Authentication in a multi-tenant environment

    公开(公告)号:US09973488B1

    公开(公告)日:2018-05-15

    申请号:US14097130

    申请日:2013-12-04

    CPC classification number: H04L63/0807 H04L63/083

    Abstract: Techniques are described for enabling a Kerberos-based authentication system to provide a client with access to a plurality of unmodifiable components that require plain text passwords. Such an approach enables a user to sign into a distributed computer system using a single password, and access multiple components that require different passwords without the need to enter a second password. By using Kerberos based authentication, passwords are not unnecessarily sent throughout distributed computing system where they may be vulnerable. A proxy key distribution center can be used to manage passwords or other credentials on behalf of various clients, which can be used with various processes discussed herein.

    SECURITY POLICIES WITH PROBABILISTIC ACTIONS
    233.
    发明申请

    公开(公告)号:US20180115587A1

    公开(公告)日:2018-04-26

    申请号:US15849351

    申请日:2017-12-20

    CPC classification number: H04L63/20

    Abstract: A request to access one or more computing resources is received by a system. The system performs one or more operations in response to the request according to one or more security polices, the one or more operations selected according to a substantially random selection process. A response to the request is caused based at least in part on the one or more operations.

    Using virtual networking devices to manage network configuration

    公开(公告)号:US09900214B2

    公开(公告)日:2018-02-20

    申请号:US14954734

    申请日:2015-11-30

    Abstract: Techniques are described for providing managed virtual computer networks that may have a configured logical network topology with one or more virtual networking devices, with corresponding networking functionality provided for communications between multiple computing nodes of the virtual computer network by emulating functionality that would be provided by the networking devices if they were physically present. In some situations, the emulating of networking device functionality includes receiving routing communications directed to the networking devices and using included routing information to update the configured network topology for the managed computer network. In addition, the techniques may further include supporting interactions with devices that are external to the virtual computer network, including remote physical networking devices that are part of a remote computer network configured to interoperate with the virtual computer network, and/or specialized network devices that are accessible via a substrate network on which the virtual computer network is overlaid.

    Virtual resource provider with virtual control planes

    公开(公告)号:US09882773B2

    公开(公告)日:2018-01-30

    申请号:US14195379

    申请日:2014-03-03

    CPC classification number: H04L41/0806 G06F9/5061 H04L41/5054 H04L41/5096

    Abstract: Control planes of virtual resource providers may be customized in a secure, stable and efficient manner with virtual control planes. Control planes may be modularized. Control plane modules may be supplied with data from standardized sensors, and required to generate standardized resource configuration requests responsive to solicitations with specified response latencies. Custom control plane modules may be selected to replace or complement default control plane modules. Financial and computational costs associated with control plane modules may be tracked. Competing resource configurations may be mediated by a control plane supervisor. Such mediation may be based on control plane module reputation scores. Reputation scores may be based on customer feedback ratings and/or measured performance with respect to module goals. Mediated configuration parameter values may be based on a combination of competing configuration parameter values weighted according to reputation. Contribution of individual modules to goal achievement may be tracked and rewarded accordingly.

    USING VIRTUAL NETWORKING DEVICES TO MANAGE ROUTING INFORMATION

    公开(公告)号:US20180013624A1

    公开(公告)日:2018-01-11

    申请号:US15702589

    申请日:2017-09-12

    Abstract: Techniques are described for providing managed virtual computer networks that have a configured logical network topology with virtual networking devices, such as by a network-accessible configurable network service, with corresponding networking functionality provided for communications between multiple computing nodes of the virtual computer network by emulating functionality that would be provided by the virtual networking devices if they were physically present. In some situations, the networking functionality provided for a managed computer network of a client includes receiving routing communications directed to the virtual networking devices and using included routing cost information to update the configuration of the managed computer network, and/or includes determining actual cost information corresponding to use of an underlying substrate network and providing routing cost information to the client that reflects the determined actual cost information, so as to enable the client to modify the configuration of the managed computer network accordingly.

    USING TRANSIENT PROCESSING CONTAINERS FOR SECURITY AUTHORIZATION

    公开(公告)号:US20170366551A1

    公开(公告)日:2017-12-21

    申请号:US15694697

    申请日:2017-09-01

    CPC classification number: H04L47/70 H04L63/102

    Abstract: Authorization decisions can be made in a resource environment using authorization functions which can be provided by customers, third parties, or other such entities. The functions can be implemented using virtual machine instances with one or more transient compute containers. This compute capacity can be preconfigured with certain software and provided using existing compute capacity assigned to a customer, or capacity invoked from a warming pool, to execute the appropriate authorization function. The authorization function can be a lambda function that takes in context and generates the appropriate security functionality inline. The utilization of ephemeral compute capacity enables the functionality to be provided on demand, without requiring explicit naming or identification, and can enable cause state information to be maintained for a customer.

Patent Agency Ranking