-
公开(公告)号:US20190102526A1
公开(公告)日:2019-04-04
申请号:US16147279
申请日:2018-09-28
Applicant: Oracle International Corporation
Inventor: Rohit Koul , Amit Agarwal , Dongguang Zhou , Vineet Garg , Krishnakumar Sriramadhesikan , Supriya Kalyanasundaram , Yulong Cao , Srivatsa Manjunath , Anant D. Kadam , Deepika Damojipurapu
Abstract: The present disclosure relates generally to managing security artifacts for a software application executing on a software stack. Techniques are described for defining a security configuration such that each layer of the software stack may be associated with one or more datastores, each datastore including one or more security artifacts for a particular layer. The security configuration may specify, for example, an order in which the various datastores are to be accessed when a request is received for a security artifact that is available from multiple datastores. Using the security configuration, access to security artifacts can be handled in connection with requests generated through a particular layer in the stack. A system managing the security artifacts can provide a unified view of the datastores such that, from the end-user's perspective, there is only one logical datastore.
-
公开(公告)号:US11120108B2
公开(公告)日:2021-09-14
申请号:US16147279
申请日:2018-09-28
Applicant: Oracle International Corporation
Inventor: Rohit Koul , Amit Agarwal , Dongguang Zhou , Vineet Garg , Krishnakumar Sriramadhesikan , Supriya Kalyanasundaram , Yulong Cao , Srivatsa Manjunath , Anant D. Kadam , Deepika Damojipurapu
Abstract: The present disclosure relates generally to managing security artifacts for a software application executing on a software stack. Techniques are described for defining a security configuration such that each layer of the software stack may be associated with one or more datastores, each datastore including one or more security artifacts for a particular layer. The security configuration may specify, for example, an order in which the various datastores are to be accessed when a request is received for a security artifact that is available from multiple datastores. Using the security configuration, access to security artifacts can be handled in connection with requests generated through a particular layer in the stack. A system managing the security artifacts can provide a unified view of the datastores such that, from the end-user's perspective, there is only one logical datastore.
-