SECURE DATA REPLICATION
First Claim
1. A method comprising:
- establishing an access policy for a storage resource within first storage hosted by a first computing device, wherein the access policy defines an authentication mechanism, an authorization mechanism, and an access control mechanism;
establishing a replication relationship between the first computing device and a second computing device for replicating data between the first storage and second storage hosted by the second computing device;
attaching the access policy to the replication relationship;
receiving a data replication request targeting the first storage; and
utilizing the authentication mechanism, the authorization mechanism, and the access control mechanism of the access policy to determine whether to implemented the data replication request.
0 Assignments
0 Petitions
Accused Products
Abstract
One or more techniques and/or computing devices are provided for secure data replication. For example, a first storage controller may host first storage within which storage resources (e.g., files, logical unit numbers (LUNs), volumes, etc.) are stored. The first storage controller may establish an access policy with a001 second storage controller to which data is to be replicated from the first storage. The access policy may define an authentication mechanism for the first storage controller to authenticate the second storage controller, an authorization mechanism specifying a type of access that the second storage controller has for a storage resource, and an access control mechanism specifying how the second storage controller'"'"'s access to data of the storage resource is to be controlled. In this way, data replication requests may be authenticated and authorized so that data may be provided, according to the access control mechanism, in a secure manner.
1 Citation
20 Claims
-
1. A method comprising:
-
establishing an access policy for a storage resource within first storage hosted by a first computing device, wherein the access policy defines an authentication mechanism, an authorization mechanism, and an access control mechanism; establishing a replication relationship between the first computing device and a second computing device for replicating data between the first storage and second storage hosted by the second computing device; attaching the access policy to the replication relationship; receiving a data replication request targeting the first storage; and utilizing the authentication mechanism, the authorization mechanism, and the access control mechanism of the access policy to determine whether to implemented the data replication request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory machine readable medium having stored thereon instructions for performing a method comprising machine executable code which when executed by at least one machine, causes the machine to:
-
establish an access policy for a storage resource within first storage hosted by a first computing device, wherein the access policy defines an authentication mechanism, an authorization mechanism, and an access control mechanism; establish a replication relationship between the first computing device and a second computing device for replicating data between the first storage and second storage hosted by the second computing device; attach the access policy to the replication relationship; receive a data replication request targeting the first storage; and utilize the authentication mechanism, the authorization mechanism, and the access control mechanism of the access policy to determine whether to implemented the data replication request. - View Dependent Claims (16, 17)
-
-
18. A computing device comprising:
-
a memory containing machine readable medium comprising machine executable code having stored thereon instructions for performing a method; and a processor coupled to the memory, the processor configured to execute the machine executable code to cause the processor to; establish an access policy for a storage resource within first storage hosted by a first computing device, wherein the access policy defines an authentication mechanism, an authorization mechanism, and an access control mechanism; establish a replication relationship between the first computing device and a second computing device for replicating data between the first storage and second storage hosted by the second computing device; attach the access policy to the replication relationship; receive a data replication request targeting the first storage; and utilize the authentication mechanism, the authorization mechanism, and the access control mechanism of the access policy to determine whether to implemented the data replication request. - View Dependent Claims (19, 20)
-
Specification