Methods and systems for secure gated file deployment associated with provisioning
First Claim
Patent Images
1. A method comprising:
- receiving, by a processor, a security credential from a target machine to be provisioned with a software installation from a provisioning server, wherein the security credential is received from the target machine prior to the target machine receiving the software installation;
prior to performing the software installation, evaluating, by the processor, the security credential from the target machine to determine whether the target machine is to receive the software installation from the provisioning server; and
generating, by the processor, an action for the software installation on the target machine based on a result of the evaluating.
1 Assignment
0 Petitions
Accused Products
Abstract
A software provisioning server can be configured to communicate with a certificate authority to evaluate security credential requests received from one or more target machines prior to a software installation. The certificate authority can issue certificates to the one or more target machines and notify an administrator and the software provisioning server of the issued certificates. The software provisioning server can manage the software installation to the one or more target machines based on the issued certificates and other specifications.
166 Citations
20 Claims
-
1. A method comprising:
-
receiving, by a processor, a security credential from a target machine to be provisioned with a software installation from a provisioning server, wherein the security credential is received from the target machine prior to the target machine receiving the software installation; prior to performing the software installation, evaluating, by the processor, the security credential from the target machine to determine whether the target machine is to receive the software installation from the provisioning server; and generating, by the processor, an action for the software installation on the target machine based on a result of the evaluating. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
an interface to a target machine; and a processor in communication with the interface and configured to perform the steps of; receiving a security credential from the target machine to be provisioned with a software installation from a provisioning server, wherein the security credential is received from the target machine prior to the target machine receiving the software installation; prior to performing the software installation, evaluating the security credential from the target machine to determine whether the target machine is to receive the software installation from the provisioning server; and generating an action for the software installation on the target machine based on a result of the evaluating. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification