AUTONOMOUS SIGNING MANAGEMENT OPERATIONS FOR A KEY DISTRIBUTION SERVICE

    公开(公告)号:US20200280449A1

    公开(公告)日:2020-09-03

    申请号:US16289652

    申请日:2019-02-28

    IPC分类号: H04L9/32 H04L9/08

    摘要: Various methods and systems are provided for autonomous signing management for a key distribution service (“KDS”). In operation, a key request from a KDS client device is received at a KDS server. The key request is associated with a security token of a signing entity caller or verifying entity caller, and a signature descriptor. The signature descriptor supports signing data with an encryption key and verifying a signature with a decryption key. The signing entity caller or the verifying entity caller is authenticated based on the corresponding security token and signature descriptor. The encryption key or the decryption key associated with the key request is generated. The encryption key or the decryption key is generated based on authenticating using the security token and the signature descriptor. The encryption key or the decryption key is communicated to a KDS client device the KDS client to sign data or decrypt a signature.

    AUTONOMOUS CROSS-SCOPE SECRETS MANAGEMENT
    2.
    发明申请

    公开(公告)号:US20190288839A1

    公开(公告)日:2019-09-19

    申请号:US15920827

    申请日:2018-03-14

    IPC分类号: H04L9/08 H04L29/06 H04L9/32

    摘要: Various methods and systems are provided for autonomous orchestration of secrets renewal and distribution across scope boundaries. A cross-scope secrets management service (“SMS”) can be utilized to store, renew and distribute secrets across boundaries in a distributed computing environment such as regional boundaries. In some embodiments, locally scoped secrets management services subscribe to receive updates from the cross-scope secrets management service. As secrets are renewed, they are automatically propagated to a subscribing local scope and distributed by the local secrets management service. In various embodiments, SMS can autonomously rollover storage account keys, track delivery of updated secrets to secrets recipients, deliver secrets using a secure blob, and/or facilitate autonomous rollover using secrets staging. In some embodiments, a service is pinned to the path where the service's secrets are stored. In this manner, secrets can be automatically renewed without any manual orchestration and/or the need to redeploy services.

    AUTONOMOUS SECRETS MANAGEMENT FOR A TEMPORARY SHARED ACCESS SIGNATURE SERVICE

    公开(公告)号:US20190286813A1

    公开(公告)日:2019-09-19

    申请号:US15920840

    申请日:2018-03-14

    IPC分类号: G06F21/46 H04L29/06

    摘要: Various methods and systems are provided for autonomous secrets management for a temporary shared access signature (“SAS”) service. Input for a temporary access request for an account resource, is received from a client. The temporary access request is validated, based on communicating a validation request to the secrets management service (“SMS”) that can be utilized to store, renew and distribute secrets in a distributed computing environment. Validating the temporary access request is based on determining a storage account location path for SAS keys that provide temporary access to account resources. An access policy associated with the temporary access request is accessed. An SAS key request, associated with temporary access request, is communicated to the SMS. The SAS key request includes at least a portion of the access policy. An SAS key is received from the SMS. The SAS key, for access to the account resource, is communicated to the client.

    ENCRYPTION AT REST FOR CLOUD-RESOURCED VIRTUAL MACHINES

    公开(公告)号:US20190354692A1

    公开(公告)日:2019-11-21

    申请号:US15981777

    申请日:2018-05-16

    IPC分类号: G06F21/60 H04L9/08

    摘要: A compute resource provider system is shown having an encryption agent that obtains a cryptographic key for a virtual machine and sends the cryptographic key to a host agent. The host agent receives the cryptographic key from the encryption agent and stores the received cryptographic key to a user key vault. The host agent generates a key vault secret reference (KVSR) locator pointing to the cryptographic key stored in the user key vault, associates the KVSR with the virtual diskset, and sends a success message to the encryption agent. The encryption agent receives the success message from the host and, responsive thereto, encrypts the virtual diskset using the cryptographic key. Subsequently, another host agent uses the KVSR to obtain the cryptographic key from the key vault and boot the virtual machine with the encrypted virtual diskset.

    AUTONOMOUS SECRETS MANAGEMENT FOR A MANAGED SERVICE IDENTITY

    公开(公告)号:US20190288995A1

    公开(公告)日:2019-09-19

    申请号:US15920821

    申请日:2018-03-14

    IPC分类号: H04L29/06

    摘要: Various methods and systems are provided for autonomous management for a managed service identity. A first token request, for a secret, is generated at a managed service. The secret supports authenticating the managed service for performing operations in a distributed computing environment. The first token request includes an identity identifier of the managed service. The first token request is communicated to a credentials manager which is associated with a secrets management service (“SMS”) that can be utilized to store, renew and distribute secrets in the distributed computing environment. Based on communicating the first token request to credentials manager, the token is received, via the credentials manager, from the secret token service. The token is received based in part on the credentials manager generating a second token request for the token and communicating the second token request and a secret associated with the managed service to the secret token service.

    RELYING PARTY CERTIFICATE VALIDATION WHEN CLIENT USES RELYING PARTY'S IP ADDRESS

    公开(公告)号:US20190288859A1

    公开(公告)日:2019-09-19

    申请号:US15923197

    申请日:2018-03-16

    IPC分类号: H04L9/32 H04L29/12 H04L29/06

    摘要: Aspects of the technology described herein enable a client device to access a web service in a claims-based identity environment thorough an Internet Protocol (IP) address, rather than the web service's domain name service (DNS). In a claims-based identity environment, a client device will authenticate a relying party's server SSL certificate before providing the token to the relying party by following an authentication process. Current authentication processes include a name-chaining operation, which compares a subject field of a token provided with the Uniform Resource Identifier (URI) used to request the resource (e.g., RP application). When the IP address is used as the URI, then the URI in the certificate will not match the URI in the request and the authentication will fail. Accordingly, aspects of the technology use an alternative authentication method that allows access to a web service through an IP address, when the default client-side token validation is DNS-name based.