Managing network resource access using session context

ABSTRACT

A computing device providing a network service to a service area may receive a connection request from a user device and generate a session start request to start a user session in a service domain covering the service area. One or more policy rules may be evaluated to determine whether any rule is applicable to the user device, which includes determining that an authoritative user session has already been established in the service domain. The user session may be established in the service domain for the user device, and at least one permission for access to a controlled network resource may be associated with the user session based on the determination that the authoritative user session has already been established. A request from the user device to access the controlled network resource may be received and access to the controlled network resource may be granted.

CROSS REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. application Ser. No.14/795,264 filed Jul. 9, 2015. The entirety of this application isincorporated herein by reference.

TECHNICAL FIELD

The present disclosure relates to network access management.

BACKGROUND

Access to network resources is normally controlled for users of anetwork. For example, in an enterprise environment, a manager usuallyinserts a key or swipes a card on a staff's terminal to activatefunctions at the terminal on arrival and deactivate the functions beforehe/she goes for a break or leaves for the day. Another example isparental control in a home environment, in which access to the networkmay be allowed by a parent entering a passcode or based on the time ofday to loosely approximate a parent's work and home schedule.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a system block diagram illustrating an example computingenvironment in which the network resource access techniques presentedmay be employed, according to an example embodiment.

FIG. 2 is an operational flow diagram illustrating the network resourceaccess techniques, according to an example embodiment.

FIG. 3 is a system block diagram illustrating another computingenvironment in which the network resource access techniques presentedmay be employed, according to an example embodiment.

FIG. 4 is another operational flow diagram illustrating the networkresource access techniques, according to an example embodiment.

FIG. 5 is a sequence diagram illustrating sequence of events andcommunication between different components of a computing environment,according to an example embodiment.

FIG. 6 is a flowchart of a method of enforcing network resource accesscontrol, according to an example embodiment.

DESCRIPTION OF EXAMPLE EMBODIMENTS Overview

Techniques are provided for managing access to a network resource.According to one embodiment, a computing device may receive a connectionrequest from a user device. The computing device may provide a networkservice to a service area and may generate a session start request tostart a user session in a service domain covering a service area. One ormore policy rules may be evaluated to determine whether any rule isapplicable to the user device, which may include determining that anauthoritative user session has already been established in the servicedomain. The user session may be established in the service domain forthe user device. At least one permission for access to a controllednetwork resource may be associated with the user session based on thedetermination that the authoritative user session has already beenestablished. A request from the user device to access the controllednetwork resource may be received and access to the controlled networkresource may be granted to the user device based on the at least onepermission.

Example Embodiments

Authentication, authorization and accounting (AAA) services are used formanaging network login. One example AAA implementation is a RemoteAuthentication Dial In User Service (RADIUS) server, such as an IdentityService Engine (ISE), which may support definition of a policy thatgoverns the authorization (such as in the form of an Access Control List(ACL)). One individual may login to a network and an ISE may obtain ACLsfor that individual based on the individual's context (e.g., who, where,what is that individual's device). ISE may also support devicefingerprinting and device type profiling classification such assmartphone/wearable, laptop, etc. The ACL may be enforced by thecomputing devices such as switches/wireless controllers and firewalls.Context information may also be used for granting ACLs. The contextinformation may include the location of the individual, for example,determined based on where the network connectivity is established (suchas the location of the access point (AP)), or determined directly by thelocation of the end device (e.g., in the case of smart phone with GPSequipped). Some AAA implementations, such as a Mobility Services Engine(MSE), may use triangulation from the AP to determine accurate physicallocation of individual from their wearable or mobile device. As theindividual is authorized on the network, the ISE may keep track theindividual's active session on the network. When the individual moves orleaves the location, the AP serving the connection would change, or thenetwork would terminate the user session associated with the individual.Embodiments of the present disclosure support definition of policy whichmay govern authorization (e.g., in the form of ACL) for any individualon a network and the authorization may be based on the individual's owncontext as well as a plurality of other individual's context.

With reference to FIG. 1 there is shown an example computing environment100 in which access control for a network resource may be implemented.The computing environment 100 may comprise a network device 106 as agateway to a network 118, which may be connected to a controlledresource 120. Users, such as User A and User B may use their respectiveuser devices 102(1) and 102(2) to connect to the network device 106 andaccess the network 118 via the network device 106. The user devices102(1) and 102(2) may be mobile user devices (e.g., laptops, smartphones, pad devices, wearable devices) or desktop devices (e.g., desktopcomputers, terminal devices). The user devices 102(1) and 102(2) may beconnected to the network device 106 via respective connections 104(1)and 104(2). The connections 104(1) and 104(2) may be wireless or wired,depending on the way the user devices 102(1) and 102(2) may beconnected. For example, the user device 102(1) may be a desktop computerand the connection 104(1) may be a wired Ethernet connection, and theuser device 102(2) may be a mobile computing device and the connection104(2) may be a wireless connection (e.g., Wi-Fi®). The network 118 maybe a local area network (LAN), a wide area network (WAN), Intranet,Internet or Virtual Private Network (VPN). The controlled resource 120may be, for example, a data storage (e.g., a file sharing location or adatabase), an application server, a game website, a social mediawebsite, a video streaming website.

The network device 106 may be a computing device that comprises anetwork interface 108, a processor 110, and a memory 112. The networkinterface 108 may comprise one or more ports, for example, Ethernetports to enable network communication. The network device 106 maycomprise a network module 114 and a policy module 116. The networkmodule 114 may implement logic and/or operations that provide networkingfunctionalities and the policy module 116 may implement logic and/oroperations that provide AAA and related functionalities. The networkdevice 106 may further include a network processor application specificintegrated circuit (ASIC) that assists in network switching or routingfunctionalities.

The memory 112 may be read only memory (ROM), random access memory(RAM), magnetic disk storage media devices, optical storage mediadevices, flash memory devices, electrical, optical, or otherphysical/tangible memory storage devices. Thus, in general, the memory112 may comprise one or more tangible (non-transitory) computer readablestorage media (e.g., a memory device) encoded with software comprisingcomputer executable instructions and when the software is executed (bythe processor 110) it is operable to perform the operations describedherein. In particular, the network device 106 performs the some or alloperations described herein in connection with FIGS. 1-6 when executingthe software stored in memory 112.

With reference to FIG. 2, there is shown a flow of events in thecomputing environment 100, according to an example embodiment. Asdepicted in FIG. 2, the policy module 116 may include an event module202, a policy evaluation module 204, a directory module 206, a policyrule module 208, an authorization result 210 and a session module 212.The network module 114 may include a permission determination module 216and a firewall table 218. In this example, the user Bob has managerialresponsibility and privileges (e.g., a parent in a home environment) anduser Dave is a regular user (e.g., a child). There is an active networksession for Bob in the computing environment 100, and this networksession may be used to determine whether Dave may be granted access to acontrolled network resource.

An example sequence of events may be as follows. These events areidentified by reference numerals (1)-(22) in FIG. 2. At (1), Bob may loginto the network at a network device, which in this example may be anetwork access point, and a session start event may be triggered at theevent module 202. The network access point may be a network component(e.g., a switch, wireless controller or network module), which maynotify the AAA policy module 116 of the session start request. In someembodiments, the session start may be conveyed with a RADIUS accessrequest message, a Simple Network Management Protocol (SNMP) port up, orRADIUS accounting start message. The session start event may trigger apolicy evaluation at (2). The policy rule evaluation module 204 maystart a policy evaluation process by validating Bob's credential anddetermining Bob's group membership/entitlement at (3). The groupmembership information may be implemented in the directory module 206,which for example, may indicate that Bob belongs to the group “Parent.”

After determining the group membership, the policy evaluation module 204may evaluate the policy definitions in the policy rule module 208 at(4). In this example, at this moment, the subject “Bob” is the only oneconnected in the service domain for the service area and there is noapplicable rule that restricts Bob's access. Thus, at (5), Bob may beauthorized onto the network with ACL(s) entitled to Bob, for example,permissions that allow Bob to access all available network resources. Asindicated at (6), Bob now may have a session on the network and thesession table in the session module 212 may be updated accordingly tokeep a record of this session.

At (7), another subject Dave, a child, may connect to network. Thenetwork access point (e.g., a switch, wireless controller or networkmodule) to which Dave's device is connected may notify the policy module116 of a session start request. Similar to Bob's connection, the sessionstart may be conveyed with a RADIUS access request message, a SNMP portup, or RADIUS accounting start message and a policy evaluation may betriggered at (8).

At (8), the policy rule evaluation module 204 may start the policyevaluation process again, this time by validating Dave's credentials anddetermining Dave's group membership. The group membership information inthe group directory 206 may indicate that Dave belongs to the group“Kid.” After determining the group membership, the policy evaluationmodule 204 may evaluate the policy rule definitions in the policy rulemodule 208 at (9) for Dave. In this example, there are two rules withcondition “Subject in Kid . . . ” that are applicable to Dave. Each rulemay have one or more conditions that may be based on a plurality ofsession contexts including whether there is a session for a userbelonging to the group “Parent” and that the session device is a Mobiledevice. A query may be performed on the session table 212 at (11). Inone embodiment, a relational join of the group directory with thesession table may be performed to query the session table for usersbelonging to the group “Parent.” Because Bob's mobile session exists inthe session table 212, the authorization result 210 may comprise an ACL1214(1), which may include permissions to access resources classified as“G,” “PG,” and “PG13.” The ACL1 214(1) may be returned, at (12), to thenetwork module 114 for Dave. In one embodiment, for example, the ACL1214(1) may be in the form of a RADIUS access accept carrying the ACLattribute, and/or the network module 114 may set the ACL accordingly. Inone embodiment, the ACL1 214(1) may be stored in the firewall table 218of the network module 114. At (13), the session table may be updatedwith Dave's session entry.

When Dave tries to access resource X at (14), a packet with adestination to the resource X may be received at the network module 114.The permission determination module 216 may check the firewall table 218to determine if an ACL disallowing Dave's access to resource X exists,and the permission determination module 216 permits or denies thetraffic accordingly.

At (15), Bob may disconnect from the network. This may cause a sessionstop event to be generated in the policy module 116, for example, in theform of SNMP port down, RADIUS accounting stop, etc. The session table212 may be updated to remove Bob's session (or change the status toindicate that Bob's device is not online) at (16). The session stopevent may also trigger a re-evaluation of one or more policy rulesaffected by the session stop event at (17). The policy rule evaluationmodule 204 may re-evaluate the policy rules at (18) to determine ifthere is any session that should be affected, for example, whether thereis any session for users in the “Kid” group. At (19), a query againstthe group directory 206 and session table 212 may be performed and itmay be determined that Dave's session is affected. Now with Bob'ssession gone (or becoming inactive), there may be no active session forusers in the “Parent” group with a mobile device, such that the firstrule in the policy rule module 208 will no longer be applicable.However, a query at (20) may determine that Dave's session satisfies thesecond rule in the situation. Therefore, the policy evaluation module204 at (21) may generate the authorization result 210 comprising theACL2 214(2), and the ACL1 214(1) previously granted to the Dave'ssession may be revoked. Consequently, the permission to access thecontrolled network resource previously granted to the Dave's session maybe revoked. The ACL2 214(2) may be assigned to Dave's session and achange of authorization (including granting of new permissions andrevocation of the previous permissions) may be performed, for example,in the form of a RADIUS change of authorization packet sent to thenetwork module 114, or adjustment of firewall table 218 in the networkmodule 114. Dave may try to access resource X at (22). However, when thepacket is received at the network module 114, the permissiondetermination module 216 may check the firewall table 218 and deny thetraffic.

Embodiments of the computing environment 100 may be used in home andeducation environments. At home, parental control may be implemented toallow access to certain Internet or TV program only if one parent isalso at home. In the education environment, access to some networkcontent may be allowed only if a teacher is present to facilitate andsupervise the consumption of the content. In some embodiments, it may beused to protect children; in some other embodiments, it may also be useddue to licensing arrangement with a content provider.

With reference to FIG. 3, there is an illustration of another examplecomputing environment 300 in which network resource access control maybe implemented. The computing environment 300 may also comprise anetwork device 106, a network 118, and a controlled resource 120. Users,such as User A and User B may use their respective user devices 102(1)and 102(2) to connect to the network device 106 and access the network118 via the network device 106. In contrast to the computing environment100, the computing environment 300 may further comprise a computingdevice 302 to host the policy module 116. In some embodiments, thecomputing device 302 may be a server computer configured with one ormore computer processors and one or more memories, and the policy module116 may be implemented as software module stored in the one or morememories and executed by the one or more computer processors. In oneexample, the computing device 302 is the aforementioned Identity ServiceEngine (ISE). The computing device 302 may be part of a cloud-based ordata center computing system.

With reference to FIG. 4, there is shown an operational flow accordingto the techniques presented herein in the computing environment 300 ofFIG. 3. As depicted in FIG. 4, the user devices in the computingenvironment 300 may be connected to a network 416 via access points(APs) 418(1), 418(2) or a port on a switch 420. The network 416 may be aLAN, WAN, Internet, Intranet, or VLAN. The network 416 may be connectedto a server 302. The server 302 may be implemented as an AAA server andbe configured to execute the policy module 116. The policy module 116 inthe computing environment 300 may comprise an event module 402, a policyevaluation module 404, a policy rule module 408, an authorization result410 and a session module 412. The event module 402 may include RADIUSAuthentication module 424, RADIUS Accounting module 426 and Device TypeProfiling module 428. The RADIUS Authentication module 424 may implementauthentication techniques in accordance with the RADIUS protocol. TheRADIUS Account module 426 may implement logic to keep track of usersessions for accounting purposes (e.g., for billing). The Device TypeProfiling module 428 may implement logic to identify user device typesbased on network protocols, such as Hypertext Transfer Protocol (HTTP),Dynamic Host Configuration Protocol (DHCP), and/or Network Mapper(NMAP). Although not shown, the events, such as the session start,session stop events, are still being triggered and propagated by theevent module 402.

In contrast to the computing environment 100, a directory service 406may be used in the computing environment 300 instead of the groupdirectory 206. The directory service 406 may be a separate service andnot part of the policy module 116. In one embodiment, the directoryservice 406 may be an existing enterprise directory service, such as anActive Directory (AD) and/or The Lightweight Directory Access Protocol(LDAP) directory.

The policy evaluation module 404 may be implemented similarly to itscounterpart policy evaluation module 204 in the computing environment100, with an exception that the policy evaluation may be performed byquerying the directory service 406 instead of the group directory 206.The policy rule module 408 may comprise policy rule definitions, just asits counterpart policy rule module 208. The authorization result 410 mayinclude ACLs 414(1) and/or 414(2) depending on whether the policy rulefor ACL1 or ACL2 may be satisfied at any particular moment.

Although not shown, the network 416 may also comprise a permissiondetermination module and a firewall table at a network device (as shownin FIG. 2), and ACLs may be used to configure the firewall table andcontrol access to network resources. It should be noted that the network416 may also include a location determination service, such as theMobility Services Engine (MSE) location server 422. Because there may bemany network access points in a business environment, locationinformation for any mobile device connected to the network 416 may beassociated with the user sessions as shown in the session table 412. Itshould be noted that one or more service areas may be set up in thebusiness environment and the user sessions may be created in servicedomains corresponding to service areas.

As the rules in the policy rule module 408 and directory service 406indicate, one application of the computing environment 300 is in apharmacy and the ACLs 414(1) and 414(2) may be related to accessing thenetwork to perform certain operations in a pharmacy. In this exampleembodiment, users Alice, Bob and Chris may be pharmacists and Dave maybe a staff member. Many jurisdictions laws, for example, may require apharmacist be on premise to dispense prescriptions but allow a pharmacyto remain open without pharmacists on duty for other patient-relatedservices, including receipt of new written prescriptions, preparation ofprescriptions for final verification by the pharmacist and delivery ofprescription medications that have been verified by the pharmacist.Authorization of the staff's login session on the point of sale (POS)terminal may need to be restricted, for example, and access to thedispensing function may be prevented while the pharmacist is away andallowed when the pharmacist is present. Other patient-related services,however, can be performed at all times with the staff's login. In thisparticular example shown in FIG. 4, Dave may be at a POS device andwhether he has permission to perform dispensary may depend on whether hehas been given ACL1, which may depend on whether at least one of Alice,Bob and Chris has an active session. As shown in the session table 412,the session information for each user device may also include locationinformation. In one embodiment, a cafeteria may be part of the premiseof the pharmacy and Bob's active session alone may be enough to let Daveobtain ACL1, even if Alice ends her session.

It should be noted that the computing environment 300 uses a pharmacymerely as an example. Many other businesses may also implement acomputing environment similar to the computing environment 300 bydefining their policy rules for their respective needs, for example, torestrict certain transactions from being performed by staff if nosupervisor is on site. The computing environment 300 may also be used ina home environment, and the location information may be determined bythe access points in a home network to which the user devices areconnected.

With reference to FIG. 5, there is an illustration of a sequence diagramillustrating a sequence of events and communication between differentcomponents, such as in of the computing environments 100 and 300 shownin FIGS. 2 and 4. The endpoints 502 (e.g., the user devices) maycommunicate with the network connectivity/enforcement point 504 (e.g.,the network module 114 or network 416), the networkconnectivity/enforcement point 504 may communicate with the policydecision point 506 (e.g., the policy module 116) by security managementpackets, and the endpoints 502 may access the controlled resource 508 ifthe endpoints 502 have been given proper permissions (e.g., in ACL(s)).In the security management plane, at 510, the endpoints 502 may connectto a port of the network connectivity/enforcement point 504, which mayrepresent that a user (e.g., a subject) may try to log into a network.At 512, the network connectivity/enforcement point 504 may send anaccess request to the policy decision point 506, which may perform apolicy rule evaluation at 514 and return an access accept response at516. The response may include ACL1 518(1) and/or ACL2 518(2), forexample, depending on the currently-existing sessions in the network. Inthe data plane, at 520, the endpoints 502 may try to access a networkresource (e.g., perform a dispensary in a pharmacy). At 522, the networkconnectivity/enforcement point 504 may lookup ACLs in the firewall (orfilter) table and at 524, whether the access is granted may bedetermined based on ACLs. If a proper ACL has been associated with theendpoints 502, data traffic accessing the controlled resource 508 may bepermitted through the firewall. If, however, the networkconnectivity/enforcement point 504 determines at 524 that the endpoints502 are not associated with any ACL granting access to the controlledresource 508, data traffic accessing the controlled resource 508 may bedenied and the traffic may be dropped by the networkconnectivity/enforcement point 504.

FIG. 6 is a flowchart of an example method 600 of enforcing networkresource access control, according to an example embodiment. Method 600may be performed by a computing device (e.g., a network device or aserver machine) in a network. At 602, a connection request from a userdevice may be received at a computing device. For example, as describedherein, a user device may connect to a wireless access point or a portof a network device and the network device may provide a network serviceto a service area, such as but not limited to, a home or a businesspremise. At 604, a session start request may be generated. The sessionmay be a user session in a service domain covering the service area. At606, one or more pre-configured policy rules may be evaluated. Forexample, as described herein, the pre-configured policy rules may beevaluated to determine whether any rule is applicable to the userdevice. The evaluation may include determining that an authoritativeuser session has already been established in the service domain. At 608,the user session may be established. At 610, one or more permissions maybe associated with the user session based on the determination that theauthoritative user session has already been established. In someembodiments, the one or more permissions may include at least onepermission for accessing a controlled network resource. At 612, arequest to access the controlled network resource may be received fromthe user device, and at 614 access to the controlled network resourcemay be granted to the user device based on the at least one permission.

The techniques provided herein may provide a way for network/securitymanagement in which access to certain network resources using somecomputing devices may be controlled based on presence or absence ofanother individual (or individuals) at the location by means of accesssession management. In addition to the home network and pharmacyexamples described above, other environments may also implement theaccess control techniques described herein. For example, in somebusinesses a manager (or a person delegated with administrative duties)may be entrusted to be the first to unlock the office and last to leaveand lock up. An example of such an office may be a laboratory. In someimplementations, the laboratory may have a further requirement thataccess by staff to the laboratory must be accompanied by amanager/supervisor to badge the staff into the laboratory. According toone example embodiment, any individual entering and exiting therestricted area may be tracked, including both the staff and supervisor.In addition, if a supervisor/manager is already inside the restrictedarea then others could be automatically granted access. Such an exampleembodiment may also implement logic to enforce a requirement thatingress access to a restricted area by staff is preconditioned uponpresence of at least one supervisor and egress access out of therestricted area of the supervisor is preconditioned upon the absence ofstaff. In this embodiment, the manager may be required to be the last toleave the restricted area and any access to the restricted area may beblocked once the manager has left.

In summary, in one form, a method is provided comprising: receiving aconnection request at a network device from a user device, the networkdevice providing a network service to a service area; generating asession start request to start a user session in a service domaincovering the service area; evaluating one or more policy rules todetermine whether any rule is applicable to the user device, includingdetermining that an authoritative user session has already beenestablished in the service domain; establishing the user session in theservice domain for the user device; associating at least one permissionto the user session based on the determination that the authoritativeuser session has already been established, the at least one permissionbeing for access to a controlled network resource; receiving a requestfrom the user device to access the controlled network resource; andgranting access to the controlled network resource to the user devicebased on the at least one permission.

In summary, in another form, an apparatus is provided comprising: one ormore network ports configured to send/receive data packets to/from acommunication network; a processor coupled to the network ports, andconfigured to: receive a connection request from a user device, thenetwork device providing a network service to a service area; generate asession start request to start a user session in a service domaincovering the service area; evaluate one or more policy rules todetermine whether any rule is applicable to the user device, includingdetermining that an authoritative user session has already beenestablished in the service domain; establish the user session in theservice domain for the user device; associate at least one permission tothe user session based on the determination that the authoritative usersession has already been established, the at least one permission beingfor access to a controlled network resource; receive a request from theuser device to access the controlled network resource; and grant accessto the controlled network resource to the user device based on the atleast one permission.

In summary, in yet another form, a non-transitory computer readablestorage media is provided that stores instructions that, when executedby a processor of a network device, cause the processor to: receive aconnection request from a user device, the network device providing anetwork service to a service area; generate a session start request tostart a user session in a service domain covering the service area;evaluate one or more policy rules to determine whether any rule isapplicable to the user device, including determining that anauthoritative user session has already been established in the servicedomain; establish the user session in the service domain for the userdevice; associate at least one permission to the user session based onthe determination that the authoritative user session has already beenestablished, the at least one permission being for access to acontrolled network resource; receive a request from the user device toaccess the controlled network resource; and grant access to thecontrolled network resource to the user device based on the at least onepermission.

It is to be understood that the software (e.g., network module, policymodule) of the embodiments may be implemented in any desired computerlanguage and could be developed by one of ordinary skill in the computerarts based on the functional descriptions contained in the specificationand flow charts illustrated in the drawings. Further, any referencesherein of software performing various functions generally refer tocomputing systems or processors performing those functions undersoftware control. The computing systems of the embodiments mayalternatively be implemented by any type of hardware and/or otherprocessing circuitry.

The various functions of the network device or other computing systemsmay be distributed in any manner among any number of software and/orhardware modules or units, processing or computer systems and/orcircuitry, where the computer or processing systems may be disposedlocally or remotely of each other and communicate via any suitablecommunications medium (e.g., LAN, WAN, Intranet, Internet, hardwire,modem connection, wireless, etc.). For example, the functions of theembodiments may be distributed in any manner among the various computingsystems, and/or any other intermediary processing devices. The softwareand/or algorithms described above and illustrated in the flow charts maybe modified in any manner that accomplishes the functions describedherein. In addition, the functions in the flow charts or description maybe performed in any order that accomplishes a desired operation.

The software of the embodiments (e.g., network module, policy module)may be available on a non-transitory computer useable medium (e.g.,magnetic or optical mediums, magneto-optic mediums, floppy diskettes,CD-ROM, DVD, memory devices, etc.) of a stationary or portable programproduct apparatus or device for use with stand-alone systems or systemsconnected by a network or other communications medium.

The network may be implemented by any number of any type ofcommunications network (e.g., LAN, WAN, Internet, Intranet, VPN, etc.).The network device or other computing systems of the embodiments mayinclude any conventional or other computing devices to communicate overthe network via any conventional or other protocols. The network deviceor other computing systems may utilize any type of connection (e.g.,wired, wireless, etc.) for access to the network. Local communicationmedia may be implemented by any suitable communication media (e.g.,local area network (LAN), hardwire, wireless link, Intranet, etc.).

The terminology used herein is for the purpose of describing particularembodiments only and is not intended to be limiting. As used herein, thesingular forms “a,” “an” and “the” are intended to include the pluralforms as well, unless the context clearly indicates otherwise. It willbe further understood that the terms “comprises,” “comprising,”“includes,” “including,” “has,” “have,” “having,” “with” and the like,when used in this specification, specify the presence of statedfeatures, integers, steps, operations, elements, and/or components, butdo not preclude the presence or addition of one or more other features,integers, steps, operations, elements, components, and/or groupsthereof.

The embodiments may be a system, a method, and/or a computer programproduct. The computer program product may include a computer readablestorage medium (or media) having computer readable program instructionsthereon for causing a processor to carry out aspects of the embodiments.The computer readable storage medium can be a tangible device that canretain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a static random access memory (SRAM), a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Aspects of embodiments are described herein with reference to flowchartillustrations and/or block diagrams of methods, apparatus (systems), andcomputer program products. It will be understood that each block of theflowchart illustrations and/or block diagrams, and combinations ofblocks in the flowchart illustrations and/or block diagrams, can beimplemented by computer readable program instructions.

These computer readable program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that can directa computer, a programmable data processing apparatus, and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart and/or block diagram blockor blocks. In some embodiments, electronic circuitry including, forexample, programmable logic circuitry, field-programmable gate arrays(FPGA), or programmable logic arrays (PLA) may execute the computerreadable program instructions by utilizing state information of thecomputer readable program instructions to personalize the electroniccircuitry, in order to perform aspects of the embodiments. In anotherexample, the modules of example embodiments may be in the form offirmware that is processed by Application Specific Integrated Circuits(ASICs), which may be integrated into a circuit board. Alternatively,the modules of example embodiments may be in the form of one or morelogic blocks included in a programmable logic device (e.g., a FPGA).

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments. In this regard, each block in the flowchart or blockdiagrams may represent a module, segment, or portion of instructions,which comprises one or more executable instructions for implementing thespecified logical function(s). In some alternative implementations, thefunctions noted in the block may occur out of the order noted in thefigures. For example, two blocks shown in succession may, in fact, beexecuted substantially concurrently, or the blocks may sometimes beexecuted in the reverse order, depending upon the functionalityinvolved. It will also be noted that each block of the block diagramsand/or flowchart illustration, and combinations of blocks in the blockdiagrams and/or flowchart illustration, can be implemented by specialpurpose hardware-based systems that perform the specified functions oracts or carry out combinations of special purpose hardware and computerinstructions

Described above are examples. The concepts described herein may beembodied in other specific forms without departing from the spirit oressential characteristics thereof. The foregoing examples are thereforeto be considered in all respects illustrative and not meant to belimiting. Accordingly, it is intended to embrace all such alterations,modifications and variations that fall within the spirit and scope ofany claims filed in applications claiming priority hereto interpreted inaccordance with the breadth to which they are fairly, legally andequitably entitled.

What is claimed is:
 1. A method comprising: establishing, at a computingdevice, a user session in a service domain covering a service area towhich the computing device provides a network service; determiningwhether an authoritative user session has already been established inthe service domain; if the authoritative user session has not alreadybeen established in the service domain, associating, to the usersession, an access control list (ACL) that does not define at least onepermission to the user session; receiving a request from a user deviceto access a controlled network resource; and based on whether the ACLdefines the at least one permission for access to the controlled networkresource, permitting or denying, to the user device, access to thecontrolled network resource.
 2. The method of claim 1, wherein: if theauthoritative user session has not already been established in theservice domain: permitting or denying access includes denying, to theuser device, access to the controlled network resource based on the ACL.3. The method of claim 1, further comprising: if the authoritative usersession has already been established in the service domain: associatingan ACL that defines the at least one permission to the user session. 4.The method of claim 3, wherein: if the authoritative user session hasalready been established in the service domain: permitting or denyingaccess includes permitting, to the user device, access to the controllednetwork resource based on the ACL that defines the at least onepermission to the user session.
 5. The method of claim 4, furthercomprising: if the authoritative user session has already beenestablished in the service domain: determining that an authoritativeuser device that established the authoritative user session has left theservice area; and revoking the access to the controlled network resourcepreviously permitted to the user session.
 6. The method of claim 1,further comprising: receiving a connection request at the computingdevice from the user device; and generating a session start request tostart the user session.
 7. The method of claim 1, wherein the servicearea is a home and the authoritative user session is a session for aperson with authority at the home.
 8. The method of claim 1, wherein theservice area is a business premise and the authoritative user session isa session for a manager.
 9. An apparatus comprising: one or more networkports to send/receive data packets to/from a communication network; anda microprocessor coupled to the one or more network ports, themicroprocessor configured to: establish, at a computing device, a usersession in a service domain covering a service area to which thecomputing device provides a network service; determine whether anauthoritative user session has already been established in the servicedomain; if the authoritative user session has not already beenestablished in the service domain, associate, to the user session, anaccess control list (ACL) that does not define at least one permissionto the user session; receive a request from a user device to access acontrolled network resource; and based on whether the ACL defines the atleast one permission for access to the controlled network resource,permit or deny, to the user device, access to the controlled networkresource.
 10. The apparatus of claim 9, wherein the microprocessor isfurther configured to: if the authoritative user session has not alreadybeen established in the service domain: permit or deny access bydenying, to the user device, access to the controlled network resourcebased on the ACL.
 11. The apparatus of claim 9, wherein themicroprocessor is further configured to: if the authoritative usersession has already been established in the service domain: associate anACL that defines the at least one permission to the user session. 12.The apparatus of claim 11, wherein the microprocessor is furtherconfigured to: if the authoritative user session has already beenestablished in the service domain: permit or deny access by permitting,to the user device, access to the controlled network resource based onthe ACL that defines the at least one permission to the user session.13. The apparatus of claim 12, wherein the microprocessor is configuredto: if the authoritative user session has already been established inthe service domain: determine that an authoritative user device thatestablished the authoritative user session has left the service area;and revoke the access to the controlled network resource previouslypermitted to the user session.
 14. The apparatus of claim 9, wherein themicroprocessor is further configured to: receive a connection request atthe computing device from the user device; and generate a session startrequest to start the user session.
 15. A non-transitory computerreadable storage media encoded with instructions that, when executed bya processor of a computing device, cause the processor to: establish, atthe computing device, a user session in a service domain covering aservice area to which the computing device provides a network service;determine whether an authoritative user session has already beenestablished in the service domain; if the authoritative user session hasnot already been established in the service domain, associate, to theuser session, an access control list (ACL) that does not define at leastone permission to the user session; receive a request from a user deviceto access a controlled network resource; and based on whether the ACLdefines the at least one permission for access to the controlled networkresource, permit or deny, to the user device, access to the controllednetwork resource.
 16. The non-transitory computer readable storage mediaof claim 15, wherein the instructions further cause the processor to: ifthe authoritative user session has not already been established in theservice domain: permit or deny access by denying, to the user device,access to the controlled network resource based on the ACL.
 17. Thenon-transitory computer readable storage media of claim 15, wherein theinstructions further cause the processor to: if the authoritative usersession has already been established in the service domain: associate anACL that defines the at least one permission to the user session. 18.The non-transitory computer readable storage media of claim 17, whereinthe instructions further cause the processor to: if the authoritativeuser session has already been established in the service domain: permitor deny access by permitting, to the user device, access to thecontrolled network resource based on the ACL that defines the at leastone permission to the user session.
 19. The non-transitory computerreadable storage media of claim 18, wherein the instructions furthercause the processor to: if the authoritative user session has alreadybeen established in the service domain: determine that an authoritativeuser device that established the authoritative user session has left theservice area; and revoke the access to the controlled network resourcepreviously permitted to the user session.
 20. The non-transitorycomputer readable storage media of claim 15, wherein the instructionsfurther cause the processor to: receive a connection request at thecomputing device from the user device; and generate a session startrequest to start the user session.