Abstract:
Techniques for centralized publishing of network resources within computer networks are described. Publication of and access to the network resources are controlled from a single, centralized location, advantageously improving the uniformity of network administration responsibilities, and overall robustness of the network.
Abstract:
A credential security support provider (Cred SSP) enables any application to securely delegate a user's credentials from the client, via client side Security Support Provider (SSP) software, to a target server, via server side SSP software. The Cred SSP provides a secure solution based in part upon a set of policies. The policies can be for any type of user credentials and the different policies are designed to mitigate a broad range of attacks so that appropriate delegation can occur for given delegation circumstances, network conditions, trust levels, etc. Additionally, only a trusted subsystem, e.g., a trusted subsystem of the Local Security Authority (LSA), has access to the clear text credentials such that neither the calling application of the Cred SSP APIs on the server side nor the calling application of the Cred SSP APIs on the client side have access to clear text credentials.
Abstract:
A server operating system supports multiple client-server sessions and enables a user to begin a session and later dynamically reconnect to that session even if the user uses two different client computers. The operating system has a multi-user session manager to enable multiple client-server sessions on the server and a multi-user stack protocol manager to manage one or more protocol stacks used in communicating with the clients. When a user connects to the server via a first client, the stack protocol manager assigns a first protocol stack to this first client-server connection and the session manager creates a first session for the user. When the user subsequently reconnects to the server using a second client that is different from the first client, the stack manager assigns a second protocol stack to a second client-server connection and the session begins creating a second session for the user. During this latter process, however, the session manager recognizes that the user is affiliated with the first session. The session manager adapts the first session to conform to the system configuration of the second client. The session manager then reassociates the second protocol stack with the reconfigured first session so that the user is returned to his/her original session, even though they logged on from a different client.
Abstract:
Embodiments provide for efficient encoding and rendering of remote graphic displays by applying one or more of the following: (1) field encoding for identifying fields of a graphics set such that commonalities of various fields across different graphics languages are identified; (2) resource caching, which treats heterogeneous resources in a homogeneous way when it comes to storing them; (3) determining the type of encoding for remoting items within a graphics set based upon the types of compression mechanisms supported by a remote device; (4) improving responsiveness by rendering with partially sent resources; (5) a mechanism for determining what portions (if any) of a graphics set should be sent to a remote device and in what order; and (6) use of dedicated resources already on a remote device in order to eliminate the transfer of a resource between a local device and the remote device when rendering such resource.
Abstract:
A credential security support provider (Cred SSP) enables any application to securely delegate a user's credentials from the client, via client side Security Support Provider (SSP) software, to a target server, via server side SSP software. The Cred SSP provides a secure solution based in part upon a set of policies. The policies can be for any type of user credentials and the different policies are designed to mitigate a broad range of attacks so that appropriate delegation can occur for given delegation circumstances, network conditions, trust levels, etc. Additionally, only a trusted subsystem, e.g., a trusted subsystem of the Local Security Authority (LSA), has access to the clear text credentials such that neither the calling application of the Cred SSP APIs on the server side nor the calling application of the Cred SSP APIs on the client side have access to clear text credentials.
Abstract:
EMBODIMENTS PROVIDE FOR EFFICIENT ENCODING AND RENDERING OF REMOTE GRAPHIC DISPLAYS BY APPLYING ONE OR MORE OF THE FOLLOWING: (1) FIELD ENCODING FOR IDENTIFYING FIELDS OF A GRAPHICS SET (155) SUCH THAT COMMONALITIES OF VARIOUS FIELDS ACROSS DIFFERENT GRAPHICS LANGUAGES ARE IDENTIFIED; (2) RESOURCE CACHING, WHICH TREATS HETEROGENEOUS RESOURCES IN A HOMOGENEOUS WAY WHEN IT COMES TO STORING THEM; (3) DETERMINING THE TYPE OF ENCODING FOR REMOTING ITEMS WITHIN A GRAPHICS SET (155) BASED UPON THE TYPES OF COMPRESSION MECHANISMS SUPPORTED BY A REMOTE DEVICE (110); (4) IMPROVING RESPONSIVENESS BY RENDERING WITH PARTIALLY SENT RESOURCES; (5) A MECHANISM FOR DETERMINING WHAT PORTIONS (IF ANY) OF A GRAPHICS SET SHOULD BE SENT TO A REMOTE DEVICE (110) AND IN WHAT ORDER; AND (6) USE OF DEDICATED RESOURCES ALREADY ON A REMOTE DEVICE (110) IN ORDER TO ELIMINATE THE TRANSFER OF A RESOURCE BETWEEN A LOCAL DEVICE (105) AND THE REMOTE DEVICE (110) WHEN RENDERING SUCH RESOURCE.
Abstract:
A CREDENTIAL SECURITY SUPPORT PROVIDER (CRED SSP) IS PROVIDED THAT ENABLES ANY APPLICATION TO SECURELY DELEGATE A USER'S CREDENTIALS FROM THE CLIENT, VIA CLIENT SIDE SECURITY SUPPORT PROVIDER (SSP) SOFTWARE, TO A TARGET SERVER, VIA SERVER SIDE SSP SOFTWARE IN A NETWORKED COMPUTING ENVIRONMENT. THE CRED SSP OF THE INVENTION PROVIDES A SECURE SOLUTION THAT IS BASED IN PART UPON A SET OF POLICIES, INCLUDING A DEFAULT POLICY THAT IS SECURE AGAINST A BROAD RANGE OF ATTACKS, WHICH ARE USED TO CONTROL AND RESTRICT THE DELEGATION OF USER CREDENTIALS FROM A CLIENT TO A SERVER. THE POLICIES CAN BE FOR ANY TYPE OF USER CREDENTIALS AND THE DIFFERENT POLICIES ARE DESIGNED TO MITIGATE A BROAD RANGE OF ATTACKS SO THAT APPROPRIATE DELEGATION CAN OCCUR FOR GIVEN DELEGATION CIRCUMSTANCES, NETWORK CONDITIONS, TRUST LEVELS, ETC. ADDITIONALLY, ONLY A TRUSTED SUBSYSTEM, E.G., A TRUSTED SUBSYSTEM OF THE LOCAL SECURITY AUTHORITY (LSA), HAS ACCESS TO THE CLEAR TEXT CREDENTIALS SUCH THAT NEITHER THE CALLING APPLICATION OF THE CRED SSP APIs ON THE SERVER SIDE NOR THE CALLING APPLICATION OF THE CRED SSP APIs ON THE CLIENT SIDE HAVE ACCESS TO CLEAR TEXT CREDENTIALS.