Life Cycle Management for Cloud-Based Application Executors with Key-Based Access to Other Devices
First Claim
1. A method, comprising:
- determining that a retention time for a first cloud-based application executor has elapsed, wherein the first cloud-based application executor has key-based access to at least one other device using a first key;
in response to the determining, performing the following steps, using at least one processing device;
creating a second cloud-based application executor; and
determining a second key for the second cloud-based application executor that is different than the first key,wherein the second cloud-based application executor uses the first key to add the second key to one or more trusted keys of the at least one other device and deactivates the first key from the one or more trusted keys.
3 Assignments
0 Petitions
Accused Products
Abstract
Life cycle management techniques are provided for cloud-based application executors with key-based access to other devices. An exemplary method comprises determining that a retention time for a first cloud-based application executor (e.g., a virtual machine or a container) has elapsed, wherein the first cloud-based application executor has key-based access to at least one other device using a first key; in response to the determining, performing the following steps: creating a second cloud-based application executor; and determining a second key for the second cloud-based application executor that is different than the first key, wherein the second cloud-based application executor uses the first key to add the second key to one or more trusted keys of the at least one other device and deactivates the first key from the one or more trusted keys.
-
Citations
20 Claims
-
1. A method, comprising:
-
determining that a retention time for a first cloud-based application executor has elapsed, wherein the first cloud-based application executor has key-based access to at least one other device using a first key; in response to the determining, performing the following steps, using at least one processing device; creating a second cloud-based application executor; and determining a second key for the second cloud-based application executor that is different than the first key, wherein the second cloud-based application executor uses the first key to add the second key to one or more trusted keys of the at least one other device and deactivates the first key from the one or more trusted keys. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system, comprising:
-
a memory; and at least one processing device, coupled to the memory, operative to implement the following steps; determining that a retention time for a first cloud-based application executor has elapsed, wherein the first cloud-based application executor has key-based access to at least one other device using a first key; in response to the determining, performing the following steps; creating a second cloud-based application executor; and determining a second key for the second cloud-based application executor that is different than the first key, wherein the second cloud-based application executor uses the first key to add the second key to one or more trusted keys of the at least one other device and deactivates the first key from the one or more trusted keys. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A computer program product, comprising a tangible machine-readable storage medium having encoded therein executable code of one or more software programs, wherein the one or more software programs when executed by at least one processing device perform the following steps:
-
determining that a retention time for a first cloud-based application executor has elapsed, wherein the first cloud-based application executor has key-based access to at least one other device using a first key; in response to the determining, performing the following steps; creating a second cloud-based application executor; and determining a second key for the second cloud-based application executor that is different than the first key, wherein the second cloud-based application executor uses the first key to add the second key to one or more trusted keys of the at least one other device and deactivates the first key from the one or more trusted keys. - View Dependent Claims (17, 18, 19, 20)
-
Specification