Virtual machine service access
First Claim
1. A method implemented by data processing apparatus, the method comprising:
- receiving a plurality of requests for long-term security tokens from a host machine, each request comprising authentication information for a respective service account;
providing one or more of the long-term security tokens to the host machine based on the plurality of requests, wherein the one or more long-term security tokens can be used to generate short-term security tokens for virtual machines executing on the host machine, wherein the virtual machines are hardware virtualizations on the host machine and cannot access the one or more long-term security token provided to the host machine; and
generating by a process executing in a host operating system of the host machine a short-term security token based on a long-term security token of the one or more long-term security tokens for use by a virtual machine executing on the host machine to access one of the respective service accounts, wherein the short-term security token is different than the long-term security token and the short-term security token is useable for a pre-determined amount of time.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for accessing services from a virtual machine. One of the methods includes receiving requests for long-term security tokens from a host machine, each request comprising authentication information for a respective service account. The method include providing long-term security tokens to the host machine, wherein the long-term security tokens can be used to generate short-term security tokens for a virtual machine executing on the host machine. The method also includes generating by a process executing in a host operating system of the host machines a short-term security token based on a long-term security token of the long-term security tokens for use by a virtual machine executing on the host machine to access one of the respective service accounts, wherein the short-term security token is useable for a pre-determined amount of time.
531 Citations
21 Claims
-
1. A method implemented by data processing apparatus, the method comprising:
-
receiving a plurality of requests for long-term security tokens from a host machine, each request comprising authentication information for a respective service account; providing one or more of the long-term security tokens to the host machine based on the plurality of requests, wherein the one or more long-term security tokens can be used to generate short-term security tokens for virtual machines executing on the host machine, wherein the virtual machines are hardware virtualizations on the host machine and cannot access the one or more long-term security token provided to the host machine; and generating by a process executing in a host operating system of the host machine a short-term security token based on a long-term security token of the one or more long-term security tokens for use by a virtual machine executing on the host machine to access one of the respective service accounts, wherein the short-term security token is different than the long-term security token and the short-term security token is useable for a pre-determined amount of time. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory, computer storage medium encoded with computer program instructions that when executed by one or more computers cause the one or more computers to perform operations comprising:
-
receiving a plurality of requests for long-term security tokens from a host machine, each request comprising authentication information for a respective service account; providing one or more of the long-term security tokens to the host machine based on the plurality of requests, wherein the one or more long-term security tokens can be used to generate short-term security tokens for virtual machines executing on the host machine, wherein the virtual machines are hardware virtualizations on the host machine and cannot access the one or more long-term security token provided to the host machine; and generating by a process executing in a host operating system of the host machine a short-term security token based on a long-term security token of the one or more long-term security tokens for use by a virtual machine executing on the host machine to access one of the respective service accounts, wherein the short-term security token is different than the lone-term security token and the short-term security token is useable for a pre-determined amount of time. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
one or more computers and one or more storage devices storing instructions that are operable, when executed by the one or more computers, to cause the one or more computers to perform operations comprising; receiving a plurality of requests for long-term security tokens from a host machine, each request comprising authentication information for a respective service account; providing one or more of the long-term security tokens to the host machine based on the plurality of requests, wherein the one or more long-term security tokens can be used to generate short-term security tokens for virtual machines executing on the host machine, wherein the virtual machines are hardware virtualizations on the host machine and cannot access the one or more long-term security token provided to the host machine; and generating by a process executing in a host operating system of the host machine a short-term security token based on a long-term security token of the one or more long-term security tokens for use by a virtual machine executing on the host machine to access one of the respective service accounts, wherein the short-term security token is different than the lone-term security token and the short-term security token is useable for a pre-determined amount of time. - View Dependent Claims (16, 17, 18, 19, 20, 21)
Specification