SECURE OUT-OF-BAND MANAGEMENT OF COMPUTING DEVICES OVER A COMMUNICATIONS NETWORK
First Claim
1. A method on a computer system for facilitating management of virtual machines in a private data center over a communications network, comprising:
- receiving, by a first computer in the private data center, a request via the communications network from a user for access to a subset of a plurality of virtual machines in the private data center;
executing a first authentication process by proxy between the user and the first computer;
executing a second authentication process by proxy between the user and a second computer at the private data center;
establishing a secure, out-of-band connection between the user and the subset of the plurality of virtual machines in the private data network; and
restricting access of the user to the subset of the plurality of virtual machines according to permissions associated with the user.
1 Assignment
0 Petitions
Accused Products
Abstract
A method on a computer system for facilitating management of virtual machines in a private data center over a communications network can be provided. The method can include receiving, by a first computer in the private data center, a request via the communications network from a user for access to a subset of a plurality of virtual machines in the private data center. The method can further include executing a first authentication process by proxy between the user and the first computer and executing a second authentication process by proxy between the user and a second computer at the private data center. The method can further include establishing a secure, out-of-band connection between the user and the subset of the plurality of virtual machines in the private data network and restricting access of the user to the subset of the plurality of virtual machines according to permissions associated with the user.
-
Citations
18 Claims
-
1. A method on a computer system for facilitating management of virtual machines in a private data center over a communications network, comprising:
-
receiving, by a first computer in the private data center, a request via the communications network from a user for access to a subset of a plurality of virtual machines in the private data center; executing a first authentication process by proxy between the user and the first computer; executing a second authentication process by proxy between the user and a second computer at the private data center; establishing a secure, out-of-band connection between the user and the subset of the plurality of virtual machines in the private data network; and restricting access of the user to the subset of the plurality of virtual machines according to permissions associated with the user. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer system for facilitating management of virtual machines in a private data center over a communications network, comprising:
-
a first computer in the private data center, the first computer configured for receiving a request via the communications network from a user for access to a subset of the plurality of virtual machines in the private data center and executing a first authentication process by proxy with the user; a second computer in the private data center, the second computer configured for executing a second authentication process by proxy with the user; and a server in the private data center, the server configured for establishing a secure, out-of-band connection between the user and the subset of the plurality of virtual machines in the private data network and restricting access of the user to the subset of the plurality of virtual machines according to permissions associated with the user. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer program product comprising a computer usable medium embodying computer usable program code for facilitating management of virtual machines in a private data center over a communications network, the computer program product comprising:
-
computer usable program code on a first computer in the private data center for receiving a request via the communications network from a user for access to a plurality of virtual machines in the private data center and executing a first authentication process by proxy between the user and the first computer; computer usable program code on a second computer in the private data center for executing a second authentication process by proxy between the user and the second computer; and computer usable program code on a server for establishing a secure, out-of-band connection between the user and the plurality of virtual machines in the private data network and restricting access of the user to the plurality of virtual machines according to permissions associated with the user. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification