CPC G06F 21/30 (2013.01) [G06F 9/468 (2013.01); G06F 9/5061 (2013.01); H04L 9/0816 (2013.01)] | 17 Claims |
1. A computer-implemented method of configuring a cluster of data processing accelerators (DPAs) communicatively coupled to a host device, the method comprising:
receiving, by a first DPA in the cluster, from a second DPA in the cluster, a request for the second DPA to access a resource of the first DPA;
in response to determining that the resource requested by the second DPA is a sensitive resource of the first DPA, denying access to the resource requested by the second DPA; and
otherwise authenticating the second DPA, by the first DPA, and
in response to determining that the second DPA is authenticated, permitting access to the resource requested by the second DPA, and
in response to determining that the second DPA is not authenticated, breaking a communication link between the first DPA and the second DPA.
|