Policy engine for cloud platform
First Claim
1. A method for setting organizational policies for web applications deployed in a cloud computing environment, the method comprising the steps of:
- receiving authentication credentials of a user of the cloud computing environment;
authenticating the user;
intercepting a communications packet from the user intended for a component of the cloud computing environment configured to orchestrate deployment of a web application in the cloud computing environment;
identifying a command to manage deployment of the web application in the cloud computing environment in the intercepted communications packet;
dispatching the intercepted communications packet to a rules engine corresponding to the identified command;
executing a set of rules in the rules engine that implements a policy set by an organization desiring to deploy web applications in the cloud computing environment;
forwarding the communications packet to the component of the cloud computing environment when completion of execution of the set of rules indicates compliance of the intercepted communications packet with the policy; and
rejecting the communications packet when completion of execution of the set of rules indicates non-compliance of the communications packet with the policy.
2 Assignments
0 Petitions
Accused Products
Abstract
A policy engine is situated between the communications path of a cloud computing environment and a user of the cloud computing environment to comply with an organization'"'"'s policies for deploying web applications in the cloud computing environment. The policy engine intercepts communications packets to the cloud computing environment from a user, such as a web application developer, for example, in preparation for deploying a web application in the cloud computing environment. The policy engine identifies commands corresponding to the communications packets and directs the communications packets to appropriate rules engines corresponding to such commands in order to execute rules to comply with an organization'"'"'s policies. Upon completion of execution of the rules, the communications packets are forwarded to the cloud computing environment if they comply with the policies.
-
Citations
18 Claims
-
1. A method for setting organizational policies for web applications deployed in a cloud computing environment, the method comprising the steps of:
-
receiving authentication credentials of a user of the cloud computing environment; authenticating the user; intercepting a communications packet from the user intended for a component of the cloud computing environment configured to orchestrate deployment of a web application in the cloud computing environment; identifying a command to manage deployment of the web application in the cloud computing environment in the intercepted communications packet; dispatching the intercepted communications packet to a rules engine corresponding to the identified command; executing a set of rules in the rules engine that implements a policy set by an organization desiring to deploy web applications in the cloud computing environment; forwarding the communications packet to the component of the cloud computing environment when completion of execution of the set of rules indicates compliance of the intercepted communications packet with the policy; and rejecting the communications packet when completion of execution of the set of rules indicates non-compliance of the communications packet with the policy. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable storage medium including instructions that, when executed on a computer processor, causes the computer processor to set organizational policies for web applications deployed in a cloud computing environment, by performing the steps of:
-
receiving authentication credentials of a user of the cloud computing environment; authenticating the user; intercepting a communications packet from the user intended for a component of the cloud computing environment configured to orchestrate deployment of a web application in the cloud computing environment; identifying a command to manage deployment of the web application in the cloud computing environment in the intercepted communications packet; dispatching the intercepted communications packet to a rules engine corresponding to the identified command; executing a set of rules in the rules engine that implements a policy set by an organization desiring to deploy web applications in the cloud computing environment; forwarding the communications packet to the component of the cloud computing environment when completion of execution of the set of rules indicates compliance of the intercepted communications packet with the policy; and rejecting the communications packet when completion of execution of the set of rules indicates non-compliance of the communications packet with the policy. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A proxy server for setting organizational policies for web applications deployed in a cloud computing environment, the server comprising one or more central processing units (CPUs) configured to perform the steps of:
-
receiving authentication credentials of a user of the cloud computing environment; authenticating the user; intercepting a communications packet from the user intended for a component of the cloud computing environment configured to orchestrate deployment of a web application in the cloud computing environment; identifying a command to manage deployment of the web application in the cloud computing environment in the intercepted communications packet; dispatching the intercepted communications packet to a rules engine corresponding to the identified command; executing, by operation of the one or more CPUs, a set of rules in the rules engine that implements a policy set by an organization desiring to deploy web applications in the cloud computing environment; forwarding the communications packet to the component of the cloud computing environment when completion of execution of the set of rules indicates compliance of the intercepted communications packet with the policy; and rejecting the communications packet when completion of execution of the set of rules indicates non-compliance of the communications packet with the policy. - View Dependent Claims (15, 16, 17, 18)
-
Specification