Controlling permissions for remote management of computing resources

    公开(公告)号:US11290336B1

    公开(公告)日:2022-03-29

    申请号:US16989583

    申请日:2020-08-10

    摘要: This disclosure describes techniques for defining a set of permissions, or privileges, for users who manage resources of a network-based service provisioned in a network-based service platform managed by a service provider. The techniques may include mapping cloud identities of the users to operating system (OS) user groups defined local to the resources that specify the set of permissions for user group members. Systems-manager agents that execute locally on the resources may determine to which OS user group the user belongs based on their cloud identity, and launch shells that are restricted by the set of permissions. Using these shells, a network-based service platform may allow users to remotely manage resources of the network-based service in various ways, such as through batch run commands and/or remote user sessions, while ensuring that the users are unable to execute commands on the resources that are outside the set of permissions.

    Single sign-on techniques
    2.
    发明授权

    公开(公告)号:US11240225B1

    公开(公告)日:2022-02-01

    申请号:US16808031

    申请日:2020-03-03

    IPC分类号: H04L29/06

    摘要: Systems and methods are described herein for providing single sign-on capabilities. In some embodiments, an intermediate endpoint of a service provider receives, from a user device, an http_post message including security data provided by an identity provider. In some embodiments, the intermediate endpoint retrieves relay state data specific to the identity provider and transmits the security data and the relay state data to the user device. The user device then transmits the security data and relay state data to an authentication endpoint of the service provider. The authentication endpoint verifies that the SAML response indicated the user was authenticated by an identity provider. A URL may be retrieved from the relay state data and the user device's web browser is redirected to the URL to provide access to one or more services of the service provider.

    Facilitation of secure communications between a client and computing instance

    公开(公告)号:US11038847B1

    公开(公告)日:2021-06-15

    申请号:US16000070

    申请日:2018-06-05

    IPC分类号: H04L29/06

    摘要: This disclosure is directed to one or more computing services that provide users with secure access to a computing instance, which is auditable and accessible via a cross-platform browser-based shell or command-line interface (CLI). The computing service(s) forego any need to open up inbound ports, thereby improving security. The computing service(s) employ centralized authentication and auditing to ensure compliance with policies and to log activities for auditing, forensics, or other purposes. A message gateway service creates secure channels with a client device and the computing instance to establish a secure communication tunnel between the client device and computing instance. Once the tunnel is established, a user can send a command via the client device to the computing instance, via the message gateway service. The command output is uploaded to this tunnel and is sent back to the client device, via the message gateway service.

    Controlling permissions for remote management of computing resources

    公开(公告)号:US10771337B1

    公开(公告)日:2020-09-08

    申请号:US15989836

    申请日:2018-05-25

    摘要: This disclosure describes techniques for defining a set of permissions, or privileges, for users who manage resources of a network-based service provisioned in a network-based service platform managed by a service provider. The techniques may include mapping cloud identities of the users to operating system (OS) user groups defined local to the resources that specify the set of permissions for user group members. Systems-manager agents that execute locally on the resources may determine to which OS user group the user belongs based on their cloud identity, and launch shells that are restricted by the set of permissions. Using these shells, a network-based service platform may allow users to remotely manage resources of the network-based service in various ways, such as through batch run commands and/or remote user sessions, while ensuring that the users are unable to execute commands on the resources that are outside the set of permissions.