Abstract:
Techniques for secure remote access of computing resources are described herein. In some examples, when a client requests to access a computing resource, a computing service may generate a first password value for the computing resource and transmit the first password value to the client. The client may then generate and transmit key data for entry of the first password value back to the computing service. The client may generate and transmit the key data on the user's behalf, without requiring any activation or selection of keys by the user. Upon receiving the key data, the computing service may enter the first password value into the computing resource, thereby allowing the client to access the computing resource. The computing service may detect the accessing of the computing resource and may change the first password value to a second password value.
Abstract:
A service provider system may include an application fulfillment platform that delivers desktop applications on demand to desktops on physical computing devices or virtual desktop instances of end users. An application delivery agent installed on an end user's computing resource instance may store application state data (e.g., configuration data, runtime settings, or application templates) or scratch data that is generated by an application executing on the computing resource instance to a secure location on service provider storage resources. After a machine failure or change, or a rebuilding of a virtualized computing resource instance or virtual desktop instance, an application delivery agent installed on the new machine or instance may reinstall the application, retrieve the stored application state or scratch data from service provider resources, and restore the application to the last known persisted state. Upon request, the application delivery agent may restore the application to any earlier persisted state.
Abstract:
Computing resources are provided to a user by identifying applications used by the user, and provisioning virtual computing resources that are adapted to the resource requirements of the identified applications. The resource requirements of the identified applications can be combined into a single set of resource requirements and used to acquire a virtual machine that is able to host the identified applications. In other examples, virtual machines may be acquired for each identified application. Each virtual machine generates a display stream via a streaming agent. The display stream is received by an application streaming client on the user's client computer system, and is displayed to the user on a client display. Multiple virtual machines may generate multiple display streams which can be combined by the application streaming client and presented to the user on the single client display.
Abstract:
A service provider system may include an application fulfillment platform that delivers desktop applications on demand to desktops on physical computing devices or virtual desktop instances of end users. An application delivery agent installed on an end user's computing resource instance may store application state data (e.g., configuration data, runtime settings, or application templates) or scratch data that is generated by an application executing on the computing resource instance to a secure location on service provider storage resources. After a machine failure or change, or a rebuilding of a virtualized computing resource instance or virtual desktop instance, an application delivery agent installed on the new machine or instance may reinstall the application, retrieve the stored application state or scratch data from service provider resources, and restore the application to the last known persisted state. Upon request, the application delivery agent may restore the application to any earlier persisted state.
Abstract:
A first message of a first type and having a first destination address is received in a provider network. The first destination address is associated with a virtual network address of the provider network and an address of a first device in an extension of the provider network, the extension of the provider network in communication with the provider network via at least a third-party network. A message state data store is updated based on at least a portion of the first message. A first payload of the first message is sent to the first device a first secure tunnel through the third-party network.
Abstract:
Computing resources are provided to a user by identifying applications used by the user, and provisioning virtual computing resources that are adapted to the resource requirements of the identified applications. The resource requirements of the identified applications can be combined into a single set of resource requirements and used to acquire a virtual machine that is able to host the identified applications. In other examples, virtual machines may be acquired for each identified application. Each virtual machine generates a display stream via a streaming agent. The display stream is received by an application streaming client on the user's client computer system, and is displayed to the user on a client display. Multiple virtual machines may generate multiple display streams which can be combined by the application streaming client and presented to the user on the single client display.
Abstract:
Computing resources are provided to a user by identifying applications used by the user, and provisioning virtual computing resources that are adapted to the resource requirements of the identified applications. The resource requirements of the identified applications can be combined into a single set of resource requirements and used to acquire a virtual machine that is able to host the identified applications. In other examples, virtual machines may be acquired for each identified application. Each virtual machine generates a display stream via a streaming agent. The display stream is received by an application streaming client on the user's client computer system, and is displayed to the user on a client display. Multiple virtual machines may generate multiple display streams which can be combined by the application streaming client and presented to the user on the single client display.
Abstract:
A first service of a provider network obtains an identification of one or more substrate addressable devices included in an extension of the provider network. Based on the identification, a launch of one or more compute instances within the provider network is initiated. The one or more compute instances are to connect the provider network to the extension of the provider network across at least a third-party network by receiving a first control plane message directed to a first substrate addressable device of the one or more substrate addressable devices, by updating a message state data store based at least in part on the first control plane message, and by sending a second control plane message to the first substrate addressable device via a secure tunnel.
Abstract:
Techniques for secure remote access of computing resources are described herein. In some examples, when a client requests to access a computing resource, a computing service may generate a first password value for the computing resource and transmit the first password value to the client. The client may then generate and transmit key data for entry of the first password value back to the computing service. The client may generate and transmit the key data on the user's behalf, without requiring any activation or selection of keys by the user. Upon receiving the key data, the computing service may enter the first password value into the computing resource, thereby allowing the client to access the computing resource. The computing service may detect the accessing of the computing resource and may change the first password value to a second password value.
Abstract:
A service provider system may include an application fulfillment platform that delivers desktop applications to desktops on physical computing devices or virtual desktop instances. A computing resource instance may be registered with the platform, which generates a unique identifier and a security token for the computing resource instance using multiple authentication mechanisms. An end user of a customer organization may be registered with the platform, which generates a unique identifier and a security token for the end user using multiple authentication mechanisms. An application delivery agent may submit service requests to the platform on behalf of itself or the given user. The identity and security credentials included in the requests may be dependent on the request type and the entities on whose behalf they are submitted. A proxy service on the platform may receive the requests and validate the credentials, then dispatch the requests to other services on the platform.