TECHNIQUES FOR IDENTITY AND POLICY BASED ROUTING
3 Assignments
0 Petitions
Accused Products
Abstract
Techniques for identity and policy based routing are presented. A resource is initiated on a device with a resource identity and role assignments along with policies are obtained for the resource. A customized network is created for the resource using a device address for the device, the resource identity, the role assignments, and the policies.
5 Citations
21 Claims
-
1. (canceled)
-
2. A method, comprising:
-
creating a customized network with one or more customized routes based on a resource identity; and providing access over the one or more customized routes for a resource associated with the resource identity to access other resources over a network connection. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method, comprising:
-
registering a machine executing a resource based on a machine identity and a resource identity; and establishing a custom network for the resource, wherein the custom network defines other resources and other devices that the resource can access over the custom network. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. The method of claim 19, wherein pushing further includes providing the routing table in formats recognized and processed by each of the network routers.
-
20. A system, comprising:
-
a processor; and a provision service configured to;
i) execute on the processor, ii) establish a custom network for a resource based on a resource identity, and iii) dynamically add one or more additional resources to the custom network. - View Dependent Claims (21)
-
Specification