US 12,105,791 B2
Cloud key management for system management
Rouven Krebs, Römerberg (DE); and Jochen Wilhelm, Sandhausen (DE)
Assigned to SAP SE, Walldorf (DE)
Filed by SAP SE, Walldorf (DE)
Filed on Nov. 19, 2021, as Appl. No. 17/455,721.
Prior Publication US 2023/0161864 A1, May 25, 2023
Int. Cl. G06F 21/45 (2013.01); H04L 9/30 (2006.01); H04L 9/32 (2006.01); H04L 9/40 (2022.01)
CPC G06F 21/45 (2013.01) [H04L 9/30 (2013.01); H04L 9/3226 (2013.01); H04L 63/08 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A computer-implemented method for credential management, the method being executed by one or more processors, wherein the method comprises:
receiving, by a credential manager running at a first network segment of network segment of a landscape environment, a request associated with an authentication of a requestor system at the landscape environment, the landscape environment including the network segments managed by different entities, wherein the request is for authentication of the requestor system at a software system running at a second network segment, wherein the second network segment provides cloud platform resources for hosting and running software systems associated with the requestor system; and
in response to receiving the request:
obtaining, by the credential manager running at the first network segment of the network segments of the landscape environment, encrypted credentials from a storage accessible by the credential manager at the first network segment, wherein the encrypted credentials are encrypted with a public key and are provided in encrypted form to the credential manager for providing to a credential usage component; and
triggering, by the credential manager, an operation for execution by the credential usage component running at a third network segment of the landscape environment, wherein the operation is for executing an action at the software system running at the second network segment, the action requiring authentication based on decrypted credentials, wherein the operation is triggered based on domain logic associated with the requestor system as stored by the credential manager, and wherein triggering the operation comprises:
providing, by the credential manager, the encrypted credentials to the credential usage component, wherein the encrypted credentials are decryptable with a private key at the third network segment by the credential usage component, wherein the private key is obtainable by the credential usage component from a third key storage persisted at the credential usage component in the third network segment, and wherein the private key and the public key are an asymmetric key pair.