POLICY-BASED COMPLIANCE MANAGEMENT AND REMEDIATION OF DEVICES IN AN ENTERPRISE SYSTEM
- 申请公布号:
- US2016088021(A1)
- 申请号:
- US201514690045
- 申请日期:
- 2015.04.17
- 申请公布日期:
- 2016.03.24
- 申请人:
- Oracle International Corporation
- 发明人:
- Jayanti Venkata Bhagavati Kumar;Maheshwari Harsh;Mohamad Abdul Mohamad Raja Gani;Kandasamy Parthipan
- 分类号:
- H04L29/06;H04L29/08
- 主分类号:
- H04L29/06
- 地址:
- Redwood Shores CA US
- 摘要:
- The present disclosure relates generally to managing compliance of remote devices that access an enterprise system. More particularly, techniques are disclosed for using a compliance policy to manage remediation of non-compliances of remote devices that access an enterprise system. A device access management system may be implemented to automate remediation of non-compliances of remote devices accessing an enterprise system. Remediation may be controlled based on different levels of non-compliance, each defined by one or more different non-compliances. In some embodiments, a level of non-compliance may be conditionally defined by one or more user roles for which non-compliance is assessed. Access to computing resources of an enterprise system may be controlled for a remote device based on compliance of the remote device. Access may be inhibited for those resources not permitted during a time period of a non-compliance.
- 主权项:
- 1. A method comprising:
identifying a compliance policy for using a remote device with an enterprise computer system, wherein the remote device is registered to access the enterprise computer system; detecting, based on the compliance policy, a non-compliance of the remote device; assessing, by a computer system, based on the compliance policy, a level of non-compliance of the remote device; establishing, based on the compliance policy and the level of non-compliance, a time period for remediation of the non-compliance; receiving a request to access a computing resource in the enterprise computer system; providing access to the computing resource based on the level of non-compliance; inhibiting access to the computing resource in the enterprise computer system based on the level of non-compliance and based on determining that the time period has expired; and instructing the remote device to perform an action to remedy the non-compliance based on determining that the time period has expired.
Copyright Notice © 2009-2024 传众 版权所有