Restrictions on use of a key
First Claim
Patent Images
1. A method in a computerized system comprising:
- configuring, by a management apparatus, at least one address based restriction on use of a key by source hosts for access to target hosts in the computerized system,determining use of the key for access to a target host,receiving information of an address of a source host from which the key is used for the access to the target host,comparing the address of the source host from which the key is used for the access to the target host against the at least one address based restriction on use of the key, andperforming a management action based on the comparison.
1 Assignment
0 Petitions
Accused Products
Abstract
Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain embodiments also provide for managing certificates, Kerberos credentials, and cryptographic keys. Certain embodiments provide for remediating legacy SSH key problems and for automating configuration of SSH keys, as well as for continuous monitoring.
-
Citations
26 Claims
-
1. A method in a computerized system comprising:
-
configuring, by a management apparatus, at least one address based restriction on use of a key by source hosts for access to target hosts in the computerized system, determining use of the key for access to a target host, receiving information of an address of a source host from which the key is used for the access to the target host, comparing the address of the source host from which the key is used for the access to the target host against the at least one address based restriction on use of the key, and performing a management action based on the comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. An apparatus comprising at least one processor, and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus to:
-
configure, in the apparatus, at least one address based restriction on use of a key by source hosts for access to target hosts, determine use of the key for access to a target host, receive information of an address of a source host from which the key is used for access to the target host, compare the address of the source host from which the key is used for the access to the target host against the at least one address based restriction on use of the key, and perform a management action based on the evaluation comparison. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A non-transitory computer readable media comprising program code for causing an apparatus comprising a processor to perform instructions for:
-
configuring at least one address based restriction on use of a key by source hosts for access to target hosts in the apparatus, determining use of the key for access to a target host, receiving information of an address of a source host from which the key is used for access to the target host, comparing the address of the source host from which the key is used for the access to the target host against the at least one address based restriction on use of the key, and performing a management action based on the comparison.
-
Specification