US 12,438,879 B2
Methods, systems, and computer readable media for zero trust network access (ZTNA) testing using application-independent authentication profiles
Partha Majumdar, West Hills, CA (US); Tudor Simionescu, Bucharest (RO); Rudrarup Naskar, Kolkota (IN); Sawan Das, Kolkata (IN); Sirshendu Rakshit, West Bengal (IN); Andrei Daniel Safta, Ploiesti (RO); and Tiberiu Viorel Barbu, Buzau (RO)
Assigned to KEYSIGHT TECHNOLOGIES, INC., Santa Rosa, CA (US)
Filed by Keysight Technologies, Inc., Santa Rosa, CA (US)
Filed on May 2, 2023, as Appl. No. 18/142,572.
Claims priority of application No. a 2023 00214 (RO), filed on Apr. 28, 2023.
Prior Publication US 2024/0364691 A1, Oct. 31, 2024
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/102 (2013.01) [H04L 63/20 (2013.01)] 16 Claims
OG exemplary drawing
 
1. A method for zero trust network access (ZTNA) testing using application-independent authentication profiles, the method comprising: providing, at a network traffic emulation platform, a user interface that enables a user to configure a mix of emulated application flows by selecting a plurality of different emulated network applications by name and specifying a weight value for each of the emulated network applications; providing, at the network traffic emulation platform, a plurality of user- selectable application-independent authentication profiles for emulating authentication messaging of different ZTNA systems, wherein providing the application-independent authentication profiles includes providing a profile for emulating a policy enforcement point (PEP) and providing a profile for emulating an identity provider (IdP); receiving, at the network traffic emulation platform, user configuration of the mix of the application flows; and receiving, at the network traffic emulation platform, an instruction from a user to execute a test of a device under test and executing the test by: selecting, at the network traffic emulation platform, one of the application-independent authentication profiles; generating and transmitting emulated authentication traffic to the ZTNA system according to the selected authentication profile; and in response to successful completion of exchanges required by the authentication profile, generating and transmitting, to a device under test, emulated application traffic according to the user- selected application flow configured mix of application flows.