Controlling access to secure data and services by versatile computers
outside a secure environment, which communicates with limited dedicated
devices such as game consoles, over a secure network such as a virtual
private network. The versatile computing devices obtain access over an
insecure network, such as the Internet, through a trusted partner Web
site that authenticates users of the site and relays requests to the
secure environment. The Web site uses a certificate for a predefined
level of secure access to the secure environment. A link is established
between a user's Web ID authenticated by the Web site and a gamer tag
used within the secure environment. Access is limited as a function of
the Web ID, gamer tag, and a Web site partner ID. A Web cache stores and
provides some secure data, minimizing disruption to the secure
environment's primary function to service the dedicated devices.