| CPC G06F 9/45558 (2013.01) [G06F 11/1469 (2013.01); H04L 63/083 (2013.01); G06F 2009/4557 (2013.01); G06F 2009/45583 (2013.01); G06F 2009/45595 (2013.01); G06F 2201/815 (2013.01)] | 20 Claims |

|
1. A system comprising:
one or more computing devices comprising computer hardware processors and computer programming instructions that configure the system to perform a disaster recovery operation of a client computing device,
wherein the client computing device is configured with first password-protected credentials for user access, and
wherein the disaster recovery operation comprises:
(i) by a first computing device that operates in a cloud computing environment, configure a recovery virtual machine in the cloud computing environment according to system state metadata of the client computing device, wherein the system state metadata was previously saved in a backup operation of the client computing device performed by the system,
(ii) add, by the first computing device, into a data storage volume provisioned in the cloud computing environment, a configuration file that comprises instructions for creating second password-protected credentials, which are distinct from the first password-protected credentials of the client computing device, and
(iii) activate, by the first computing device, a configuration tool, which, as guided by the configuration file: establishes the second password-protected credentials in the recovery virtual machine, injects one or more drivers required by the cloud computing environment into the recovery virtual machine while logged in at the recovery virtual machine with the second password-protected credentials, and removes the second password-protected credentials from the recovery virtual machine after logging out therefrom;
wherein the disaster recovery operation configures the recovery virtual machine according to the system state metadata of the client computing device without using the first password-protected credentials of the client computing device; and
wherein after the disaster recovery operation is completed without using the first password-protected credentials of the client computing device, user access to the recovery virtual machine requires the first password-protected credentials, and not the second password-protected credentials.
|