Authorization with container application issued token

ABSTRACT

A method and system manages access to resources within a virtualization platform using an application token, where the application token includes information to enable identification of an associated application. The method includes receiving a request from an application programming interface (API) server to instantiate an application, where the application is provided the application token based on a verified caller token, generating the application token derived from the verified caller token or a virtualization platform policy, and providing the application token to the application in a container for the application.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of U.S. Provisional Application No. 62/397,841, filed Sep. 21, 2016, which is hereby incorporated by reference.

TECHNICAL FIELD

Embodiments of the invention relate to the field of secured execution of applications in virtualized execution environments; and more specifically, to the authorization of an application to securely access an application programming interface with a token issued specifically to the application.

BACKGROUND

Virtualization in the area of computing systems is the creation of a virtual (rather than physical) representation of some aspect of the computing system. Operating system level virtualization is an example of virtualization where a server is virtualized often to provide more secure hosting environments in server farm, datacenter, cloud computing or similar distributed computing systems. Operating system level virtualization can securely manage fixed physical computing system resources amongst a set of users. These users may be from competing entities and thus need to have secured execution environments to prevent the other users from gaining access to our interfering with their programs. The virtualization may be structured as a platform that manages a set of separate operating environments as containers, virtualization engines or similar instances. The platform manages the physical computing system resources amongst the set of operating environments. Each of these instances may access or request resources via a set of interfaces including a secure Application Programming Interface (API).

Typically, the secure API requires that a user making a request, or call, to the platform perform an authentication process prior to the platform allowing the calling request to proceed. This authentication process is often accomplished through the use of a session token, used in the context of single-user sign-on. A user will authenticate himself/herself and receive a session token as a result of successful authentication. The session token can then be used to make calls to the secure API as an indication that the user has permission to proceed.

This system for authentication works well in the case when a user is manually interacting with the API requiring authentication, but represents a problem in the context of an automated entity, such as an application or similar program, attempting to perform a similar call to the secure API. With the API requiring the caller to directly authenticate, such as with a user name and password, the application relying on the authentication of the user will be required to internally store the credentials of the user or obtain them through another automated means, neither of which is considered safe handling of user credentials.

The use of a token in place of user credentials can eliminate the need for inclusion of user credentials in the application code. However, to obtain the token, the application would still need to authenticate itself as a requirement of the token issuance protocol, which would require direct intervention of the user or including the credentials in the application. This problem is often resolved by sharing the user's token with the application. The user will authenticate themselves, obtain a token and then share their user token with the application. However, this gives the application complete access to all of the resources and data that the user has access to and further undermines the security of the system in that the user token could then be transferred to another entity unknown to the user. Thus, giving an application a user token presents a discrete security risk.

SUMMARY

In one embodiment, a method manages access to resources within a virtualization platform using an application token, where the application token includes information to enable identification of an associated application. The method includes receiving a request from an application programming interface (API) server to instantiate an application, where the application is provided the application token based on a verified caller token, generating the application token derived from the verified caller token or a virtualization platform policy, and providing the application token to the application in a container for the application.

In another embodiment, a computing system is configured to implement the method for managing access to resources within the virtualization platform using the application token. The computing system includes a non-transitory machine readable medium having stored therein a container manager, and a processor coupled to the non-transitory machine readable medium. The processor executes the container manager. The container manager receives a request from the API server to instantiate an application, where the application is provided the application token based on a verified caller token. The container manager generates the application token derived from the verified caller token or a virtualization platform policy, and provides the application token to the application in a container for the application.

In a further embodiment, a non-transitory machine-readable storage medium that provides instructions that, if executed by a processor, will cause said processor to perform operations of a method for managing access to resources within the virtualization platform using the application token. The operations include receiving a request from the API server to instantiate an application, where the application is provided the application token based on a verified caller token, generating the application token derived from the verified caller token or a virtualization platform policy, and providing the application token to the application in a container for the application.

BRIEF DESCRIPTION OF THE DRAWINGS

The invention may best be understood by referring to the following description and accompanying drawings that are used to illustrate embodiments of the invention. In the drawings:

FIGS. 1A and 1B are diagrams of one embodiment of a network of computing devices functioning as a set of server hosts for virtualized execution environments.

FIG. 2 is a diagram of one embodiment of a process for application token generation and installation.

FIG. 3 is a flowchart of one embodiment of a process of a container manager to generate an application token.

DETAILED DESCRIPTION

The following description details methods and apparatus for generating and managing application tokens. Use of an application token replaces the need for an application to utilize the credentials of a user or for the user to provide a caller token to the application. The embodiments avoid the need to share the user credentials with an application by issuing a token specific to the application. The token contains information that uniquely identifies the application. An authorization set of the application can then be determined specific to the application and can be based on the authorization set of the user and/or platform policies. An application token is issued where the requesting entity has the necessary authorization. The requesting entity can be a user or another application. The application token can then be utilized by the application in place of user credentials.

In the following description, numerous specific details such as logic implementations, opcodes, means to specify operands, resource partitioning/sharing/duplication implementations, types and interrelationships of system components, and logic partitioning/integration choices are set forth in order to provide a more thorough understanding of the present invention. It will be appreciated, however, by one skilled in the art that the invention may be practiced without such specific details. In other instances, control structures, gate level circuits and full software instruction sequences have not been shown in detail in order not to obscure the invention. Those of ordinary skill in the art, with the included descriptions, will be able to implement appropriate functionality without undue experimentation.

References in the specification to “one embodiment,” “an embodiment,” “an example embodiment,” etc., indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the art to affect such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described.

Bracketed text and blocks with dashed borders (e.g., large dashes, small dashes, dot-dash, and dots) may be used herein to illustrate optional operations that add additional features to embodiments of the invention. However, such notation should not be taken to mean that these are the only options or optional operations, and/or that blocks with solid borders are not optional in certain embodiments of the invention.

In the following description and claims, the terms “coupled” and “connected,” along with their derivatives, may be used. It should be understood that these terms are not intended as synonyms for each other. “Coupled” is used to indicate that two or more elements, which may or may not be in direct physical or electrical contact with each other, co-operate or interact with each other. “Connected” is used to indicate the establishment of communication between two or more elements that are coupled with each other.

An electronic device stores and transmits (internally and/or with other electronic devices over a network) code (which is composed of software instructions and which is sometimes referred to as computer program code or a computer program) and/or data using machine-readable media (also called computer-readable media), such as machine-readable storage media (e.g., magnetic disks, optical disks, read only memory (ROM), flash memory devices, phase change memory) and machine-readable transmission media (also called a carrier) (e.g., electrical, optical, radio, acoustical or other form of propagated signals—such as carrier waves, infrared signals). Thus, an electronic device (e.g., a computer) includes hardware and software, such as a set of one or more processors coupled to one or more machine-readable storage media to store code for execution on the set of processors and/or to store data. For instance, an electronic device may include non-volatile memory containing the code since the non-volatile memory can persist code/data even when the electronic device is turned off (when power is removed), and while the electronic device is turned on that part of the code that is to be executed by the processor(s) of that electronic device is typically copied from the slower non-volatile memory into volatile memory (e.g., dynamic random access memory (DRAM), static random access memory (SRAM)) of that electronic device. Typical electronic devices also include a set or one or more physical network interface(s) to establish network connections (to transmit and/or receive code and/or data using propagating signals) with other electronic devices. One or more parts of an embodiment of the invention may be implemented using different combinations of software, firmware, and/or hardware.

A network device (ND) is an electronic device that communicatively interconnects other electronic devices on the network (e.g., other network devices, end-user devices). Some network devices are “multiple services network devices” that provide support for multiple networking functions (e.g., routing, bridging, switching, Layer 2 aggregation, session border control, Quality of Service, and/or subscriber management), and/or provide support for multiple application services (e.g., data, voice, and video).

A token is a security credential that is compact and a self-contained way for securely proving one's identity electronically. The payload can contain information about the authenticated user, an expiration and additional claims.

A user token is a token issued to a user, and contains information identifying the respective user.

An application token is a token issued to an application. It has information that identifies the application for which it is issued.

A platform is an abstraction of technologies that consists of resources that can be utilized as necessary for the purpose of providing a base for services and applications.

A container is a virtualization of an operating environment that allow you to run applications and their dependencies in resource-isolated processes.

A secured interface is a boundary that separates components of a computer system, which allows information exchange after authentication and validation of the requester. Authorization may occur at or after the secured interface, for example as part of a called function.

The prior art relies on the providing of a user token to applications needing access to secured interfaces of the platform. However, sharing a user token with an application is considered a bad practice and a potential security risk. Tokens may not, and typically don't, contain enough information for the receiver of a request including a token, such as an application programming interface (API) call to validate that the token actually comes from the entity that the token represents. In other words, simple possession of the token is considered to sufficient to authenticate the sender of the request or the API caller. Any possessor of the token will be able to make authenticated requests such as API calls including API calls to a secure interface, such as a secure API interface of a virtualization platform.

Allowing an application to possess the user token creates a situation in which the user loses exclusive control of their authenticated token. The user no longer has sole possession of their token and cannot control if/when the token, held by the application, will be used or shared. The token can be compromised if the application were to present the token to the wrong party, output a readable core dump or allow read permission for another user. Similarly, an application having the user token has the same authorization set as the user. In other words, the application has all the rights and permissions that the user does. This may not be ideal where a user would prefer to give an application a lesser authorization set.

The embodiments overcome the problems of the prior art by the generation and management of an application token. Since it is disadvantageous to share the user token or user credentials (e.g., username/password) with the application, the embodiment issues a separate token to the application itself. The token is not created for the user but, instead, is specifically created for the application. The application token contains information that uniquely identifies the application. Including applications running in a container. In some embodiments the authorization set of the application token is determine based on the authorization set of a caller or user that generated the application token. The embodiments determine if sufficient permission exists to start an application, including in a virtualization platform in a container application and then generate an application token for the container application. In other words, an application token will only be issued for the container application if the entity requesting the application token has sufficient permission. The container application's token identifies the application such that the authorization set for the application can be determined for secured API requests and similar requests coming from the container application.

Having an application token created and issued specifically for the application has the advantages of not requiring the use of the user's token by the application, thereby enabling the user to maintain control of their token and enabling accurate auditing of each token's use (i.e., retain the ability to track which token, and hence which caller/user, requested or was used to perform an action). Also, the application token allows for the defining of a separate authorization set that determines the extent to which the container application is permitted to perform actions. Specifically, the authorization set for the application can be different from the authorization set allowable for the user, caller or entity that created the application. As a whole, this improves the security of the system.

FIGS. 1A and 1B are diagrams of one embodiment of a network of computing devices functioning as a set of server hosts for virtualized execution environments. The FIGS. 1A and 1B provide one example of a set of computing devices that implement a virtualization platform. In other embodiments, the platform may be implemented by a single computing device with any configuration of hardware, while in further embodiments, the components of the virtualization platform may be distributed in other combinations and permutations as would be understood by one of skill in the art. In the example embodiment, the computing devices (Host(s) 1-N) are connected with one another over a local area network in this example an L3 network. In other embodiments, the computing devices can be connected over any type of network, interconnect or communication system.

The computing devices (Host(1-N) can have similar or varied computing resources, including differing processing capabilities, storage capabilities and similar physical hardware differences. While the examples are primarily discussed in terms of physical computing devices serving as hosts, one skilled in the art would understand that additional levels of virtualization are possible such that the platform may execute on a set of virtual hosts. For sake of clarity, the hosts are discussed as physical computing devices.

Each of the computing devices includes hardware 105 comprising a set of one or more processor(s) 111 (which can be any type of general purpose of application specific processors), network interface controller(s) (NICs; also known as network interface cards) (which include physical and virtual interfaces), non-transitory machine readable storage media 113 having stored therein software including the software that implements the embodiments described herein, and similar components. During operation, the processor(s) 111 execute the software to instantiate the platform 103 including any number of constituent components such as an instance manager 107, container manager 109, application programming interfaces (APIs) 121 and similar components, as well as one or more sets of one or more applications. The embodiments may use different forms of virtualization. For example, in one embodiment the virtualization platform may encompass the kernel of an operating system (or a shim executing on a base operating system) that allows for the creation of multiple instances called software containers or simply ‘containers’ 101 as used herein that may each be used to execute one (or more) of the sets of applications supported by the platform, where the multiple containers 101 (also called virtualization engines, virtual private servers, or jails) are user spaces (typically a virtual memory space) that are separate from each other and separate from the kernel space in which the operating system is run; and where the set of applications running in a given container or user space, unless explicitly allowed, cannot access the memory of the other containers or processes. In another embodiment the virtualization platform encompasses a hypervisor (sometimes referred to as a virtual machine monitor (WM)) or a hypervisor executing on top of a host operating system, and each of the sets of applications is run on top of a guest operating system within an instance called a virtual machine (which may in some cases be considered a tightly isolated form of software container) that is run on top of the hypervisor—the guest operating system and application may not know they are running on a virtual machine as opposed to running on a “bare metal” host electronic device, or through para-virtualization the operating system and/or application may be aware of the presence of virtualization for optimization purposes. In further embodiments, one, some or all of the applications are implemented as unikernel(s), which can be generated by compiling directly with an application only a limited set of libraries (e.g., from a library operating system (LibOS) including drivers/libraries of OS services) that provide the particular OS services needed by the application. As a unikernel can be implemented to run directly on hardware 105, directly on a hypervisor (in which case the unikernel is sometimes described as running within a LibOS virtual machine), or in a software container, embodiments can be implemented fully with unikernels running directly on a hypervisor represented by virtualization platform 103, unikernels running within software containers represented by instances 101, or as a combination of unikernels and the above-described techniques (e.g., unikernels and virtual machines both run directly on a hypervisor, unikernels and sets of applications that are run in different software containers).

While embodiments of the invention are illustrated with reference to containers 101 corresponding to one VNE A60A-R, alternative embodiments may implement this correspondence at a finer level granularity (e.g., line card virtual machines virtualize line cards, control card virtual machine virtualize control cards, etc.); it should be understood that the techniques described herein with reference to a correspondence of instances ‘A62A-R to VNEs also apply to embodiments where such a finer level of granularity and/or unikernels are used.

In certain embodiments, the virtualization platform includes a virtual switch that provides similar forwarding services as a physical Ethernet switch. Specifically, this virtual switch forwards traffic between containers 101 or instances and the NIC(s), as well as optionally between the containers 101 or instances; in addition, this virtual switch may enforce network isolation between the various components of the platform that by policy are not permitted to communicate with each other (e.g., by honoring virtual local area networks (VLANs)).

In some embodiments, hosts 1-N may communicate via a virtual network, which is a logical abstraction of a physical network that provides network services (e.g., L2 and/or L3 services). A virtual network can be implemented as an overlay network (sometimes referred to as a network virtualization overlay) that provides network services (e.g., layer 2 (L2, data link layer) and/or layer 3 (L3, network layer) services) over an underlay network (e.g., an L3 network, such as an Internet Protocol (IP) network that uses tunnels (e.g., generic routing encapsulation (GRE), layer 2 tunneling protocol (L2TP), IPSec) to create the overlay network).

The virtualization platform 103, as discussed above can include various components including an instance manager 107, container manager 109, various APIs 121, a central control node 115, an application authentication server 117 and similar components. This listing is not intended to be exhaustive, rather it sets forward those components most directly affected by the processes and embodiments described herein. These components can be spread across any combination of the hosts 1-N in any combination and permutation. Some components, such as the instance manager 107 may have instances on each host, while others such as the application authentication server 117 may be present in only a subset of the hosts.

The instance manager 107 may be responsible for generating processes and jobs in the platform. The instance manager 107 can facilitate the instantiation of applications and containers. The container manager 109 manages the generation of tokens for the applications in the platform and can also facilitate the generation of the containers and applications.

APIs 121 are sets of functions that applications, user (e.g., via a command line interface, terminal or similar interface) and similar entities utilize to request resources of the platform including hardware 105. These functions, when invoked, are often referred to as ‘calls’ to the API. Some or all of these APIs can be considered secure APIs that require authentication of the requester before the requests are processed. The authentication is generally tied to a set of permissions or an authorization set of a user who has a set of user credentials that in turn can form or generate a user token. The user credentials or user token can be processed by an authentication server such as the application authentication server 117 to verify that the user credential or the user token are valid or authorized.

A central control node 115 can manage the intercommunication and coordination of the various hosts 1-N to implement the functions of the platform. The platform when distributed can have a centralized or distributed control organization. Where centralized, the central control node 115 can manage the components and communication between the components of the platform.

The platform can support any number of containers 101 distributed across any number of the hosts 1-N and in any distribution or organization of the containers 101. The containers can be fixed to a particular host or can be configured by the platform to be capable of being moved, for example for load balancing, across the set of hosts 1-N. The containers can have varying user space sizes, accessible resources and similar variations in characteristics.

The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various general-purpose systems may be used with programs in accordance with the teachings herein, or it may prove convenient to construct more specialized apparatus to perform the required method transactions. The required structure for a variety of these systems will appear from the description above. In addition, embodiments of the present invention are not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of embodiments of the invention as described herein.

An embodiment of the invention may be an article of manufacture in which a non-transitory machine-readable medium (such as microelectronic memory) has stored thereon instructions which program one or more data processing components (generically referred to here as a “processor”) to perform the operations described above. In other embodiments, some of these operations might be performed by specific hardware components that contain hardwired logic (e.g., dedicated digital filter blocks and state machines). Those operations might alternatively be performed by any combination of programmed data processing components and fixed hardwired circuit components.

FIG. 2 is a diagram of one embodiment of a process for application token generation and installation. The diagram illustrates a basic embodiment where a user or similar entity is a caller 201 that requests the start of an application 213 and, as a part of this process, the creation of a container 211 hosting the application. The caller 201, a user using a command line interface, console, or a container application, has previously been authenticated and holds a valid authentication token which, in conjunction with proper authorization, permits the caller to request the start of the application 213. The application 213 is to run in the created container 211 and is issued an application token 215 that can be used by the application 213 to make requests through the secure API 207. The application token 215 may be issued only after authentication of the caller token or similar authorization is obtained.

The caller token 205, such as a user token or where the caller is an application the authenticated application token of the caller, is not passed on to the child container 211 or the application 213. Instead a new application token 215 is issued specifically for the child container application 213 and is used only by the child container application 213. The new application token 215 contains information that identifies the container application 213 for which it is created. The new application token 215 may be secured by the signature of a trusted parent entity, or similar mechanism and can therefore be validated that it is issued from a trusted source. Because the new application token 215 identifies the application 213 and can be validated, it can be used for authorization of the application 213. For example, the new application token 215 can allow the application 213 to read from a database of the platform or access similar resources as may be consistent with an authorization set for the new application token 215. This is significant because authorization is determined for the specific application token recipient. Therefore, each application can have its own authorization set.

Being able to identify a specific application allows authorization of the application 213 to be dissimilar from the caller 201 requesting the start of the application 213. In other words, the container application 213 can be authorized to perform actions that are less than, equal to, or greater than the authorization set of the caller 201. The application token 215 may also contain an expiration value that dictates the usability (lifetime) of the application token 215. Once the application token 215 has expired, either a new token will need to be issued for the container application 213, the container application 213 will need to “refresh” its existing token, or the container application 213 will no longer be permitted to make secure API 207 requests. Since the parent entity 209 can identify the container 211 it created, and its running application 213, an application token 215 can be reissued without the need for re-authentication.

The diagram illustrates a basic scenario indicative of the process. The caller 201 via an application, command line interface (CLI), console or similar mechanism requests or makes a call to a secure API implemented by the API server 207 of the virtualization platform. The call or request can include the user or application token 205 of the caller 201. The API server 207 may validate the received token 205. Upon validation, the API server 207 can coordinate with other components of the platform to instantiate a container 211 in which an application 213 is to be instantiated. This may be in coordination with an instance manager or similar components of the platform. The API server 207 can further coordinate with a container manager 209 to generate a new application token 215 for the application 213. The container manager 209 determines the authorization set for the application token 215, which may be based on the authorization set of the token 205 of the caller, platform policies or any combination thereof. For example, in some cases the container manager 209 can manage an authorization set for the new application token 215 that is a subset of the authorization set of the caller. More specifically, the container manager 209 manages authorization sets as defined by a platform administrator for each user and/or application. The container manager 209 acts upon the permissions from these authorization sets. However, in other cases, the policies of the platform may enable an authorization set that is at least in some manner broader than the authorization set of the caller, i.e., granting the application 213 authorizations not available to the caller 201.

Thus, the embodiments of the process create a token on behalf of an application 213 running in a container; because the platform controls the container 211 and starts the application 213 running in that container, the identity of the application 213 is known and, as a result, the platform can determine the appropriate authorization set associated with the application 213. The signed application token 215 contains the information that an API service 207 can use to ascertain the identity of the application 213 and, hence, determine authorization for the application 213.

The operations in the flow diagrams will be described with reference to the exemplary embodiments of the other figures. However, it should be understood that the operations of the flow diagrams can be performed by embodiments of the invention other than those discussed with reference to the other figures, and the embodiments of the invention discussed with reference to these other figures can perform operations different than those discussed with reference to the flow diagrams.

FIG. 3 is a flowchart of one embodiment of a process of a container manager to generate an application token. The container manager participates in the generation and distribution of the application token in coordination with the API server and similar components of the platform. The container manager receives a request from the API server to initiate an application with an application token based on a verified caller token such as a user token (Block 301). The API server may have already validated the caller token, such as a user token or of the token of the entity that called the API server to request a function of the API that involves an instantiation of an application or similar scenario where an API server sends the authenticated caller token (e.g., user token or calling application token) to the container manager with the request to instantiate the application.

The container manager instantiates a container (Block 303) into which the application will be instantiated. The requested application is then instantiated in the container (Block 305). The container manager can directly instantiate the application or can work in coordination with other components of the platform to instantiate the application and container. With the container and the application instantiated or in parallel with the instantiation of the application, the container manager can coordinate the generation of the application token (Block 307). The application token can be generated to include any identification information unique to the application along with a digital signature or similar information for authentication. In addition, the application token can include or be tied to an authorization set. The container manager can enforce policies of the virtualization platform as they pertain to the creation of application tokens. The policies can define the type and scope of authorization sets to be given to the application tokens. In some example embodiments, the policies can restrict the authorization set to a subset of the authorization set of the caller. In some embodiments, the policies may include permissions in the authorization set that are not permitted to the caller. For example, an application may be authorized to access a local database that a caller is not authorized to directly access.

Once the application token has been generated, then the application token can be provided to the application in the container (Block 309). The application token may be issued to the specific application, however, in other cases, the application may not directly manage the application token itself. In some embodiments, the application is specifically coded to receive the application token and utilize the application token when making API calls or requests or performing other functions where the application token is utilized to authenticate that the application is authorized to invoke a function or call within the virtualization platform.

While the invention has been described in terms of several embodiments, those skilled in the art will recognize that the invention is not limited to the embodiments described, can be practiced with modification and alteration within the spirit and scope of the appended claims. The description is thus to be regarded as illustrative instead of limiting. 

What is claimed is:
 1. A method for managing access to resources within a virtualization platform using an application token, where the application token includes information to enable identification of an associated application, the method comprising: receiving a request from an application programming interface (API) server to instantiate an application, where the application is provided the application token based on a verified caller token; generating the application token derived from the verified caller token or a virtualization platform policy; and providing the application token to the application in a container for the application.
 2. The method of claim 1, further comprising: instantiating the container for the application.
 3. The method of claim 1, further comprising: instantiating the application program in the container.
 4. The method of claim 1, further comprising: receiving indication of the validation of a caller token from the API server.
 5. The method of claim 4, wherein the caller token is a user token or application token.
 6. The method of claim 1, wherein application token includes information to uniquely identify the application or a digital signature.
 7. The method of claim 1, wherein the virtualization platform policy can set a scope of authorization sets to be associated with an application token to be a superset or a subset of an authorization set of the caller token, or an authorization set based on platform policies.
 8. A computing system configured to implement a method for managing access to resources within a virtualization platform using an application token, where the application token includes information to enable identification of an associated application, the computing system comprising: a non-transitory machine readable medium having stored therein a container manager; and a processor coupled to the non-transitory machine readable medium, the processor to execute the container manager, the container manager to receive a request from an application programming interface (API) server to instantiate an application, where the application is provided the application token based on a verified caller token, to generate the application token derived from the verified caller token or a virtualization platform policy, and to provide the application token to the application in a container for the application.
 9. The computing system of claim 8, wherein the container manager is further to instantiate the container for the application.
 10. The computing system of claim 8, wherein the container manager is further to instantiate the application program in the container.
 11. The computing system of claim 8, wherein the container manager is further to receive indication of the validation of a caller token from the API server.
 12. The computing system of claim 11, wherein the caller token is a user token or application token.
 13. The computing system of claim 8, wherein application token includes information to uniquely identify the application or a digital signature.
 14. The computing system of claim 8, wherein the virtualization platform policy can set a scope of authorization sets to be associated with an application token to be a superset or a subset of an authorization set of the caller token, or an authorization set based on platform policies.
 15. A non-transitory machine-readable storage medium that provides instructions that, if executed by a processor, will cause said processor to perform operations of a method for managing access to resources within a virtualization platform using an application token, where the application token includes information to enable identification of an associated application, the operations comprising: receiving a request from an application programming interface (API) server to instantiate an application, where the application is provided the application token based on a verified caller token; generating the application token derived from the verified caller token or a virtualization platform policy; and providing the application token to the application in a container for the application.
 16. The non-transitory machine-readable storage medium of claim 15, having further instructions stored therein, which when executed cause the processor to perform further operations comprising: instantiating the container for the application.
 17. The non-transitory machine-readable storage medium of claim 15, having further instructions stored therein, which when executed cause the processor to perform further operations comprising: instantiating the application program in the container.
 18. The non-transitory machine-readable storage medium of claim 15, having further instructions stored therein, which when executed cause the processor to perform further operations comprising: receiving indication of the validation of a caller token from the API server.
 19. The non-transitory machine-readable storage medium of claim 18, wherein the caller token is a user token or application token.
 20. The non-transitory machine-readable storage medium of claim 15, wherein application token includes information to uniquely identify the application or a digital signature. 