F5, Inc.
Methods for managing security tokens based on security violations and devices thereof

Last updated:

Abstract:

Methods, non-transitory computer readable media, and network traffic manager apparatus that assists managing security tokens based on security violations includes monitoring network traffic data between a client and a web application server. Next, the monitored network traffic data is determined for at least one security violation. One or more access tokens associated with the client is modified when the at least one security violation is detected in the monitored network traffic data. The client is restricted from accessing one or more web applications based on the modified one or more access tokens.

Status:
Grant
Type:

Utility

Filling date:

29 Sep 2017

Issue date:

20 Oct 2020