Privileged account plug-in framework—usage policies
First Claim
1. A system, comprising:
- a memory storing computer-executable instructions;
a privileged access management module that provides a privileged access management service configured with a plug-in framework for accessing secure network resources; and
a processor that accesses the memory and executes the computer-executable instructions to at least;
receive, from an entity associated with the secure network resources, plug-in code for implementing runtime privileges;
generate instructions for implementing the runtime privileges based at least in part on the received plug-in code;
receive, from a first user, a log-in request to start a session including at least first authentication information, the log-in request corresponding to the privileged access management service;
provide access to at least one secure network resource of the secure network resources through the session when the first user is authenticated with respect to the privileged access management service;
receive, from a computing device of the user, a request to perform an action associated with the at least one secure network resource within the session;
implement the plug-in framework to determine, based at least in part on the runtime privileges and a runtime factor, whether the first user is allowed to perform the action during the session; and
perform the action during the session for the first user if it is determined that the first user is allowed to perform the action and if a second user is authenticated and logged in with the privileged access management service during the session, the first user given access to the at least one secure network resource during the session only if the second user is authenticated and logged in with the privileged access management service during the session, the first user being different from the second user.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for managing privileged accounts via a privileged access management service are provided. In some examples, the service may be configured with a plug-in framework for accessing secure resources. In some aspects, a log-in request that includes authentication information and corresponds to the service may be received. Session access to at least one secure resource may be provided when a user is authenticated. In some examples, a request to perform an action associated with the secure resource may be received during the session. Additionally, in some examples, the plug-in framework may be implemented to determine whether the user is allowed to perform the action. Further, performance of the action may be allowed or denied during the session based on the determination.
-
Citations
17 Claims
-
1. A system, comprising:
-
a memory storing computer-executable instructions; a privileged access management module that provides a privileged access management service configured with a plug-in framework for accessing secure network resources; and a processor that accesses the memory and executes the computer-executable instructions to at least; receive, from an entity associated with the secure network resources, plug-in code for implementing runtime privileges; generate instructions for implementing the runtime privileges based at least in part on the received plug-in code; receive, from a first user, a log-in request to start a session including at least first authentication information, the log-in request corresponding to the privileged access management service; provide access to at least one secure network resource of the secure network resources through the session when the first user is authenticated with respect to the privileged access management service; receive, from a computing device of the user, a request to perform an action associated with the at least one secure network resource within the session; implement the plug-in framework to determine, based at least in part on the runtime privileges and a runtime factor, whether the first user is allowed to perform the action during the session; and perform the action during the session for the first user if it is determined that the first user is allowed to perform the action and if a second user is authenticated and logged in with the privileged access management service during the session, the first user given access to the at least one secure network resource during the session only if the second user is authenticated and logged in with the privileged access management service during the session, the first user being different from the second user. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable storage memory storing a plurality of instructions executed by one or more processors to :
-
manage a privileged access management service configured with a plug-in framework for accessing secure network resources; receive, from an entity associated with the secure network resources, plug-in code for implementing runtime privileges; receive, from a first user, a log-in request to start a session including at least first authentication information, the log-in request corresponding to the privileged access management service; provide access to at least one secure network resource of the secure network resources through the session when the first user is authenticated with respect to the privileged access management service; receive, from a computing device of the first user, a request to perform an action associated with the at least one secure network resource within the session; implement the plug-in framework to determine, based at least in part on the runtime privileges and a runtime factor, whether the first user is allowed to perform the action during the session; and perform the action during the session for the first user if it is determined that the first user is allowed to perform the action and if a second user is authenticated and logged in with the privileged access management service during the session, the first user given access to the at least one secure network resource during the session only if the second user is authenticated and logged in with the privileged access management service during the session, the first user being different from the second user. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A computer-implemented method, comprising:
-
managing, by a computer system, a privileged access management service configured with a plug-in framework for accessing secure network resources; receiving, from a first user, a log-in request to start a session including at least first authentication information, the log-in request corresponding to the privileged access management service; providing session access corresponding to the session to at least one secure network resource of the secure network resources when the first user is authenticated with respect to the privileged access management service; receiving while in the session, from a computing device of the first user, a request to perform an action associated with the at least one secure network resource; implementing the plug-in framework to determine, based at least in part on the runtime privileges and a runtime factor, whether the first user is allowed to perform the action; and denying performance of the action during the session if it is determined that the first user is not allowed to perform the action or if a second user that was authenticated and logged in with the privileged access management service during the session logs out of the privileged access management service, the first user given access to the at least one secure network resource only if the second user is authenticated and logged in with the privileged access management service during the session, the first user being different from the second user.
-
-
14. The computer-implemented method of 13, wherein the runtime factor includes at least one of a time, a locality, a client, a number of requests, or a privilege granted to the first user.
- 15. The computer-implemented method of 13, wherein the privileged access management service is implemented by a first virtual machine and the plug-in framework is implemented by a second virtual machine, the first virtual machine and the second virtual machine being different virtual machines.
Specification