Abstract:
Techniques are disclosed for dynamically mitigating 'a noncompliant password. The techniques include obtaining a password from a user when the user attempts to access a service; determining whether the password meets quality criteria; and if the password does not meet the quality criteria, performing one or more responsive actions that relate to accessing the service.
Abstract:
A method is disclosed for performing on-demand posture validation for all of multiple clients or supplicants of an authentication system, comprising creating and storing a session list identifying communication sessions relating to supplicants that access a computer network through an access device; receiving input requesting performing posture validation for all the supplicants; determining a time value for starting the posture validation for a particular supplicant identified in the session list; generating and sending to the access device, a request to perform posture validation, wherein the request comprises supplicant identifying information and the time value and instructs the access device to initiate the posture validation for that supplicant only after the time value has expired; and repeating the steps of determining, generating and sending for all supplicants in the session list.
Abstract:
A method is disclosed for performing on-demand posture validation for all of multiple clients or supplicants of an authentication system, comprising creating and storing a session list identifying communication sessions relating to supplicants that access a computer network through an access device; receiving input requesting performing posture validation for all the supplicants; determining a time value for starting the posture validation for a particular supplicant identified in the session list; generating and sending to the access device, a request to perform posture validation, wherein the request comprises supplicant identifying information and the time value and instructs the access device to initiate the posture validation for that supplicant only after the time value has expired; and repeating the steps of determining, generating and sending for all supplicants in the session list.
Abstract:
A method is disclosed for determining the authentication capabilities of a supplicant before initiating an authentication conversation with a client (104), for example, using Extensible Authentication Protocol (EAP). In one aspect, the method provides for sending (130), to a supplicant (104) that is requesting access to a computer network (110) subject to authentication of a user (102) of the supplicant (104), a list of first authentication methods (112) that are supported by an authentication server (150); receiving (152), from the supplicant (104), a counter-list of second authentication methods (112) that are supported by the supplicant (104); determining how many second authentication methods in the counter-list match the first authentication methods (154); and performing an authentication policy action based on how many of the second authentication methods match the first authentication methods (156). Policy actions can include blocking access, re-directing to sources of acceptable authentication methods, granting one of several levels of network access, etc (162-170).
Abstract:
A method is disclosed for determining the authentication capabilities of a supplicant before initiating an authentication conversation with a client (104), for example, using Extensible Authentication Protocol (EAP). In one aspect, the method provides for sending (130), to a supplicant (104) that is requesting access to a computer network (110) subject to authentication of a user (102) of the supplicant (104), a list of first authentication methods (112) that are supported by an authentication server (150); receiving (152), from the supplicant (104), a counter-list of second authentication methods (112) that are supported by the supplicant (104); determining how many second authentication methods in the counter-list match the first authentication methods (154); and performing an authentication policy action based on how many of the second authentication methods match the first authentication methods (156). Policy actions can include blocking access, re-directing to sources of acceptable authentication methods, granting one of several levels of network access, etc (162-170).