-
公开(公告)号:US20230353557A1
公开(公告)日:2023-11-02
申请号:US17732311
申请日:2022-04-28
Applicant: VMware, Inc.
Inventor: Stanimir Lukanov , Kamen Mazdrashki , Georgi Lyubomirov Dimitrov , Dimo Raychev , Georgi Lekov
IPC: H04L9/40
CPC classification number: H04L63/083 , H04L63/0823
Abstract: Bootstrapping a new remote appliance based on a request received at a main appliance based on established trust between the two appliances can be implemented as computer-implemented methods, media, and systems. A request is received at an authentication orchestrator at the main appliance to perform an operation requested by a user for execution on a remote appliance. The authentication orchestrator at the main appliance obtains an authentication token issued by an identity provider at the main appliance for the user associated with the request. The authentication orchestrator requests to exchange the authentication token issued by the identity provider at the main appliance for a new authentication token that is issued by an identity provider at the remote appliance. The authentication orchestrator at the main appliance initiates an authentication of the user at an appliance manager at the remote appliance based on providing the new authentication token.
-
公开(公告)号:US11711351B2
公开(公告)日:2023-07-25
申请号:US16742881
申请日:2020-01-14
Applicant: VMware, Inc.
Inventor: Georgi Lekov , Rusko Atanasov , Stanimir Lukanov , Elena Dimitrova , Dimo Raychev
CPC classification number: H04L63/062 , H04L63/0823 , H04L63/166
Abstract: Hosts in a cluster in a virtualized computing environment bypass a management layer when communicating with an external key management service (KMS). One of the hosts is configured with KMS configuration information (including digital certificate information) that enables the host to directly communicate with the KMS via a secure communication connection, instead of communicating with the KMS via the management layer. This KMS configuration information is replicated in a distributed manner from the host to the other hosts in the cluster, thereby enabling the other hosts in the cluster to also directly and independently communicate with the KMS to obtain encryption keys to perform cryptographic operations.
-