Method of managing system utilities access control
Abstract:
An access control system includes a memory, a processor, a host operating system (OS) executing on the processor, a container on the host OS, and a security manager running on the host OS. The container has a set of access control rules and includes a containerized utility. The security manager receives a request to run the utility to complete a transaction, retrieves credentials associated with the user, and determines a status of the credentials. The status of the credentials is privileged if the credentials are included in the set of access control rules and is non-privileged if the credentials are not included in the access control rules. Responsive to determining the status as privileged, the security manager executes an RBD command for the transaction to obtain a target RBD image, retrieves the target RBD image, and records the transaction.
Public/Granted literature
Information query
Patent Agency Ranking
0/0