-
公开(公告)号:WO2022271314A1
公开(公告)日:2022-12-29
申请号:PCT/US2022/029115
申请日:2022-05-13
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: GARAEV, Dmitry Dmitrievich , LUKYANOV, Andrey Anatolyevich , SHIDA, Haruya , POWER, Marc Andrew
IPC: G06F8/60 , G06F9/50 , G06F21/6218 , G06F9/4451 , G06F9/5077
Abstract: A cross-platform deployment computing system receives an application to be deployed to a cloud. The application is parsed to identify assignment criteria and is assigned to an application availability group the defines security that defines a topology in which the application will be deployed. The application is then provided to a control plane for deployment at a target remote server architecture. In order to deploy the application to a different remote server architecture, the control plane for the different remote server architecture accesses the deployment definitions in the AAG and deploys the application to the different remote server architecture using the deployment definitions in the AAG to which the application is assigned.
-
公开(公告)号:WO2021211206A1
公开(公告)日:2021-10-21
申请号:PCT/US2021/018436
申请日:2021-02-18
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: SARAVANAN, Paranthaman , POWER, Marc Andrew , ZHANG, Yang , LEIBMANN, Matthias Adam , KAPLIN, Grigory V. , ZENG, Yi
Abstract: Techniques of keyless authentication of computing services in distributed computing systems are disclosed herein. One example technique includes upon receiving a command to instantiate a computing service, transmitting a request to an authentication service for an identity assertion token corresponding to an application execution of which instantiates the computing service. The example technique can also include upon receiving the requested identity assertion token, storing the received identity assertion token in the container and modifying an entry of a configuration file in the container that allows the instantiated computing service to access the stored identity assertion token and authenticate to the authentication service using the identity assertion token.
-
公开(公告)号:WO2022271315A1
公开(公告)日:2022-12-29
申请号:PCT/US2022/029116
申请日:2022-05-13
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: ASAWA, Arpan Jugalkishor , REMICK, Brian Douglas , GOIS, Marcus Vinicius Silva , SINHA, Ritesh Kumar , LIN, Sidi , SHINDE, Sejal Kiran , JOBSE, Ryan Lee , GUO, Rong , CHINNUSAMY, Sharanya , POWER, Marc Andrew , JAGER, Marcus Jon
IPC: G06F16/11 , G06F16/16 , G06F16/125 , G06F16/162 , G06F16/215 , G06F16/219 , G06F16/9024
Abstract: A graph tracks the lineage of customer data, including when it was originally extracted from a customer computing system, and any transformation results indicating transformations that were performed on the customer data. The graph is traversed to identify nodes in the graph that have expired based upon data removal policies The customer data represented by the expired nodes in the graph is deleted and the graph is modified to delete the expired nodes. The modified graph is then stored in persistent memory until data removal is next triggered.
-
-