Web-based security proxy for computing system environment scanning
First Claim
1. A method, in a data processing system, for collecting configuration data from components of a managed computing system, comprising:
- obtaining, by the data processing system, a portion of code from a data collection system, wherein the data collection system does not have security credentials to allow the data collection system to directly access a managed computing system, distinct from the data processing system, and wherein the data collection system does not receive configuration data directly from the managed computing system;
executing the portion of code in the data processing system using security credentials maintained in the data processing system, where executing the portion of code causes the data processing system to automatically access the managed computing system using the security credentials, and collect configuration data from the managed computing system; and
providing, by the data processing system via the portion of code, the configuration data collected from the managed computing system to the data collection system which stores the collected configuration data in a data storage, wherein;
the portion of code is an applet and wherein the applet is executed in a browser environment on the data processing system without installing the portion of code on the data processing system,the managed computing system responds to requests in accordance with an established white list data structure specifying identities of devices to which the managed computing system may respond in response to requests for configuration information, andthe data collection system is not listed in the white list data structure but the data processing system is listed in the white list data structure.
0 Assignments
0 Petitions
Accused Products
Abstract
Mechanisms are provided for collecting configuration data from components of a managed computing system environment. A portion of code is obtained, in a data processing system, from a data collection system that does not have security credentials to allow the data collection system to directly access to the managed computing system environment. The portion of code is executed by the data processing system using security credentials maintained in the data processing system. Executing the portion of code causes the data processing system to access the managed computing system environment and collect configuration data from the managed computing system environment. The data processing system, via the portion of code, provides the configuration data collected from the managed computing system to the data collection system which stores the collected configuration data in a data storage.
-
Citations
18 Claims
-
1. A method, in a data processing system, for collecting configuration data from components of a managed computing system, comprising:
-
obtaining, by the data processing system, a portion of code from a data collection system, wherein the data collection system does not have security credentials to allow the data collection system to directly access a managed computing system, distinct from the data processing system, and wherein the data collection system does not receive configuration data directly from the managed computing system; executing the portion of code in the data processing system using security credentials maintained in the data processing system, where executing the portion of code causes the data processing system to automatically access the managed computing system using the security credentials, and collect configuration data from the managed computing system; and providing, by the data processing system via the portion of code, the configuration data collected from the managed computing system to the data collection system which stores the collected configuration data in a data storage, wherein; the portion of code is an applet and wherein the applet is executed in a browser environment on the data processing system without installing the portion of code on the data processing system, the managed computing system responds to requests in accordance with an established white list data structure specifying identities of devices to which the managed computing system may respond in response to requests for configuration information, and the data collection system is not listed in the white list data structure but the data processing system is listed in the white list data structure. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
Specification