Security and permission architecture in a multi-tenant computing system
A multi-tenant, computing environment technology, applied in computer security devices, computing, transmission systems, etc., to solve problems such as increased security problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0126] Example 1 is a machine in a multi-tenant computing system, including:
[0127] A collection of local policies that map commands to isolation levels in a multi-tenant computing system;
[0128] an authentication worker component that receives a workflow from a remote user identifying a request command to be executed on the machine using the remote management client system, accesses the local policy to identify a corresponding isolation level, and Execute commands in the execution environment of the isolation level; and
[0129] A processor activated by an authentication worker component and facilitating accessing said local policy and executing said commands.
example 2
[0130] Example 2 is a machine in any or all of the previous examples in a multi-tenant computing environment, where the authentication worker component includes:
[0131] An isolation level identifier component that, based on the requested command, accesses the set of local policies to identify a corresponding isolation level that maps to the requested command.
example 3
[0132] Example 3 is a machine in any or all of the previous examples in a multi-tenant computing environment, where the authentication worker component includes:
[0133] an execution environment generator that receives the identified isolation level and generates an execution environment with the identified isolation level on the machine.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com