APPLYING HOST ACCESS CONTROL RULES FOR DATA USED IN APPLICATION CONTAINERS
First Claim
Patent Images
1. A method for applying host access control rules for application containers, by a processor device, comprising:
- extracting a first set of user identifiers and permissions from a temporary container;
extracting a second set of user identifiers and permissions from a host on which a working container will reside;
combining the first set and the second set of user identifiers and permissions into an aggregate set of user identifiers and permissions; and
injecting the aggregate set of user identifiers and permissions into the working container.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments for applying host access control rules for application containers by one or more processors. A first set of user identifiers and permissions is extracted from a temporary container and a second set of user identifiers and permissions is extracted from a host on which a working container will reside. The first set and the second set of user identifiers and permissions are combined into an aggregate set of user identifiers and permissions and injected into the working container.
80 Citations
21 Claims
-
1. A method for applying host access control rules for application containers, by a processor device, comprising:
-
extracting a first set of user identifiers and permissions from a temporary container; extracting a second set of user identifiers and permissions from a host on which a working container will reside; combining the first set and the second set of user identifiers and permissions into an aggregate set of user identifiers and permissions; and injecting the aggregate set of user identifiers and permissions into the working container. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for applying host access control rules for application containers, the system comprising:
a processor device executing instructions stored in a memory, wherein the processor device; extracts a first set of user identifiers and permissions from a temporary container; extracts a second set of user identifiers and permissions from a host on which a working container will reside; combines the first set and the second set of user identifiers and permissions into an aggregate set of user identifiers and permissions; and injects the aggregate set of user identifiers and permissions into the working container. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A computer program product for applying host access control rules for application containers, by a processor device, the computer program product embodied on a non-transitory computer-readable storage medium having computer-readable program code portions stored therein, the computer-readable program code portions comprising:
-
an executable portion that extracts a first set of user identifiers and permissions from a temporary container; an executable portion that extracts a second set of user identifiers and permissions from a host on which a working container will reside; an executable portion that combines the first set and the second set of user identifiers and permissions into an aggregate set of user identifiers and permissions; and an executable portion that injects the aggregate set of user identifiers and permissions into the working container. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification