| CPC G06F 8/60 (2013.01) [H04L 63/08 (2013.01); H04L 67/10 (2013.01); G06F 21/105 (2013.01)] | 14 Claims |

|
1. A data processing system comprising:
a processor; and
a machine-readable medium storing executable instructions that, when executed, cause the processor to perform operations comprising:
receiving, from a first client device of a first user associated with a first tenant of a cloud-based computing environment, a first request to deploy first software from a centralized software library stored in a memory of the cloud-based computing environment accessible by a plurality of tenants of the cloud-based computing environment, the first request including a location of the first software in the centralized software library, authentication credentials for a first user, and deployment parameters indicating how the first software is to be deployed in the cloud-based computing environment, the authentication credentials include a first shared access signature (SAS) that includes a Universal Resource Indicator (URI) referencing a storage location of the cloud-based computing environment in which the first software is stored;
authenticating the first user to determine that the first user is authorized to deploy the first software in the cloud-based computing environment;
deploying, based on the deployment parameters, the first software from the centralized software library of the cloud-based computing environment to one or more virtual machines in computing resources associated with the first tenant on the cloud-based computing environment without having to download the first software to the one or more virtual machines responsive to the first user being authorized to deploy the first software in the cloud-based computing environment;
receiving, from a second client device of a second user, a second request to add second software to a customer-specific software library associated with a second tenant of the cloud-based computing environment, the second request including a second SAS, the customer-specific software library being accessible only to users associated with the second tenant;
verifying that a signature on the second SAS is valid; and
adding the second software to the customer-specific software library responsive to the signature on the second SAS being valid.
|