PROTECTING API KEYS FOR ACCESSING SERVICES
    1.
    发明公开

    公开(公告)号:US20230269298A1

    公开(公告)日:2023-08-24

    申请号:US17651908

    申请日:2022-02-22

    CPC classification number: H04L67/40 H04L9/32 H04L9/0819 H04L9/0838

    Abstract: A method, system, and computer program product for protecting API KEYs for accessing services in a cloud environment are disclosed. A first request for generating a virtual key for a user in an organization to access a service in a cloud environment is received. The first request includes information of the organization, an identity of the user, and information of the service. A first authentication request is sent to an identity provider of the organization based on the information of the organization and the identity of the user. In response to the first authentication being successful, an API key for the organization to access the service is determined. The virtual key for the user to access the service is generated based on the API key, the information of the organization, and the identity of the user. The virtual key is returned as a response of the first request.

    ACCESS CONFIGURATION IN HYBRID NETWORK ENVIRONMENTS

    公开(公告)号:US20230362170A1

    公开(公告)日:2023-11-09

    申请号:US17662242

    申请日:2022-05-06

    CPC classification number: H04L63/105 H04L63/0876

    Abstract: Method, systems, and computer program products for access configuration in hybrid network environments are disclosed. According to the method, an access configuration request is received from a client device in a first network environment, wherein the access configuration request is associated with an access to a network resource in a second network environment and comprises first authentication information associated with the client device. Further, second authentication information associated with the network resource is obtained. The first and second authentication information is further used to determine whether the access configuration request is verified. If the access configuration request is verified, connectivity between the client device and the network resource can be automatically established.

Patent Agency Ranking