Multi-Tenanted Authentication for Applications

    公开(公告)号:US20250080530A1

    公开(公告)日:2025-03-06

    申请号:US18459093

    申请日:2023-08-31

    Abstract: In one embodiment, a method comprises accessing information associated with a user that is trying to login to an application, generating a first session identifier corresponding to the information, sending a first notification to an authentication client that the user is trying to login using an authentication service, receiving a first request from an authentication provider for authenticating a second session identifier, determining that the second session identifier is identical to the first session identifier by comparing the second session identifier with stored first session identifier, and causing the authentication provider to patch one or more authentication tokens with the information regarding the tenant, where the one or more authentication tokens are used for accessing the application.

    Systems and Methods to Determine Attack Paths to Application Assets

    公开(公告)号:US20240265113A1

    公开(公告)日:2024-08-08

    申请号:US18330255

    申请日:2023-06-06

    CPC classification number: G06F21/577 G06F21/552 G06F2221/033

    Abstract: A system and a method to determine attack paths to application assets may include storing in a memory asset inventory indicating multiple application assets, multiple attack vector parameters configured to indicate vulnerabilities of one or more of the application assets, and asset mapping information configured to associate each of the application assets to one or more of the application layers. A processor may determine multiple vulnerable assets in the application assets based at least in part upon the attack vector parameters. Further, the processor may determine feasibility parameters that indicate a likelihood of the attack path to occur in the system, generate a visual interface showing the vulnerable assets, determine an attack path connecting the vulnerable assets based at least in part upon the asset mapping information, and map the attack path to the application layers in the visual interface based at least in part upon the feasibility parameters.

Patent Agency Ranking