METHODS TO ENSURE TRUST VALIDATION AND INTEGRITY OF WORKFLOW EXECUTION

    公开(公告)号:US20250094590A1

    公开(公告)日:2025-03-20

    申请号:US18466907

    申请日:2023-09-14

    Abstract: One example method includes receiving, at a multi cloud service orchestration platform from a client, a request for performance of a workflow, authenticating and authorizing the client, invoking orchestration of the workflow, invoking the workflow, validating a workflow definition associated with the workflow, and on successful validation, initializing execution of the workflow, and executing, at an activity container, the workflow. The method may be performed in the multi cloud service orchestration platform.

    DECENTRALIZED AUTHORIZATION WITH ZERO-TRUST

    公开(公告)号:US20240406169A1

    公开(公告)日:2024-12-05

    申请号:US18327303

    申请日:2023-06-01

    Abstract: Architectures and techniques are described that can provide decentralized, zero-trust authorization according to variable fine-grained policies For example, an authorization server can receive an authorization request from a requesting device. The authorization request can comprise a reference address to a resource, in which case resource data can be fetched, or comprise a signed entity indicative of the resource. In either case, resource data used to evaluate a policy can be obtained and, if an associated policy evaluation is authorized, the authorization request can be validated and an associated token can be provided to the requesting device, which can then be transmitted along with an API call to a service through which a resource is provided.

    Attribute-Based Access Control Using Scoped Roles and Conditioned Permissions Dynamic Policies

    公开(公告)号:US20240414169A1

    公开(公告)日:2024-12-12

    申请号:US18331770

    申请日:2023-06-08

    Abstract: A system can identify an attribute-based access control policy that comprises a pair comprising a permission policy and a condition policy that is associated with performing an operation on a computing resource. The system can identify that the attribute-based access control policy corresponds to a role policy that is associated with the account. The system can determine whether the account and the role policy satisfy the attribute-based access control policy with respect to the operation, wherein the determining comprises evaluating whether the computing resource and a required permission of the permission policy is declared in the role policy, and evaluating whether the account and the role policy satisfy the condition policy evaluates to true based on attributes of the account and attributes of the computing resource. The system can, in response to determining that the account satisfy the permission policy and the condition policy, perform the operation on the computing resource.

Patent Agency Ranking