Techniques for using signed nonces to secure cloud shells
Techniques for using signed nonces to secure cloud shells are provided. The techniques include receiving, by a session manager service, a request to connect a user device to a secure connection to a secure shell instance. The session manager service may authorize the user device to access the secure...
Saved in:
Main Authors | , , , , |
---|---|
Format | Patent |
Language | English |
Published |
21.06.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Techniques for using signed nonces to secure cloud shells are provided. The techniques include receiving, by a session manager service, a request to connect a user device to a secure connection to a secure shell instance. The session manager service may authorize the user device to access the secure shell instance and may configure the secure shell instance, being described by a shell identifier of the secure shell instance. The techniques also include generating, by the session manager service, a nonce token and providing the shell identifier, and a router address of the secure shell router to the user device. The techniques also include generating, by the session manager service, a signed nonce token using the nonce token; and providing the signed nonce token and the shell identifier to a user device. |
---|---|
Bibliography: | Application Number: US202016993970 |