RESOURCE ACCESS CONTROL FOR VIRTUAL MACHINES
First Claim
1. A method of operating a computing system to control access data resources by virtual machines, the method comprising:
- in an interface system, receiving an access token and an instantiation command from an end user system;
responsive to the instantiation command, instantiating a virtual machine identified by the instantiation command using the access token as user data for the virtual machine during instantiation;
in the virtual machine, executing a security module responsive to instantiation that transfers the access token for delivery to an authorization system; and
in the virtual machine, receiving credentials responsive to the access token, and accessing a data resource using the credentials.
1 Assignment
0 Petitions
Accused Products
Abstract
To provide enhanced operation of virtualized computing systems, various systems, apparatuses, methods, and software are provided herein. In a first example, a method of operating a computing system to control access to data resources by virtual machines is provided. The method includes receiving an access token and an instantiation command from an end user system. Responsive to the instantiation command, the method includes instantiating a virtual machine identified by the instantiation command using the access token as user data for the virtual machine during instantiation. The method also includes, in the virtual machine, executing a security module responsive to instantiation that transfers the access token for delivery to an authorization system, receiving credentials responsive to the access token, and accessing a data resource using the credentials.
24 Citations
20 Claims
-
1. A method of operating a computing system to control access data resources by virtual machines, the method comprising:
-
in an interface system, receiving an access token and an instantiation command from an end user system; responsive to the instantiation command, instantiating a virtual machine identified by the instantiation command using the access token as user data for the virtual machine during instantiation; in the virtual machine, executing a security module responsive to instantiation that transfers the access token for delivery to an authorization system; and in the virtual machine, receiving credentials responsive to the access token, and accessing a data resource using the credentials. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer apparatus to operate a computing system to control access data resources by virtual machines, the apparatus comprising:
-
software instructions configured, when executed by one or more computing systems, to direct the one or more computing systems to; receive, in an interface system, an access token and an instantiation command from an end user system; responsive to the instantiation command, instantiate a virtual machine identified by the instantiation command using the access token as user data for the virtual machine during instantiation; execute, in the virtual machine, a security module responsive to instantiation that transfers the access token for delivery to an authorization system; and receive, in the virtual machine, one or more credentials responsive to the access token, and accessing a data resource using the one or more credentials; and at least one non-transitory computer-readable storage medium storing the software instructions. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification