Citrix Systems, Inc.
AUTHENTICATING ACCESS TO COMPUTING RESOURCES

Last updated:

Abstract:

Described embodiments provide systems, methods, computer readable media for accessing services via identity providers. A computing device may transmit, responsive to a request from a client to access a service, a value to the client. The client may be configured to access the service using an access token. The computing device may receive, from the client, a signature, the signature generated using the value, a device identifier, and a first encryption key. The computing device may determine, using the value and a second encryption key, the device identifier from the signature. The computing device may identify a status of the client according to the device identifier. The computing device may provide, responsive to the status, a new access token to permit access to the access and a refresh token to obtain subsequent access tokens.

Status:
Application
Type:

Utility

Filling date:

24 Apr 2020

Issue date:

28 Oct 2021