Secure configuration of cloud computing nodes
Abstract:
Methods and systems for configuring nodes in a cloud computing network are described. One example method includes receiving a request from a user to create and configure a node in the cloud computing network, the request including attributes associated with the node; verifying that user is authorized to create and configure the node; in response to verifying that the user is authorized, creating the node; receiving a configuration request from the node identifying configuration actions to perform on the node based on the attributes; in response to receiving the configuration request, sending, to the node, a configuration command corresponding to one or more of the identified configuration actions, wherein the node executes the configuration command upon receipt to perform the identified configuration actions; receiving, from the node, reporting information related; and determining that the configuration command was executed successfully based on the reporting information.
Public/Granted literature
Information query
Patent Agency Ranking
0/0