US 12,294,585 B2
Techniques for automatically configuring minimal cloud service access rights for container applications
Olgierd Stanislaw Pieczul, Dublin (IE); Hubert Alexander Foskett, Sammamish, WA (US); and Robert Graham Clark, Clyde Hill, WA (US)
Assigned to Oracle International Corporation, Redwood Shores, CA (US)
Filed by Oracle International Corporation, Redwood Shores, CA (US)
Filed on Mar. 12, 2024, as Appl. No. 18/603,103.
Application 18/603,103 is a continuation of application No. 18/144,947, filed on May 9, 2023, granted, now 11,962,599.
Application 18/144,947 is a continuation of application No. 17/177,159, filed on Feb. 16, 2021, granted, now 11,695,776, issued on Jul. 4, 2023.
Prior Publication US 2024/0223569 A1, Jul. 4, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); G06F 9/455 (2018.01)
CPC H04L 63/104 (2013.01) [H04L 63/08 (2013.01); H04L 63/20 (2013.01); G06F 9/45558 (2013.01); G06F 2009/45562 (2013.01); G06F 2009/45587 (2013.01)] 20 Claims
OG exemplary drawing
 
1. One or more non-transitory computer-readable media comprising computer-executable instructions that, when executed by one or more processors, cause performance of operations, comprising:
determining a first allowed container arrangement (a) comprising a first container and a second container and (b) based at least in part on a first common access permission of the first container and the second container to access a first resource of a computing network;
assigning the first container and the second container to a first node group based at least in part on the first allowed container arrangement;
generating, for the first node group, a first node access policy comprising a first aggregate set of permissions corresponding to:
a first set of permissions associated with a first container access policy corresponding to the first container; and
a second set of permissions associated with a second container access policy corresponding to the second container;
deploying the first node group, comprising the first container and the second container, in a production environment of the computing network,
wherein the first container and the second container access the first resource of the computing network based at least in part on the first node access policy.