional Patent Application Ser. No. 61/770,013 filed Feb. 27, 2013, each of which is incorporated herein by reference in its entirety.
- This technology generally relates to methods and devices for providing secure access to network resources and, more particularly, to methods and devices for providing access to network resources secured through active directory servers without requiring a Domain Name Service (DNS) server lookup.
- Network resource utilization and traffic distribution in a network environment can be optimized using an intermediary network traffic management apparatus configured to communicate with client computing devices and content and/or service providers, such as one or more server computing devices. A network traffic management apparatus can be utilized to receive requests from client computing devices and communicate with the server computing devices to open connections that can be utilized to service the requests. Network traffic management apparatuses can be used in an asymmetric deployment, and disposed proximate either the client computing devices or server computing devices, or in a symmetric deployment, and disposed proximate both the client and server computing devices.
- In one asymmetric deployment, a network traffic management apparatus is disposed proximate the server computing devices, such as between the server computing devices connected to a local area network (LAN) and a wide area network (WAN), such as the Internet. In such a deployment, the network traffic management apparatus can perform a variety of functions including enforcing network security policies by facilitating authentication and authorization services. These services can be provided by one or more domain controllers or active directory servers (referred to herein as “active directory servers”) in communication with the network traffic management apparatus.
- The active directory servers can be managed by a domain name service (DNS) server that monitors the health of the active directory servers and responds to requests from the network traffic management apparatus for the Internet Protocol (IP) address of an active directory server that can provide the appropriate security services. However, reliance by the network traffic management apparatus on the DNS server for such functionality is not desirable because the DNS server is a single point of failure, the round trip communications with the DNS server are expensive, and the DNS server is relatively less efficient at implementing server health monitoring and selection functionality.
- A method for providing secure access to network resources includes receiving, with a network traffic management apparatus, an authentication request from a user of a client computing device, the request comprising credentials for the user. A connection is established, with the network traffic management apparatus, with a selected one of a plurality of active directory servers using a stored Internet Protocol (IP) address for the selected active directory server. At least a portion of a fully qualified domain name of the selected active directory server is received, with the network traffic management apparatus, in response to an anonymous lightweight directory access protocol (LDAP) query sent to the selected active directory server using the established connection. The user of the client computing device is authenticated, with the network traffic management apparatus, using the at least a portion of the fully qualified domain name and the credentials.
- A non-transitory computer readable medium having stored thereon instructions for providing secure access to network resources comprising machine executable code which when executed by a processor, causes the processor to perform steps including receiving an authentication request from a user of a client computing device, the request comprising credentials for the user. A connection is established with a selected one of a plurality of active directory servers using a stored Internet Protocol (IP) address for the selected active directory server. At least a portion of a fully qualified domain name of the selected active directory server is received in response to an anonymous lightweight directory access protocol (LDAP) query sent to the selected active directory server using the established connection. The user of the client computing device is authenticated using the at least a portion of the fully qualified domain name and the credentials.
- A network traffic management apparatus including at least one of configurable hardware logic configured to be capable of implementing or a processor or a communication interface coupled to a memory and configured to be capable of executing instructions stored in the memory including receiving an authentication request from a user of a client computing device, the request comprising credentials for the user. A connection is established with a selected one of a plurality of active directory servers using a stored Internet Protocol (IP) address for the selected active directory server. At least a portion of a fully qualified domain name of the selected active directory server is received in response to an anonymous lightweight directory access protocol (LDAP) query sent to the selected active directory server using the established connection. The user of the client computing device is authenticated using the at least a portion of the fully qualified domain name and the credentials.
- This technology provides a number of advantages including providing more effective methods, non-transitory computer readable medium and devices for providing secure access to network resources. With this technology, a Domain Name Service (DNS) server lookup is not required to identify an IP address or fully qualified domain name of an active directory server to send a user authentication request. Additionally, authentication requests are advantageously load balanced to active directory servers monitored by a network traffic management apparatus. By providing user authentication services without communication with a DNS server and by load balancing user authentication requests, client computing device users can access secured network resources more quickly, thereby improving the user experience.
-
FIG. 1 a block diagram of a network environment with an exemplary network traffic management apparatus; -
FIG. 2 is a block diagram of the exemplary network traffic management apparatus; -
FIG. 3 is a flowchart of an exemplary method for providing secure access to network resources; -
FIG. 4 is a screenshot of an exemplary administrator interface used to configure the exemplary network traffic management apparatus; and -
FIG. 5 is a timing diagram illustrating an exemplary method for providing secure access to network resources. - Referring to
FIG. 1 , a block diagram is shown including anexemplary network environment 10 which incorporates an exemplary network traffic management apparatus 12 in an asymmetric deployment. The network traffic management apparatus 12 is coupled to a plurality of client computing devices 14(1)-14(n) through a local area network (LAN) 16(1) and a wide area network (WAN) 18 and a plurality of server computing devices 20(1)-20(n), a plurality of active directory servers 22(1)-22(n), and aadministrator device 24 through another LAN 16(2), although the network traffic management apparatus 12, client computing devices 14(1)-14(n), server computing devices 20(1)-20(n), active directory servers 22(1)-22(n), and/oradministrator device 24 may be coupled together via other topologies. Additionally, thenetwork environment 10 may include other network devices such as one or more routers and/or switches, for example. This technology provides a number of advantages including method, non-transitory computer readable medium, and network traffic management apparatus 12 that relatively efficiently implements network security policies to provide authentication and authorization services without communicating with a Domain Name Service (DNS) server. - Referring to
FIGS. 1-2 , the network traffic management apparatus 12 may perform any number of functions, such as optimizing, securing, and load balancing the network traffic between the client computing devices 14(1)-14(n) and the server computing devices 20(1)-20(n). The network traffic management apparatus 12 includes at least oneprocessor 26, amemory 28, optionalconfigurable hardware logic 30, and acommunication interface 32 which are coupled together by abus 34, although the network traffic management apparatus 12 may include other types and numbers of elements in other configurations. In this example, thebus 34 is a hyper-transport bus, although other bus types and communication links may be used, such as PCI. - The
processor 26 of the network traffic management apparatus 12 may execute programmed instructions stored in the memory of the network traffic management apparatus 12 for the any number of the functions identified above for managing network traffic and/or optimizing service of resource requests. Theprocessor 26 of the network traffic management apparatus 12 may comprise one or more CPUs or general purpose processors with one or more processing cores. - The
memory 28 of the network traffic management apparatus 12 stores these programmed instructions for one or more aspects of the present technology as described and illustrated herein, although some or all of the programmed instructions could be stored and executed elsewhere. A variety of different types of memory storage devices, such as a random access memory (RAM) or a read only memory (ROM) in the system or a floppy disk, hard disk, CD ROM, DVD ROM, or other computer readable medium which is read from and written to by a magnetic, optical, or other reading and writing system that is coupled to theprocessor 26, can be used for thememory 28. - The optional
configurable hardware logic 30 of the network traffic management apparatus 12 may comprise specialized hardware configured to be capable of implementing one or more steps of this technology, as illustrated and described with reference to the examples herein. By way of example only, the optionalconfigurable logic 30 may comprise one or more of field programmable gate arrays (FPGAs), field programmable logic devices (FPLDs), application specific integrated circuits (ASICs) and/or programmable logic units (PLUs). - The
communication interface 32 operatively couples and communicates between the network traffic management apparatus 12, the client computing devices 14(1)-14(n), server computing devices 20(1)-20(n), and active directory servers 22(1)-22(n), which are all coupled together by the LANs 16(1)-16(2) andWAN 18, although other types and numbers of communication networks or systems with other types and numbers of connections and configurations to other devices and elements. By way of example only, the LANs 16(1)-16(2) and WAN 18 can use TCP/IP over Ethernet and industry-standard protocols, including NFS, CIFS, SOAP, XML, LDAP, and SNMP, although other types and numbers of communication networks, can be used. - The LANs 16(1)-16(2) in this example may employ any suitable interface mechanisms and network communication technologies including, for example, teletraffic in any suitable form (e.g., voice, modem, and the like), Public Switched Telephone Network (PSTNs), Ethernet-based Packet Data Networks (PDNs), combinations thereof, and the like. The WAN may comprise any wide area network (e.g., Internet), although any other type of traffic network topology may be used.
- Each of the client computing devices 14(1)-14(n) and server computing devices 20(1)-20(n) includes a processor, a memory, an interface device, and a communication system, which are coupled together by a bus or other link, although other numbers and types of network devices could be used. The client computing devices 14(1)-14(n) may run interface applications, such as Web browsers, that may provide an interface to make requests for and receive content stored on one or more of the server computing devices via the LANs 16(1)-16(2) and/or
WAN 18. - Generally, the server computing devices 20(1)-20(n) process requests received from requesting client computing devices 14(1)-14(n) via the LAN(s) 16(1)-16(n) and/or the
WAN 18 according to the HTTP-based application RFC protocol or the CIFS or NFS protocol, for example. Various network processing applications, such as CIFS applications, NFS applications, HTTP Web Server computing device applications, and/or FTP applications, may be operating on the server computing devices 20(1)-20(n) and transmitting data (e.g., files or Web pages) to the network traffic management apparatus 12 in response to requests from the client computing devices 14(1)-14(n). - The server computing devices 20(1)-20(n) may provide data or receive data in response to requests directed toward the respective applications on the server computing devices 20(1)-20(n) from the client computing devices 14(1)-14(n). The server computing devices 20(1)-20(n) may be hardware or software or may represent a system with multiple server computing devices in a server computing device pool, which may include internal or external networks. Further, additional server computing devices may be coupled to one of the LANs 16(1)-16(n) and many different types of applications may be available on each of the server computing devices 20(1)-20(n).
- In this example, each of the active directory servers 22(1)-22(n) provides authentication and authorization services, based on a network security policy, allowing users of the client computing devices 14(1)-14(n) to access resources provided by the server computing devices 20(1)-20(n). The active directory servers 22(1)-22(n) each include a processor, a memory, and a communication interface, which are coupled together by a bus or other link, although other numbers and types of network devices could also be included in each of the active directory servers 22(1)-22(n).
- The
administrator device 24 includes a processor, a memory, a communication interface, an input device, and a display device, which are coupled together by a bus or other link. A user of theadministrator device 24 may communicate with the network traffic management apparatus 12 over the LAN 16(2) to configure the network traffic management apparatus 12, such as by establishing security and access policies and/or providing Internet Protocol (IP) addresses of the active directory servers 22(1)-22(n), for example, as described and illustrated in more detail later. - Although the
exemplary network environment 10 with the client computing devices 14(1)-14(n), network traffic management apparatus 12, server computing devices 20(1)-20(n), active directory servers 22(1)-22(n),administrator device 24, LANs 16(1)-16(n), andWAN 18 are described and illustrated herein, other types and numbers of systems, devices, components, and elements in other topologies can be used. It is to be understood that the systems of the examples described herein are for exemplary purposes, as many variations of the specific hardware and software used to implement the examples are possible, as will be appreciated by those skilled in the relevant art(s). - In addition, two or more computing systems or devices can be substituted for any one of the systems or devices in any example. Accordingly, principles and advantages of distributed processing, such as redundancy and replication also can be implemented, as desired, to increase the robustness and performance of the devices and systems of the examples. The examples may also be implemented on computer system(s) that extend across any suitable network using any suitable interface mechanisms and traffic technologies, including by way of example only teletraffic in any suitable form (e.g., voice and modem), wireless traffic media, wireless traffic networks, cellular traffic networks, G3 traffic networks, Public Switched Telephone Network (PSTNs), Packet Data Networks (PDNs), the Internet, intranets, and combinations thereof.
- The examples may also be embodied as a non-transitory computer readable medium having instructions stored thereon for one or more aspects of the present technology as described and illustrated by way of the examples herein, which when executed by a processor, cause the processor to carry out the steps necessary to implement the methods of the examples, as described and illustrated herein.
- An exemplary method for providing secure access to network resources will now be described with reference to
FIGS. 1-5 . Referring more specifically toFIG. 3 , instep 300 in this example, the network traffic management apparatus 12 obtains an Internet Protocol (IP) address for each of the plurality of active directory servers 22(1)-22(n). The IP addresses can be provided by an administrator of the network traffic management apparatus 12 using theadministrator device 24, for example, and can be stored in thememory 28 of the network traffic management apparatus 12, although the IP addresses can also be obtained from other locations and in other manners and can be stored elsewhere. - In
step 302, the network traffic management apparatus 12 establishes a virtual server having a virtual IP address. The virtual IP address of the virtual server is associated with a virtual pool having a plurality of members, each of which corresponds to one of the active directory servers 22(1)-22(n). The virtual server is configured to open connections and facilitate TCP/IP communications with each of the active directory servers 22(1)-22(n) through the pool members. - Referring more specifically to
FIG. 4 , a screenshot of anexemplary administrator interface 400 used to configure the network traffic management apparatus 12 is illustrated. Theadministrator interface 400 can be provided by the network traffic management apparatus 12 to theadministrator device 24 via theWAN 18, for example. In this example, an administrator using theadministrator device 24 can input the IP address of each of the active directory servers 22(1)-22(n) corresponding to pool members (referred to in theadministrator interface 400 as domain controllers) associated with the virtual server (referring to as “her hermes lab fp.f5net.com” in the administrator interface 400). - Referring back to
FIG. 3 , in step 304, the network traffic management apparatus 12 receives a request requiring authentication from a user of one of the client computing devices 14(1)-14(n). The request can include credentials for the user including a name and a realm (e.g., user@realm) which require authentication by one of the active directory servers 22(1)-22(n) prior to network resources hosted by the server computing devices 20(1)-20(n) being provisioned for and accessed by the user. - In
step 306, the network traffic management apparatus 12 selects an active one of the active directory servers 22(1)-22(n) to service the request and provide the authentication services. The selection by the network traffic management apparatus 12 can be based on a load balancing policy established by an administrator of the network traffic management apparatus 12 using the administrator device 124 and stored in thememory 28, for example. Optionally, the network traffic management apparatus 12 can continuously or periodically monitor the active directory servers 22(1)-22(n) for various health-related characteristics such as performance, load, throughput, and round trip times of communications, for example, although any other health-related characteristics can also be monitored. The values for the monitored characteristics can be used by the network traffic management apparatus 12 to apply the load balancing policy, for example, although the load balancing can be performed by the network traffic management apparatus 12 based on other information or factors. - In
step 308, the network traffic management apparatus 12 establishes a connection with an active the one of the active directory servers 22(1)-22(n) selected instep 306. The connection can be a TCP/IP connection established between the virtual server established in the second step and the one of the active directory servers 22(1)-22(n). The connection can be established using the IP address of the one of the active directory servers 22(1)-22(n) obtained instep 300. Because the IP addresses of the active directory servers 22(1)-22(n) are obtained and stored in thememory 28 in this example, the network traffic management apparatus 12 can advantageously monitor the health of the active directory servers 22(1)-22(n), as well as select and establish a connection with one of the active directory servers 22(1)-22(n), without utilizing a DNS server. - In step 310, the network traffic management apparatus 12 sends an anonymous lightweight directory access protocol (LDAP) query to the selected one of the active directory servers 22(1)-22(n) using the connection established in
step 308. The anonymous LDAP query in this example does not include any user credentials but is utilized to obtain public information provided by the one of the active directory servers 22(1)-22(n), including at least a portion of the fully qualified domain name (FQDN) of the one of the active directory servers 22(1)-22(n). - In some examples, the network traffic management apparatus 12 may be configured to communicate with various network devices using IP addresses. However, an authentication protocol utilized to authenticate user credentials, such as Kerberos for example, may utilize a FQDN, or portion thereof. In an example in which Kerberos is used, the network traffic management apparatus 12 must use the FQDN of the selected, active one of the active directory servers 22(1)-22(n) in the ticket granting service request (TGS-REQ). Since the network traffic management apparatus 12 is not aware of which of the active director servers 22(1)-22(n) it will be connected to via the virtual server until the connection is made, the LDAP query sent in step 310 allows the network traffic management apparatus 12 to discover the FQDN of the selected one of the active director servers 22(1)-22(n) after the connection is established. Accordingly, in
step 312, in response to the LDAP query sent in step 310, the network traffic management apparatus 12 receives at least a portion of the FQDN of the selected one of the active directory servers 22(1)-22(n). - With the at least a portion of the FQDN, in step 314, the network traffic management apparatus 12 attempts to authenticate the user credentials submitted in the third step by communicating with the selected one of the active directory servers 22(1)-22(n) according to an authentication protocol, such as Kerberos for example. If the network traffic management apparatus 12 determines in step 314 that the user of the one of the client computing devices 14(1)-14(n) is successfully authenticated, then the Yes branch is taken to step 316.
- In step 316, the network traffic management apparatus 12 provides access to the user of the one of the client computing devise 14(1)-14(n) to network resources provisioned by the selected one of the active directory servers 22(1)-22(n). The network resources can be content or services hosted by one or more of the server computing devices 20(1)-20(n) and can be provisioned based on a security policy maintained by the selected one of the active directory servers 22(1)-22(n). Accordingly, in addition to authenticating users, the active directory servers 22(1)-22(n) can be configured to determine the network resources the users are authorized to access, based on a stored policy, and provision those resources accordingly.
- Referring back to step 314, if the network traffic management apparatus 12 determines that the user of the one of the client computing devices 14(1)-14(n) is not successfully authenticated, then the No branch is taken to step 304 and an additional request requiring authentication is received, as described and illustrated earlier. It should be appreciated that any of steps 304-316 can occur in parallel for various users of the client computing devices 14(1)-14(n).
- Referring more specifically to
FIG. 5 , a timing diagram of an exemplary method for providing secure access to network resources is illustrated. In this example, the network traffic management apparatus 12 includes an access policy manager (APM) 500, anaccess policy daemon 502, and thevirtual server 504 described and illustrated earlier with reference to step 302 ofFIG. 3 , for example. The access policy manager (APM) 500,access policy daemon 502, andvirtual server 504 can be modules comprising programmed instructions stored in thememory 28 of the network traffic management apparatus 12 and executable by theprocessor 26 of the network traffic management apparatus 12, for example. Other modules can also be provided and can perform one or more of the steps described and illustrated with reference toFIG. 5 . - In
step 506 in this example, a user of the client device 14(1) sends an authentication request to the network traffic management apparatus 12. In this example, the request is received by theaccess policy manager 500 of the network traffic management apparatus 12, although the request can also be received by other modules. Theaccess policy manager 500 determines based on the received request that an access policy is to be executed by the network traffic management apparatus 12 and communicates the determination to theaccess policy daemon 502. Additionally, the authentication request in this example includes credentials for the user of the client device 14(1). - In
step 508 in this example, the access policy daemon of the network traffic management apparatus 12 initiates an anonymous LDAP query to thevirtual server 504 in this example. Instep 510, the virtual server selects one of the active directory servers 22(1)-22(n) (active directory server 22(1) in the example illustrated inFIG. 5 ). The active directory server 22(1) can be selected based on a load balancing decision made based on health monitoring of the active directory servers 22(1)-22(n), for example, although the selection can be made based on other criteria. Upon selection of the active directory server 22(1), thevirtual server 504 forwards the anonymous LDAP query to the active directory server 22(1) using an IP address of the active directory server 22(1) previously stored, such as by an administrator of the network traffic management apparatus, for example. - In
step 512 in this example, the active directory server 22(1) returns its FQDN, or a portion thereof, to thevirtual server 504 of the network traffic management apparatus 12 in response to the anonymous LDAP query received instep 510. Instep 514, thevirtual server 504 of the network traffic management apparatus 12 forwards the anonymous LDAP query result to theaccess policy daemon 502. Accordingly, the network traffic management apparatus 12 in this example learns the FQDN of the active directory server 22(1) without ever communicating with a DNS server. The FQDN is used as described and illustrated later to execute an authentication protocol, such as Kerberos in this example. - In
step 516, theaccess policy daemon 502 of the network traffic management apparatus 12 sends an AS-REQ message to thevirtual server 504 to initiate Kerberos authentication, although other types of authentication protocols can also be used. The AS-REQ message in this example includes the user credentials received instep 506. Instep 518, thevirtual server 504 of the network traffic management apparatus 12 forwards the AS-REQ to the active directory server 22(1). - In
step 520, the active directory server 22(1) responds to the received AS-REQ message with an AS-REP message, which in this example includes a ticket granting ticket (TGT). Instep 522, thevirtual server 504 forwards the received AS-REP to theaccess policy daemon 502. In response instep 524, theaccess policy daemon 502 of the network traffic management device 12 sends a TGS-REQ with the TGT obtained instep 522 and the FQDN obtained instep 514 to thevirtual server 504. Instep 526, thevirtual server 504 of the network traffic management apparatus 12 forwards the ticket granting server request (TGS-REQ) to the active directory server 22(1). In response instep 528, the active directory server 22(1) sends an TGS-REP message to thevirtual server 504. Thevirtual server 504 of the network traffic management apparatus 12 forwards the TGS-REP to theaccess policy daemon 502 instep 530. - Upon receipt of the TGS-REP message, the execution of the access policy execution terminates and the
access policy daemon 502 communicates with theaccess policy manager 500 to allow or deny the user of the client device 14(1) access to resources stored by one or more of the server computing devices 20(1)-20(n) depending on the contents of the TGS-REP and/or the outcome of the execution of the authentication protocol. While steps 516-530 generally correspond with the Kerberos authentication protocol, other authentication protocols can also be used in other examples. - By this technology, a network traffic management apparatus can provide secure access to network resources relatively efficiently without utilizing third party libraries requiring a DNS server look-up. With this technology, an enterprise network administrator can input IP addresses of active directory servers to a network traffic management apparatus which can monitor the health of the active directory servers and load balance user authentication requests to the active directory servers via connections with an internal virtual server. The internal virtual server can learn the fully qualified domain name of an active, selected one of the active directory servers using an anonymous LDAP query. Accordingly, aspects of the authentication functionality can be implemented with a relatively efficient network traffic management apparatus, thereby improving user response time, throughput, and utilization of the active directory server pool.
- Having thus described the basic concept of the invention, it will be rather apparent to those skilled in the art that the foregoing detailed disclosure is intended to be presented by way of example only, and is not limiting. Various alterations, improvements, and modifications will occur and are intended to those skilled in the art, though not expressly stated herein. These alterations, improvements, and modifications are intended to be suggested hereby, and are within the spirit and scope of the invention. Additionally, the recited order of processing elements or sequences, or the use of numbers, letters, or other designations therefore, is not intended to limit the claimed processes to any order except as may be specified in the claims. Accordingly, the invention is limited only by the following claims and equivalents thereto.
Claims (1)
1. A method for providing secure access to network resources, the method comprising:
receiving, by a network traffic management apparatus, an authentication request from a user of a client computing device, the authentication request comprising credentials for the user;
establishing, by the network traffic management apparatus, a connection with a selected one of a plurality of active directory servers using a stored Internet Protocol (IP) address for the selected one of the plurality of active directory servers;
sending, by the network traffic management apparatus, an anonymous lightweight directory access protocol (LDAP) query to the selected one of the plurality of active directory servers using the established connection;
receiving, by the network traffic management apparatus, at least a portion of a fully qualified domain name of the selected one of the plurality of active directory servers in response to the anonymous LDAP query; and
authenticating, with the network traffic management apparatus, the user of the client computing device using the at least a portion of the fully qualified domain name and the credentials.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/943,780 US20160219035A1 (en) | 2013-02-27 | 2015-11-17 | Methods for providing secure access to network resources and devices thereof |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201361770013P | 2013-02-27 | 2013-02-27 | |
US14/192,255 US9246906B1 (en) | 2013-02-27 | 2014-02-27 | Methods for providing secure access to network resources and devices thereof |
US14/943,780 US20160219035A1 (en) | 2013-02-27 | 2015-11-17 | Methods for providing secure access to network resources and devices thereof |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/192,255 Continuation US9246906B1 (en) | 2013-02-27 | 2014-02-27 | Methods for providing secure access to network resources and devices thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
US20160219035A1 true US20160219035A1 (en) | 2016-07-28 |
Family
ID=55086306
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/192,255 Active US9246906B1 (en) | 2013-02-27 | 2014-02-27 | Methods for providing secure access to network resources and devices thereof |
US14/943,780 Abandoned US20160219035A1 (en) | 2013-02-27 | 2015-11-17 | Methods for providing secure access to network resources and devices thereof |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/192,255 Active US9246906B1 (en) | 2013-02-27 | 2014-02-27 | Methods for providing secure access to network resources and devices thereof |
Country Status (1)
Country | Link |
---|---|
US (2) | US9246906B1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180309822A1 (en) * | 2017-04-25 | 2018-10-25 | Citrix Systems, Inc. | Detecting uneven load balancing through multi-level outlier detection |
US20230087052A1 (en) * | 2021-09-21 | 2023-03-23 | Nokia Technologies Oy | Restricting onboard traffic |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10509663B1 (en) * | 2015-02-04 | 2019-12-17 | Amazon Technologies, Inc. | Automatic domain join for virtual machine instances |
WO2017170255A1 (en) * | 2016-03-29 | 2017-10-05 | 株式会社リコー | Service provision system, service exchange system, service provision method, and program |
JP6620884B2 (en) | 2016-03-29 | 2019-12-18 | 株式会社リコー | Service providing system, service delivery system, service providing method, and program |
CN108780426B (en) | 2016-03-29 | 2022-06-21 | 株式会社理光 | Service providing system, service delivery system, service providing method and program |
CN107277126B (en) * | 2017-06-13 | 2020-08-04 | 郑州云海信息技术有限公司 | Cloud computing resource management method and device |
US10834056B2 (en) * | 2018-07-31 | 2020-11-10 | Ca, Inc. | Dynamically controlling firewall ports based on server transactions to reduce risks |
US12355795B2 (en) * | 2021-08-02 | 2025-07-08 | Harness Inc. | Application security posture identifier |
CN115150105A (en) * | 2022-09-01 | 2022-10-04 | 杭州悦数科技有限公司 | Identity authentication method and system in distributed graph database |
US12375493B2 (en) * | 2023-01-25 | 2025-07-29 | Salesforce, Inc. | Enforcing JIT access control by leveraging pam and LDAP |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090063665A1 (en) * | 2007-08-28 | 2009-03-05 | Rohati Systems, Inc. | Highly scalable architecture for application network appliances |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7836493B2 (en) * | 2003-04-24 | 2010-11-16 | Attachmate Corporation | Proxy server security token authorization |
US7571180B2 (en) * | 2003-06-27 | 2009-08-04 | Attachmate Corporation | Utilizing LDAP directories for application access control and personalization |
US20070088630A1 (en) | 2005-09-29 | 2007-04-19 | Microsoft Corporation | Assessment and/or deployment of computer network component(s) |
-
2014
- 2014-02-27 US US14/192,255 patent/US9246906B1/en active Active
-
2015
- 2015-11-17 US US14/943,780 patent/US20160219035A1/en not_active Abandoned
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090063665A1 (en) * | 2007-08-28 | 2009-03-05 | Rohati Systems, Inc. | Highly scalable architecture for application network appliances |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180309822A1 (en) * | 2017-04-25 | 2018-10-25 | Citrix Systems, Inc. | Detecting uneven load balancing through multi-level outlier detection |
US11165856B2 (en) * | 2017-04-25 | 2021-11-02 | Citrix Systems, Inc. | Detecting uneven load balancing through multi-level outlier detection |
US11924272B2 (en) | 2017-04-25 | 2024-03-05 | Citrix Systems, Inc. | Detecting uneven load balancing through multi-level outlier detection |
US20230087052A1 (en) * | 2021-09-21 | 2023-03-23 | Nokia Technologies Oy | Restricting onboard traffic |
US11848909B2 (en) * | 2021-09-21 | 2023-12-19 | Nokia Technologies Oy | Restricting onboard traffic |
Also Published As
Publication number | Publication date |
---|---|
US9246906B1 (en) | 2016-01-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9246906B1 (en) | Methods for providing secure access to network resources and devices thereof | |
US11652797B2 (en) | Secure application access systems and methods via a lightweight connector and a cloud-based system | |
US10728246B2 (en) | Service driven split tunneling of mobile network traffic | |
US10375024B2 (en) | Cloud-based virtual private access systems and methods | |
US11297058B2 (en) | Systems and methods using a cloud proxy for mobile device management and policy | |
EP2933986B1 (en) | Computer-implemented method and computer program product for processing named entity queries using a cached functionality in a domain name system | |
WO2022247751A1 (en) | Method, system and apparatus for remotely accessing application, device, and storage medium | |
US20170331859A1 (en) | In-channel event processing for network agnostic mobile applications in cloud based security systems | |
US10972453B1 (en) | Methods for token refreshment based on single sign-on (SSO) for federated identity environments and devices thereof | |
RU2008146517A (en) | POLICY MANAGED ACCOUNT DEPARTMENT FOR UNIFIED NETWORK REGISTRATION AND SECURE ACCESS TO NETWORK RESOURCES | |
EP3247082B1 (en) | Cloud-based virtual private access systems and methods | |
EP2633667A2 (en) | System and method for on the fly protocol conversion in obtaining policy enforcement information | |
US9100369B1 (en) | Secure reverse connectivity to private network servers | |
US11784993B2 (en) | Cross site request forgery (CSRF) protection for web browsers | |
US20230198987A1 (en) | Systems and methods for controlling accessing and storing objects between on-prem data center and cloud | |
US10931662B1 (en) | Methods for ephemeral authentication screening and devices thereof | |
US12363064B2 (en) | Zero-trust DNS and FQDN based traffic acquisition using synthetic IP | |
US12355589B2 (en) | Systems and methods for Virtual Private Network (VPN) brokering to enterprise resources | |
WO2023020606A1 (en) | Method, system and apparatus for hiding source station, and device and storage medium | |
US11323426B2 (en) | Method to identify users behind a shared VPN tunnel | |
US20250158989A1 (en) | Systems and methods for directing and enforcing zero trust control on requests to destination services | |
US20250159023A1 (en) | Systems and methods for active exposure and unwanted connection protection | |
US20250159022A1 (en) | Systems and methods for intelligent application definition and protection | |
US20250158990A1 (en) | Systems and methods for dynamic distributed name resolution | |
US11122042B1 (en) | Methods for dynamically managing user access control and devices thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |