×

Method and system for providing a secure secrets proxy and distributing secrets

  • US 9,684,791 B2
  • Filed: 04/20/2016
  • Issued: 06/20/2017
  • Est. Priority Date: 10/14/2013
  • Status: Active Grant
First Claim
Patent Images

1. A system for providing a secure secrets proxy and distributing secrets comprising:

  • at least one processor; and

    at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for providing a secure secrets proxy and distributing secrets, the process for providing a secure secrets proxy and distributing secrets including;

    providing a secure secrets proxy in a first computing environment, the secure secrets proxy being a virtual asset instantiated in the first computing environment, the secure secrets proxy including secure secrets proxy authentication data;

    providing a secrets distribution management system in a second computing environment, the secrets distribution management system having access to secrets data representing one or more secrets and configured to control the distribution of the one or more secrets in accordance with one or more secrets distribution policies;

    providing, by the secure secrets proxy, the secure secrets proxy authentication data to the secrets distribution management system;

    providing secrets distribution policy data representing one or more secrets distribution factors used to control the distribution of one or more secrets;

    receiving, at the secrets distribution management system, secrets request data from a requesting virtual asset for secrets data necessary to access a resource of a resource type;

    obtaining, by the secrets distribution management system, requesting virtual asset profile data associated with the requesting virtual asset;

    authenticating, by the secrets distribution management system, the secure secrets proxy as a trusted virtual asset eligible to cache secrets data in a secure secrets cache;

    authenticating, by the secrets distribution management system, the requesting virtual asset;

    analyzing the requesting virtual asset profile data using one or more of the one or more secrets distribution factors to generate authorized secrets data for the requesting virtual asset;

    providing, by the secrets distribution system to the secure secrets proxy in response to the secrets request data, authorized secrets data representing one or more requested secrets;

    providing, from the secure secrets proxy to the requesting virtual asset, authorized secrets data for the requesting virtual asset.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×