Techniques for using signed nonces to secure cloud shells

Techniques for using signed nonces to secure cloud shells are provided. The techniques include receiving, by a session manager service, a request to connect a user device to a secure connection to a secure shell instance. The session manager service may authorize the user device to access the secure...

Full description

Saved in:
Bibliographic Details
Main Authors Kasso, Christopher S, Schneider, Linda K, Kang, Amy H, Gavares, Peter Grant, Snyder, Joseph John
Format Patent
LanguageEnglish
Published 21.06.2022
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Techniques for using signed nonces to secure cloud shells are provided. The techniques include receiving, by a session manager service, a request to connect a user device to a secure connection to a secure shell instance. The session manager service may authorize the user device to access the secure shell instance and may configure the secure shell instance, being described by a shell identifier of the secure shell instance. The techniques also include generating, by the session manager service, a nonce token and providing the shell identifier, and a router address of the secure shell router to the user device. The techniques also include generating, by the session manager service, a signed nonce token using the nonce token; and providing the signed nonce token and the shell identifier to a user device.
Bibliography:Application Number: US202016993970