Securing computing resources
Various examples are directed to systems and methods for providing access to computing resources. A resource system may receive an access request from a first user. The access request may comprise resource data describing a computing resource and function data describing a requested function to be p...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Various examples are directed to systems and methods for providing access to computing resources. A resource system may receive an access request from a first user. The access request may comprise resource data describing a computing resource and function data describing a requested function to be performed on the computing resource. The resource system may determine that credential data provided by the first user is valid. The resource system may identify secondary data for the access request and generate an access object based at least in part on access object fragment data and the secondary data. The resource system may execute the access object to enable performance of the requested function on the computing resource. |
---|