US 12,413,579 B2
Securing connections between a networking and security controller and distributed agents in a container-based cluster
Wenying Dong, Beijing (CN); Jianjun Shen, Redwood City, CA (US); Rahul Jain, Jaipur (IN); Quan Tian, Beijing (CN); Mengdie Song, Beijing (CN); and Xu Liu, Beijing (CN)
Assigned to VMware LLC, Palo Alto, CA (US)
Filed by VMware, Inc., Palo Alto, CA (US)
Filed on Oct. 5, 2023, as Appl. No. 18/481,557.
Prior Publication US 2025/0119422 A1, Apr. 10, 2025
Int. Cl. G06F 9/54 (2006.01); H04L 9/40 (2022.01); H04L 41/046 (2022.01)
CPC H04L 63/083 (2013.01) [G06F 9/547 (2013.01); H04L 41/046 (2013.01); H04L 63/105 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for authenticating a network agent deployed in a networking environment, comprising:
receiving, by a network controller in the networking environment, a name of an external node where the network agent is running and a token associated with the external node;
in response to receiving the name of the external node, obtaining, by the network controller, a secret associated with the token;
parsing, by the network controller, the secret to determine an expected external node name corresponding to the token;
comparing the expected external node name with the received external node name; and
trusting the network agent when the expected external node name and the received external node name match.