×

Managing security agents in a distributed environment

  • US 10,505,982 B2
  • Filed: 10/21/2016
  • Issued: 12/10/2019
  • Est. Priority Date: 10/23/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • upon start-up of a physical environment in which a security agent resides, initializing, by the security agent, using a bootstrap configuration packaged in a file, wherein the file is provided to the security agent by an identity management system upon registration of the security agent with a policy server of the identity management system, wherein the security agent resides outside of the identity management system, wherein the policy server includes a policy for controlling access to a resource in a distributed environment server, wherein the registration includes issuance of an access token to the security agent, which creates a trust mechanism between the security agent and the identity management system, and wherein the file further includes security information that allows the security agent to subsequently connect to the identity management system in a secure manner;

    connecting, by the security agent, to the policy server of the identity management system through a default port using a default protocol based on the security information and the trust mechanism created between the security agent and the identity management system;

    obtaining, by the security agent, a configuration file from the policy server using the default port and the default protocol, wherein includes contextual information regarding the physical environment of the security agent such that the security agent can initialize and determine the physical environment in which the security agent resides, and wherein the configuration file or metadata associated with the security agent comprises a port mapping, which includes a mapping between port identifiers, ports of communication within the physical environment, and protocols used by the ports;

    analyzing, by the security agent, the ports of communication within the physical environment to identify a preferred port that is available for connection to the policy server, wherein the preferred port provides a more secure connection than that of the default port;

    receiving, by the security agent, a request from a user for access to the resource provided in the distributed environment server;

    connecting, by the security agent, to the policy server through the preferred port using a corresponding protocol to delegate authentication tasks to the identity management system and work with the policy server to access the policy for controlling the access to the resource;

    requesting, by the security agent, a determination be made by the policy server as to whether authentication of the user is required for access to the resource, wherein the request is sent from the security agent to the policy server via the preferred port;

    checking, by the security agent, the authentication of the user when the authentication of the user is required for access to the resource;

    requesting, by the security agent, a determination be made by the policy server as to whether the user is authorized to access the resource when the authentication of the user is verified, wherein the request is sent from the security agent to the policy server via the preferred port; and

    allowing, by the security agent, the user access to the resource when the user is authorized to access the resource.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×