IL253210B2 - Database authentication proxy - Google Patents

Database authentication proxy

Info

Publication number
IL253210B2
IL253210B2 IL253210A IL25321017A IL253210B2 IL 253210 B2 IL253210 B2 IL 253210B2 IL 253210 A IL253210 A IL 253210A IL 25321017 A IL25321017 A IL 25321017A IL 253210 B2 IL253210 B2 IL 253210B2
Authority
IL
Israel
Prior art keywords
database
authentication
external
credentials
proxy server
Prior art date
Application number
IL253210A
Other languages
Hebrew (he)
Other versions
IL253210B1 (en
IL253210A0 (en
Inventor
Maman David
Original Assignee
Hexatier Ltd
Toga Networks Ltd
Huawei Tech Co Ltd
Maman David
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hexatier Ltd, Toga Networks Ltd, Huawei Tech Co Ltd, Maman David filed Critical Hexatier Ltd
Publication of IL253210A0 publication Critical patent/IL253210A0/en
Publication of IL253210B1 publication Critical patent/IL253210B1/en
Publication of IL253210B2 publication Critical patent/IL253210B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Description

DATABASE AUTHENTICATION PROXY FIELD OF THE INVENTION The present invention is of a system and method for a database authentication proxy and in particular, such a system and method for transparent authentication for an external database.
BACKGROUND OF THE INVENTION Relational databases, and their corresponding management systems, are very popular for storage and access of data. Typically, such databases require access credentials such as a username and password to be provided before they can be accessed. Ideally, an organization with one or more databases will use a centralized authentication server which manages Authentication, Authorization and Accounting (AAA) policies to ensure that users have appropriate access rights. A non-limiting example of an AAA server is Microsoft's Active Directory (AD). A further non-limiting example is an LDAP server.
Many organizations now also use databases that are external to the organization, such as cloud based databases, also known as Database as a Service (DBaaS). While DBaaS provides many advantages, it relies on static access credentials. In other words, each user or group of users may have static credentials for each DBaaS and cannot use credentials that can be internally verified. Since the DBaaS is external to the organization, it cannot be used with the internal AAA server and the organization therefore cannot control authentication and the level of access (permissions) as with internal services.
Organizations are thus not able to authenticate using organizational polices, need to manage multiple credentials per user, and cannot enforce policies according active directory grouping. A similar problem arises with databases that are on the internal network but do not support authentication using AAA servers. From the point of view of the AAA server these databases may also be considered external databases.
There is an unmet need for, and it would be highly useful to have a method and system transparently enabling local users to use of an organization's AAA services with external databases such as DBaaS and others.
SUMMARY OF THE INVENTION The present invention overcomes the deficiencies of the background art by providing a system and method, in at least some embodiments, for use of an internal AAA server with an external database. A database authentication proxy server is provided that maps and translates internal authentication using the AAA server to external authentication using the appropriate static or external credentials for the external database.
In use, database accessing applications direct requests for access to both internal and external databases to the database authentication proxy server, which is in communication with the AAA server of the organization and verifies user credentials and access policy from the AAA server. The authentication proxy server stores appropriate static/external access credentials for the external database and, following verification of a user's internal credentials and access permissions from the AAA server, enables access to the external database by logging into the external database using the appropriate access credentials.
These may include multiple external credentials for specific external databases each with specific access rights.
The database authentication proxy server is preferably part of a database proxy that provides other database related functionality such as database security, translation of queries between database languages, smart caching of query results, data masking of sensitive data and database auditing as well as other features.
According to at least some embodiments of the present invention, a method for database authentication termination comprises: providing a database authentication proxy server running on a computer; sending a login request for a database to the database authentication proxy server by an accessing application; verifying the login request with a AAA server by the database authentication proxy server; and when the login request is verified, and the database is an external database, initiating a session with the external database on behalf of the accessing application by the database authentication proxy server using external credentials. Preferably the login request comprises internal login credentials and verifying comprises verifying the user login credentials and querying the access rights of the user.
Preferably, the method further comprises provisioning the database authentication proxy server to define whether authentication termination is required for a database; confirming that a database requires authentication termination based on the provisioning; when the login request is not verified, informing the accessing application by the database authentication proxy server; when the database is an internal database, initiating a session with the internal database on behalf of the accessing application by the database authentication proxy server using the internal credentials.
Preferably, the external credentials are different per user and access level.
Optionally, the database is selected from the group consisting of: relational database, non-relational database, SQL based; MySQL based; Microsoft SQL based; Oracle SQL based; PostgreSQL based; and MongoDB based. Optionally, the session continues via a database proxy operated by a computer. Optionally, the database proxy comprises functionality selected from the group comprising: security; database encryption; caching; translation; acceleration; and data masking.
According to further embodiments of the present invention, a system for database authentication termination comprises: a database authentication proxy server running on a computer; a database running on a computer; a AAA server running on a computer; and an accessing application running on a computer; wherein the accessing application sends a login request for the database to the database authentication proxy server which verifies the login request with a AAA server; wherein when the login request is verified, and the database is an external database, a session is initiated with the external database on behalf of the accessing application by the database authentication proxy server using external credentials. Preferably, the login request comprises internal login credentials and the verifying comprises verifying the user login credentials and querying the access rights of the user.
Preferably, the database authentication proxy server is provisioned to define whether authentication termination is required for a database and the database authentication proxy server confirms whether a database requires authentication termination based on the provisioning. Preferably, the external credentials are different per user and access level. Preferably, when the login request is not verified, informing the accessing application by the database authentication proxy server. Preferably, when the database is an internal database, a session is initiated with the internal database on behalf of the accessing application by the database authentication proxy server using internal credentials. Preferably the database is selected from the group consisting of: relational database, non-relational database, SQL based; MySQL based; Microsoft SQL based; Oracle SQL based; PostgreSQL based; and MongoDB based.
Optionally, the system comprises a database proxy operated by a computer and wherein the session continues via the database proxy. Optionally, the database proxy comprises functionality selected from the group comprising: security; database encryption; caching; translation; acceleration; and data masking.
As used herein the terms internal and external relate to the ability to use the internal AAA server (such as Active Directory and others). External databases cannot be used with the AAA server while internal databases can access the AAA server for verification of user access. Thus, as used herein, a database that is part of the same internal network as the AAA but which does not support authentication via the AAA server is considered an external database. Non­ limiting examples of external databases include Database as a Service (DBaaS), hosted database, cloud database, or any database not supporting or without access to the relevant AAA server.
The terms static credentials as used herein refers to a username and password combination however, the credentials may also include some other identifier or may be based on a dynamic identifier such as those used for two- factor authentication such as generated by a token, dongle, soft token, app or other software or hardware. As used herein, internal credentials are those that can be verified by the AAA server and also used with an internal database and external credentials are those used for accessing external databases.
Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The materials, methods, and examples provided herein are illustrative only and not intended to be limiting.
Implementation of the method and system of the present invention involves performing or completing certain selected tasks or steps manually, automatically, or a combination thereof. Moreover, according to actual instrumentation and equipment of preferred embodiments of the method and system of the present invention, several selected steps could be implemented by hardware or by software on any operating system of any firmware or a combination thereof. For example, as hardware, selected steps of the invention could be implemented as a chip or a circuit. As software, selected steps of the invention could be implemented as a plurality of software instructions being executed by a computer using any suitable operating system. In any case, selected steps of the method and system of the invention could be described as being performed by a data processor, such as a computing platform for executing a plurality of instructions.
Although the present invention is described with regard to a "computer", it should be noted that optionally any device featuring a data processor and the ability to execute one or more instructions may be described as a computer, computing device, mobile computing device, or user device including but not limited to any type of personal computer (PC), a server, a cellular telephone, an IP telephone, a smartphone, a PDA (personal digital assistant), or a pager. A server as used herein may refer to any of a single server, multiple servers, distributed servers or cloud computing environment. Any two or more of such devices in communication with each other may optionally comprise a "computer network".
BRIEF DESCRIPTION OF THE DRAWINGS The invention is herein described, by way of example only, with reference to the accompanying drawings. With specific reference now to the drawings in detail, it is stressed that the particulars shown are by way of example and for purposes of illustrative discussion of the preferred embodiments of the present invention only, and are presented in order to provide what is believed to be the most useful and readily understood description of the principles and conceptual aspects of the invention. In this regard, no attempt is made to show structural details of the invention in more detail than is necessary for a fundamental understanding of the invention, the description taken with the drawings making apparent to those skilled in the art how the several forms of the invention may be embodied in practice.
In the drawings: FIGS. 1A-1B show an exemplary, illustrative non-limiting system for a database authentication proxy server, according to some embodiments of the present invention; FIG. 2 shows an exemplary non-limiting screenshot of a provisioning interface for a database authentication proxy server according to at least some embodiments of the present invention; and FIG. 3 is a flowchart of an exemplary, illustrative method for operation of a database authentication proxy server according to at least some embodiments of the present invention.
DESCRIPTION OF THE PREFERRED EMBODIMENTS The present invention provides a system and method, in at least some embodiments, for a database authentication proxy server that enables use of an internal AAA server with an external database. Non-limiting examples of AAA servers include LDAP, and Microsoft Active Directory. In a preferred embodiment a user can use internal login credentials or user single sign on technologies for accessing an external database via the database authentication proxy server.
Referring now to the drawings, Figure 1A and 1B show an exemplary, illustrative non-limiting system for a database authentication proxy server, according to some embodiments of the present invention. As shown in Figure 1A, a system 100 features a plurality of database accessing applications 102 for providing a software application interface to access one or more of a plurality of internal and external databases 104. Two database accessing applications 102, A and B, are shown for the purpose of illustration only and without any intention of being limiting. Three databases 104, Internal database A, and external databases B and C, are shown for the purpose of illustration only and without any intention of being limiting.
Database accessing application 102 may optionally be any type of software, or many optionally form a part of any type of software, for example and without limitation, a user interface, administrative applications, a back-up system, web applications, data accessing solutions, data warehouse solutions, CRM (customer relationship management) software and ERP (enterprise resource planning) software.
Database accessing application 102 is adapted for queries to, and responses from a database system and therefore communicates using the languages and protocols of databases.
Accessing application 102 is a software application (or applications) that is operated by some type of computational hardware, shown as a computer 106.
However, optionally computer 106 is in fact a plurality of separate computational devices or computers, any type of distributed computing platform and the like; nonetheless, a single computer is shown for the sake of clarity only and without any intention of being limiting.
Similarly, database 104 is a database software application (or applications) that is operated by some type of computational hardware, shown as a computer 108. Again, optionally computer 108 is in fact a plurality of separate computational devices or computers, any type of distributed or cloud computing platform and the like; nonetheless, a single computer is shown for the sake of clarity only and without any intention of being limiting.
Database 104 may optionally be implemented according to any type of database system or protocol; however, according to preferred embodiments of the present invention, database 104 is implemented as a relational database with a relational database management system. Optionally, database 104 is non­ relational. Non-limiting examples of different types of databases include SQL based databases, including but not limited to MySQL, Microsoft SQL, Oracle SQL, PostgreSQL, MongoDB, and so forth. Optionally and preferably, system 100 may comprise a plurality of different databases 104 operating according to different database protocols and/or query languages and/or even having different structures.
Database authentication proxy server 110 is shown as being operated by a computer 112, but in fact could optionally be implemented as software (by computer 112 for example), hardware, firmware or a combination thereof. Again, if present, optionally computer 112 is in fact a plurality of separate computational devices or computers, any type of distributed computing platform and the like; nonetheless, a single computer is shown for the sake of clarity only and without any intention of being limiting.
System 100 comprises an internal zone 114 and an external zone 120.
Internal zone 114 is here shown as computing network 116 with shared access to a AAA server 140. Internal zone 114 is defined by connectivity of the various components therein to the AAA server and is not limited to a specific geographical location or specific network. External zone 120 is shown here as a single zone, however, external zone 120 may comprise multiple networks, regions and zones and is here identified by a non limiting single external zone 120 to illustrate a zone wherein the databases either have no access to AAA server 1 or wherein the database platform/version does not support authentication with AAA services. External database A 104 and external database B 104 are therefore characterized by inability to connect or to use the services of AAA server 140.
Internal computer network 116 may optionally comprise a local area network, while external computer network 118 may optionally be the Internet, although both of networks 116 and 118 could be the same network and/or could be implemented according to any type of computer network.
In this embodiment of the system 100 according to the present invention, database authentication proxy server 110 preferably is addressable through both computer networks 116 and 118; for example, database authentication proxy server 110 could optionally feature an IP address for being addressable through either computer network 116 and/or 118.
Database authentication proxy server 110 preferably comprises an authentication module 130 as shown. Authentication module 130 is in communication with databases 104, optionally through a database connection interface A, B and C 132 as shown. Each database connection interface 132 is optionally specific for a particular type of database software 104, for example; optionally only a single such database connection interface 132 may be implemented (not shown). Database connection interface 132 is preferably able to communicate with each database 104, for authentication or other communication. Authentication module 130 is also in communication with AAA server 140 via network 116.
Database connection interface 132 and authentication module 1 optionally and preferably rely upon database commands for authentication and database access using database languages and protocols as known in the art, according to the type of database 104. Authentication module is also adapted to communicate with AAA server 140 using languages and protocols as known in the art.
In a configuration stage, authentication module 130 is provisioned with information related to databases 104 via provisioning module 134. The provisioning information, further described below with reference to figure 2, is entered and stored in provisioning module 134 and includes an indication as to whether the database 104 requires authentication termination or not.
All database authentication requests from database accessing applications 102 to databases 104 are directed via database authentication proxy server 110.
Accessing applications A or B 102 optionally communicate with database authentication proxy server 110 via query interface 126 A or B as shown. Query interface 126 may optionally be adapted for each accessing application 102; alternatively a single query interface 126 may optionally be provided (not shown).
When a user (not shown) of a database accessing application 102 attempts to log into a database 104, the authentication request is passed from the database accessing application 102 to authentication module 130 optionally via the query interface 126. The authentication request preferably includes the internal user credentials.
Optionally, database authentication proxy server 110 receives authentication requests through a particular port for each database type. By "database type" it is meant a particular combination of database structure, protocol and query language. For example, one database type could optionally be a relational database operated by MySQL, while another database type could optionally be a relational database operated by MS (Microsoft) SQL.
Authentication requests for each such type are preferably received through a different port, which accessing application 102 is more preferably configured to access. Optionally there could be a generic port for any non pre-configured database types.
Authentication module 130 connects to AAA server 140 to verify the login request. Verifying the login request comprises verifying the received credentials and querying the access rights of the accessing user. AAA server 140 stores credentials and related policies in a user policy module 144. The credentials and access rights of the particular user are verified for the database 104 requested in the login request. This information is returned to authentication module 1 from AAA server 140.
Authentication module 130 then proceeds differently depending on whether the database 104 requires authentication termination or not, whether the user login has been verified, and the level of access allowed for the user. In the case where authentication termination is required and the user login is verified, such as for external databases A and B 104, authentication module now performs a login based on the relevant static credentials for that database A or B 104 on behalf of the accessing application. Multiple static credentials may be stored in provisioning module 134 for a particular external database A or B 104 to allow for multiple levels of access to external databases A or B 104.
In the case where authentication termination is not required and the user login is verified, such as for internal database C 104, authentication module 1 now performs a login on behalf of the accessing application based on the relevant credentials for that database C 104. Optionally, static credentials may be stored in provisioning module 134 for a particular internal database to allow for multiple levels of access to internal databases 104.
In either case, once the login/authentication process is completed the database session continues between the accessing application 102 and the database 104, preferably via proxy server 160.
In either case, where a user is denied access, authentication module 1 sends a rejection message to the accessing application 102 using the appropriate database protocol or language.
As shown in figure 1B, database authentication proxy server is optionally part of a database proxy server 160 offering additional database functionality as described below. Following the granting of access and the completion of the authentication process opposite a database 104 as described herein, all database queries and responses optionally pass through database proxy 160.
Database proxy server 160 is operated by some type of computational hardware, shown as a computer 162. As above, optionally computer 162 is in fact a plurality of separate computational devices or computers, any type of distributed or cloud computing platform and the like; nonetheless, a single computer is shown for the sake of clarity only and without any intention of being limiting.
Functionality offered by database proxy 160 optionally includes security 164, database encryption 166, caching 168, translation 170, acceleration 172 and data masking 174 which are described below and are disclosed in US patent applications 14/380,036, 13/698,055, 13/813,662, and 14/541,416.
In a typical prior art system, accessing application 102 would communicate directly with database 104, and would therefore need to be able communicate in the query language and according to the query protocol for database 104.
However, in this illustrative embodiment of the present invention, accessing application 102 communicates with database 104 through translation apparatus 170 which provides translation into the query language and according to the query protocol of the used database.
Security apparatus 164 preferably screens all received queries and data from portions of system 100 that are external to databases 104, including for example accessing applications 102 A and B. Caching module 168 at least temporarily stores requests and responses for example, or any other data or information which could improve the performance of system 100. Caching 1 may optionally be used alone or in combination with a database acceleration module 172 for further improving the performance of system 100. Also optionally one or more databases 104 may be encrypted, such that queries to and responses from such an encrypted database 104 are also encrypted, through a database encryption module 166.
These embodiments with regard to different database types and non­ limiting examples of advantages may also optionally be applied to any of the embodiments of the system according to the present invention as described herein.
Reference is now made to figure 2 which is an exemplary non-limiting screenshot of a provisioning interface for a database authentication proxy server according to at least some embodiments of the present invention.
As shown, a checkbox 210 defines whether authentication termination is required for a specific database. Where authentication termination is required, such as for an external database as described herein, provisioning boxes for the database authentication method (dropdown list 212), and static credentials for the database, including the username (username box 214) and password (password box 216) are provided.
Checkbox 240 to enable fallback allows for a situation when the authentication termination process fails and direct access from the accessing application to the external database is allowed.
Additional provisioning elements (not shown) include details of the AAA server, such as server 140. These details include the type of AAA server, protocols supported, and authentication details required.
Figure 3 is a flowchart of an exemplary, illustrative method for operation of a database authentication proxy server according to at least some embodiments of the present invention. It is assumed, before the method starts, that the authentication module 130 has been provisioned with the authentication configuration of the connected databases 104 as described above.
As shown, in stage 1, a user attempts to log into a chosen database 104 via an accessing application 102. The login/access request is optionally transferred via the query interface 126 of the database authentication proxy server 110 to the authentication module 130. The access request comprises internal login credentials as described above. In stage 2, the authentication module 1 verifies the provided internal user credentials and access rights to the chosen database 104 of the user by querying the AAA server 140.
In stage 3 the AAA server 140 responds to the request from the authentication module 130 verifying the internal user credentials and access permissions for the chosen database or indicating that these are not verified and that access should be denied. Stages 4 and 5 depend on the response from the AAA server 140 and also the provisioning of the chosen database 104 in the database authentication proxy server 110.
In stage 4A, the AAA server 140 has verified the user credentials and access permission to the chosen database and the authentication module 1 checks the provisioning module 134 to confirm that the chosen database 104 is a database that is provisioned in the database authentication proxy server 110 as a database requiring authentication termination. In stage 5A, the authentication module initiates a connection/session with an external database A or B 1 optionally via a database connection interface 132 using the appropriate external credentials for the user and access permissions. In stage 6, the user is now connected to the external database A or B 104 and the database session may continue, optionally via proxy 160 as described above.
In alternative stage 4B, the AAA server 140 has verified the user credentials and access permission to the chosen database and the authentication module 130 checks the provisioning module 134 to confirm that the chosen database 104 is a database that is provisioned in the database authentication proxy server 110 as a database that does not require authentication termination.
In stage 5A, the authentication module initiates a connection to the internal database C 104 optionally via a database connection interface 132 using the user's internal credentials provided in stage 1. In stage 6, the user is now connected to the internal database C 104 and the database session may continue, optionally via proxy 160 as described above.
In alternative stage 4C, the AAA server 140 has indicated that the user is not allowed to access the chosen database optionally along with the reason of denial. In stage 5C, the authentication module 130 sends an appropriate "access denied" message back to the user via the accessing application 102 and optionally via the query interface 126.
While the invention has been described with respect to a limited number of embodiments, it will be appreciated that many variations, modifications and other applications of the invention may be made.

Claims (18)

What is claimed is:
1. A method for database authentication termination comprising: sending a login request for a database to a database authentication proxy server by an accessing application, wherein login requests for different pre-configured database types are sent through different ports and a login request for any non pre-configured database type is sent through a generic port, wherein said database authentication proxy server is running on a computer; verifying said login request with an AAA server by said database authentication proxy server; provisioning said database authentication proxy server to define whether authentication termination is required for a database; confirming that a database requires authentication termination based on said provisioning; and when said login request is verified, and said database is an external database, initiating a session with said external database on behalf of said accessing application by said database authentication proxy server using external credentials, wherein the external credentials are stored in said database authentication proxy server for said particular external database, wherein the external database is a database requiring authentication termination, wherein the external database is a database not supporting the AAA server.
2. The method of claim 1, wherein said login request comprises internal login credentials.
3. The method of claim 2, wherein said verifying comprises verifying said user login credentials and querying the access rights of the user.
4. The method of claim 1, wherein said external credentials are different per user and access level.
5. The method of claim 1, further comprising, when said login request is not verified, informing said accessing application by said database authentication proxy server.
6. The method of claim 2, further comprising, when said database is an internal 30 database, initiating a session with said internal database on behalf of said accessing application by said database authentication proxy server using said internal credentials.
7. The method of claim 1 wherein said database is selected from the group consisting of: relational database, non-relational database, SQL based; MySQL based; Microsoft SQL based; Oracle SQL based; PostgreSQL based; and MongoDB based.
8. The method of claim 1, wherein said session continues via a database proxy operated by a computer.
9. The method of claim 8 wherein said database proxy comprises functionality selected from the group comprising: security; database encryption; caching; translation; acceleration; and data masking.
10. A system for database authentication termination comprising: a database authentication proxy server running on a computer; a database running on a computer; an AAA server running on a computer; an accessing application running on a computer; wherein said accessing application is configured to send a login request for said database to said database authentication proxy server which verifies said login request with said AAA server, wherein login requests for different pre-configured database types are sent through different ports and a login request for any non pre-configured database type is sent through a generic port; said database authentication proxy server is configured to verify said login request with said AAA server, provision to define whether authentication termination is required for a database, and confirm whether a database requires authentication termination based on said provisioning; when said login request is verified, and said database is an external database, a session is initiated with said external database on behalf of said accessing application by said database authentication proxy server using external credentials, wherein the external credentials are stored in said database authentication proxy server for said particular external database; wherein the external database is a database not 30 supporting to the AAA server.
11. The system of claim 10, wherein said login request comprises internal login credentials.
12. The system of claim 11, wherein said verifying comprises verifying said user login credentials and querying the access rights of the user.
13. The system of claim 10, wherein said external credentials are different per user and access level.
14. The system of claim 10, wherein when said login request is not verified, informing said accessing application by said database authentication proxy server.
15. The system of claim 11, wherein when said database is an internal database, a session is initiated with said internal database on behalf of said accessing application by said database authentication proxy server using internal credentials.
16. The system of claim 10, wherein said database is selected from the group consisting of: relational database, non-relational database, SQL based; MySQL based; Microsoft SQL based; Oracle SQL based; PostgreSQL based; and MongoDB based.
17. The system of claim 10, further comprising a database proxy operated by a computer and wherein said session continues via said database proxy.
18. The system of claim 10, wherein said database proxy comprises functionality selected from the group comprising: security; database encryption; caching; translation; acceleration; and data masking. 20
IL253210A 2016-07-27 2017-06-27 Database authentication proxy IL253210B2 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US201662367639P 2016-07-27 2016-07-27

Publications (3)

Publication Number Publication Date
IL253210A0 IL253210A0 (en) 2017-09-28
IL253210B1 IL253210B1 (en) 2023-12-01
IL253210B2 true IL253210B2 (en) 2024-04-01

Family

ID=62454928

Family Applications (1)

Application Number Title Priority Date Filing Date
IL253210A IL253210B2 (en) 2016-07-27 2017-06-27 Database authentication proxy

Country Status (1)

Country Link
IL (1) IL253210B2 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140073288A1 (en) * 2012-09-11 2014-03-13 Wavemax Corp. Mobile device authorization, authentication and data usage accounting for mobile data offload in a network of shared protected/locked wifi access points
CN103873449A (en) * 2012-12-18 2014-06-18 中国电信股份有限公司 Network access method and system
US20150234639A1 (en) * 2013-04-23 2015-08-20 Clearblade, Inc. System and Method for Creating a Development and Operational Platform for Mobile Applications
US20160359828A1 (en) * 2015-06-03 2016-12-08 Sap Se Sensitive information cloud service

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140073288A1 (en) * 2012-09-11 2014-03-13 Wavemax Corp. Mobile device authorization, authentication and data usage accounting for mobile data offload in a network of shared protected/locked wifi access points
CN103873449A (en) * 2012-12-18 2014-06-18 中国电信股份有限公司 Network access method and system
US20150234639A1 (en) * 2013-04-23 2015-08-20 Clearblade, Inc. System and Method for Creating a Development and Operational Platform for Mobile Applications
US20160359828A1 (en) * 2015-06-03 2016-12-08 Sap Se Sensitive information cloud service

Also Published As

Publication number Publication date
IL253210B1 (en) 2023-12-01
IL253210A0 (en) 2017-09-28

Similar Documents

Publication Publication Date Title
US10924465B2 (en) Split authentication network systems and methods
US10484385B2 (en) Accessing an application through application clients and web browsers
US10432608B2 (en) Selectively enabling multi-factor authentication for managed devices
US10055561B2 (en) Identity risk score generation and implementation
EP2973166B1 (en) Systems and methods for identifying a secure application when connecting to a network
US8327441B2 (en) System and method for application attestation
EP2761527B1 (en) Mobile application, single sign-on management
US9613224B2 (en) Integrating a user's security context in a database for access control
US10049205B2 (en) Asserting identities of application users in a database system based on delegated trust
US11368462B2 (en) Systems and method for hypertext transfer protocol requestor validation
EP3815329B1 (en) Registration of the same domain with different cloud services networks
CN105577835B (en) Cross-platform single sign-on system based on cloud computing
WO2021242454A1 (en) Secure resource authorization for external identities using remote principal objects
EP3062254B1 (en) License management for device management system
EP2795522B1 (en) Techniques to store secret information for global data centers
US9900294B2 (en) Key-based access in batch mode
IL253210B2 (en) Database authentication proxy
US20240236107A1 (en) Cloud based application access privilege governance
WO2023160632A1 (en) Method for setting cloud service access permissions of enclave instance, and cloud management platform
US20230113325A1 (en) External identity provider as a domain resource
Ferle Account Access and Security