×

Centrally managed impersonation

  • US 8,677,446 B2
  • Filed: 09/30/2010
  • Issued: 03/18/2014
  • Est. Priority Date: 03/26/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method for managing impersonation by an impersonation management system having a central server and at least one remote shell daemon running on at least one remote machine, wherein the central server and the at least one remote shell daemon have a trust relationship, the method comprising:

  • receiving, at the central server, a request action from a user requesting connection to the at least one remote machine, the request action including at least a first command and at least a second command;

    authenticating, at the central server, the user;

    retrieving, at the central server, an impersonation policy for the user to act on the at least one remote machine, the impersonation policy specifying first privileges for executing at least the first command on the at least one remote machine on behalf of the user and second privileges for executing at least the second command on the at least one remote machine on behalf of the user, the second privileges being different than the first privileges;

    connecting to the at least one remote machine including relying on the trust relationship between the central server and the at least one remote shell daemon running on the at least one remote machine;

    sending the impersonation policy for the user, including the first privileges and the second privileges, to the at least one remote shell daemon; and

    returning a response to the user, the response indicating execution, or lack thereof, by the at least one remote shell daemon of at least the first command and at least the second command, based on the first privileges and the second privileges, respectively.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×