-
公开(公告)号:US20210075789A1
公开(公告)日:2021-03-11
申请号:US16998371
申请日:2020-08-20
Applicant: VMware, Inc.
Inventor: Ming WEN , Edilmo PALENCIA , Russell LU , Laxmikant Vithal GUNDA , Margaret PETRUS
IPC: H04L29/06
Abstract: The disclosure provides an approach for establishing authentication between components in a network. Embodiments deploying a node of a monitoring appliance in response to a request and providing a token for accessing a network manager to the node of the monitoring appliance. Embodiments include generating, by the node of the monitoring appliance, a certificate of the node of the monitoring appliance and providing the certificate of the node of the monitoring appliance to the network manager with the token for accessing the network manager. Embodiments include adding, by the network manager, based on the token for accessing the network manager, the certificate of the node of the monitoring appliance to a first trust store and providing, by the network manager, a network manager certificate to the node of the monitoring appliance. Embodiments include adding, by the node of the monitoring appliance, the network manager certificate to a second trust store.
-
公开(公告)号:US20210141660A1
公开(公告)日:2021-05-13
申请号:US17157075
申请日:2021-01-25
Applicant: VMware, Inc.
Inventor: Srinivas NEGINHAL , Medhavi DHAWAN , Vjekoslav BRAJKOVIC , Cheng ZHANG , Jiaqi CHEN , David TSAI , Maithem MUNSHED , Zeeshan LOKHANDWALA , Ming WEN , Ragnar EDHOLM , Rajneesh BAJPAI
IPC: G06F9/455 , H04L29/06 , G06F16/182 , G06F3/06
Abstract: Certain embodiments described herein are directed to methods and systems for adding one or more nodes to a first cluster including a first node in a computer system. A method performed by the first node comprises receiving a first request from a second node to join the first cluster. The method also comprises retrieving a first cluster configuration associated with the first cluster from a distributed database through a first database server (DBS) and creating a second cluster configuration using the first cluster configuration and information received from the second node as part of the request. The method further comprises populating a first one or more local trust stores of a first one or more processes executing on the first node with a second one or more security certificates of a second one or more processes executing on the second node. The method further comprises writing the second cluster configuration to the distributed database and returning the second cluster configuration to the second node.
-