Stacked identities for resource principals

ABSTRACT

Techniques are described for enabling resources within a cloud computing system to interact with each other. In certain embodiments, a base identifier assigned to a first resource is extended by mapping the base identifier onto a second identifier assigned to a logical resource that is built upon the first resource. This allows the first resource to have two identities, one identity indicating what the first resource is (e.g., a particular compute instance) and another identity indicating the purpose of the first resource (e.g., operating as a database for a particular tenancy). Consequently, the first resource may be provided with access privileges different from those associated with the base identifier. For example, the first resource may access another resource in the tenancy using the second identifier, but may have no access to the other resource using the base identifier.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application claims the benefit and priority under 35 U.S.C.119(e) of U.S. Application No. 63/044,256, filed on Jun. 25, 2020,entitled “STACKED IDENTITIES FOR RESOURCE PRINCIPALS,” the content ofwhich is herein incorporated by reference in its entirety for allpurposes.

BACKGROUND

Cloud-based computing platforms offer significant advantages overtraditional on-premises computing platforms. For instance, cloud-basedcomputing platforms provide scalable and flexible computing resourcesfor users and can be deployed across geographic regions that are widelyspaced apart (e.g., in different countries). Cloud-based computingplatforms can provide one or more categories of services, includingSoftware as a Service (SaaS), Platform as a Service (PaaS), orInfrastructure as a Service (IaaS). Under an IaaS cloud service model,one or types of resources are hosted by a cloud service provider andmade available to a client (e.g., an enterprise customer). Suchresources can include computing resources (e.g., compute instances),networking resources (e.g., a virtual private network), storageresources (e.g., cloud-based databases), and other hardware or softwareresources. Resources may be provisioned for use in a tenancy associatedwith a particular client. Within the tenancy, the client may have secureand isolated access to the provisioned resources, and the cloud platformmay provide the client with software tools for organizing,administering, or otherwise managing the provisioned resources. Forinstance, an enterprise client may be provided with tools for definingthe scope of access privileges to resources by different groups ofemployees of the enterprise client.

In a distributed computing environment such as an environment thatincludes a computing platform operating under an IaaS cloud servicemodel, various entities may request access permission to protectedresources. The level of access can vary among entities. For instance, asindicated above, different users within a tenancy may have accessprivileges that depend on their user role (e.g., human resources,administrators, sales, etc.). Thus, access control can be based uponuser identity. In addition to human users, entities that require accessto resources may include compute instances (e.g., virtual or bare metalmachines). Compute instances can be provisioned and managed through thecloud infrastructure, such as Oracle Cloud Infrastructure (OCI). Computeinstances can be launched to meet computing and/or application needs.After an instance is launched, it can be accessed, restarted, and/orterminated. Any changes made to the instance can be removed when theinstance is terminated. Further, any changes can be retained.

More generally, a resource within a particular tenancy or logicalcontainer may at times request access to another resource within thetenancy/logical container, where the other resource is protected. Likehuman users, instances can have identities assigned to them. Within anidentity and access management (IAM) service provided as part of a cloudplatform, such entities are sometimes referred to as “principals.” Aprincipal is an entity that can be permitted, based on the identity ofthe principal, to interact with other resources in a cloud computingenvironment (e.g., to perform a read, a write, or a service-relatedoperation).

Security within a cloud computing environment can be managed based onactions performed by the cloud service provider as well as actionsperformed by the client (e.g., tenant). For example, in a shared,multi-tenant computing environment, the cloud service provider may beresponsible for the security of the underlying cloud infrastructure(such as data-center facilities, and hardware and software systems) andtenants may be responsible for securing their workloads and securelyconfiguring their services (such as compute, network, storage, anddatabase, etc.).

Resources in a cloud computing environment may be organized intodifferent logical containers. A client tenancy is an example of alogical container that operates as a secure and isolated partition inwhich the client can administer and manage cloud resources that havebeen provided by a cloud service provider using one or more cloudservices (e.g., data storage, compute, or network services). Theunderlying infrastructure resources upon which the resources of a clienttenancy are built are typically not visible to the client, and theclient has no access control over such infrastructure resources. Becauseresources can exist at different levels or security domains of the cloudcomputing environment (e.g., within different logical containers and/orsub-containers that are accessed-managed by different entities) and areoften built on top of each other, interaction between resources is oftennot possible

BRIEF SUMMARY

The present disclosure relates to cloud computing systems, and moreparticularly, to techniques for enabling resources within a cloudcomputing system to interact with each other. Various embodiments aredescribed herein, including methods, systems, non-transitorycomputer-readable storage media storing programs, code, or instructionsexecutable by one or more processors, and the like.

In certain embodiments, a base identifier assigned to a resourceprincipal is extended by mapping the base identifier onto a secondidentifier (referred to herein as a stacked identifier). For example,the base identifier may be an infrastructure level identifier for theresource principal. The stacked identifier may be an identifier thatidentifies a logical resource, upon which the resource principal isbuilt, as being a resource belonging to a particular customer tenancy(e.g., as being the customer's database). This allows the resourceprincipal to have two identities, one identity indicating what theresource principal is (e.g., a particular compute instance) and anotheridentity indicating the purpose of the resource principal (e.g.,operating as a database for a particular customer tenancy).

Further, the stacked identifier can enable the resource principal to actin a particular capacity beyond that indicated by its base identifier (adifferent usage domain). For instance, a stacked identifier may enable acompute instance to interact with other resources in a client tenancy bypresenting itself not as a generic compute instance, but as a logicalresource associated with the client tenancy (e.g., a database belongingto the client). In this manner, the resource principal may be providedwith access privileges different from those associated with the baseidentifier (e.g., access privileges not available using the baseidentifier). Additionally, allowing a resource principal to communicateunder the guise of a stacked identifier reduces the number ofcredentials that need to be created and managed. In the absence ofstacked identifiers, resources may resort to directly authenticatingwith each other in order to communicate (e.g., authentication based on acredential specific to a relationship between two resources).

Reducing the number of credentials makes the system less complex toimplement since there are fewer relationships to manage and fewerauthentication mechanisms to apply. Further, stacked identifiers help toprevent unintended privilege escalations such as the “confused deputy”problem by avoiding granting too much authority to resources. In theconfused deputy problem, a computer program (or more generally, acomputing resource) is fooled by another party into misusing thecomputer program's authority due to a separation between authority (whatthe computer program is authorized to do) and intent (what the computerprogram is supposed to do). For example, if a compute instance providinga client database were issued a credential in its capacity as a computeinstance within a database tenancy, the credential could be used to gainaccess to data outside of the client database because the credential mayprovide a higher level of privilege than needed for accessing the clientdatabase. However, if the compute instance were issued a credential inits capacity as a database associated with a client tenancy, the clientwould then be able to specify the level of privilege for the databaseand, by extension, the level of privilege for the compute instanceacting as the database.

In certain embodiments, a resource principal is assigned a digital tokenthat provides certain access privileges for the duration in which thedigital token is valid (e.g., thirty seconds). The digital token permitsthe resource principal to have access for a duration sufficient toperform some operation (e.g., run one-time code or the same codeperiodically on a scheduled basis), but without extending the level ofaccess for significantly longer than necessary to complete theoperation. For example, the resource principal may be a softwarefunction or code running on a compute instance, where the function/codeexists within a function tenancy, and the function/code may beconfigured to periodically access another resource in a client tenancyas part of its operation. Each time the resource principal is to performthe operation (e.g., whenever the function is invoked), the token can bereissued to the resource principal to provide the resource principalwith time-limited access privileges.

The use of this short-lived token avoids having to create permanentcredentials for the resource principal. For example, in the absence of ashort-lived token, a dummy username and a corresponding password may becreated in order to permit the resource principal to perform theoperation based on privileges associated with the dummy username, andthe dummy username/password may be rotated periodically according to asecurity policy. From the client's perspective, the actions performed bythe resource principal appear to be actions of the dummy user instead ofactions performed by the client's database or other client resource.

In certain embodiments, a token renewal mechanism is provided forextending the duration in which a resource principal can access anotherresource. The token renewal mechanism can be used to provide prolongedaccess by a resource principal that is relatively long-lived, byallowing the resource principal to periodically re-attest to itself. Thetoken renewal mechanism is particularly useful for managing access byresource principals that are not directly controlled by the cloudservice provider. In some embodiments, the token renewal mechanisminvolves a resource principal periodically causing a new credential(e.g., a new public-private key pair) to be generated for itself andthen communicating the new credential (e.g., the public key portion ofthe new public-private key pair) to an identity and access management(IAM) system in the cloud infrastructure. The new credential may begenerated for the purpose of compliance with a credential rotationpolicy specifying that credentials should be changed after a certainperiod of time. The new credential may be communicated in a requestsigned using an existing credential (e.g., an old private key). The IAMsystem may associate a digital token (which is time-limited) with thenew credential so that for subsequent requests, the IAM system will onlyrecognize the resource principal based upon the new credential. In thismanner, the ability of the resource principal to assert its identity canbe time-limited, but this ability can be renewed as often as an entitycontrolling the resource principal wishes. Additionally, the time windowwithin which the credential and/or the digital token could potentiallybe compromised (e.g., stolen) is limited as a result of the periodiccredential rotation.

In certain embodiments, a method performable by one or more processorsof a computer system involves receiving, by the computer system, arequest to provision a first resource for use within a logical containerassociated with a client of the computer system, the first resourcebeing one of a plurality of resources provided within the logicalcontainer by the computer system through one or more cloud services. Themethod further involves responsive to the request, allocating, by thecomputer system and from among a set of infrastructure resources, asecond resource upon which the first resource is built, where the secondresource is not accessible from within the logical container. The methodfurther involves assigning, by the computer system, an identifier to thesecond resource; generating, by the computer system, a second identifierthat is mapped to the identifier assigned to the second resource; andassigning, by the computer system, the second identifier to the firstresource. Due to the second identifier being mapped to the identifierassigned to the second resource, the second resource is able to presentitself as being the first resource and belonging to the logicalcontainer.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a simplified block diagram of an example cloud computingenvironment in accordance with one or more embodiments.

FIG. 2 illustrates an example of a cloud service architecturecorresponding to a single tenancy, in accordance with one or moreembodiments

FIG. 3 illustrates an example of a cloud service architecture withstacked identifiers, in accordance with one or more embodiments.

FIG. 4 illustrates an example of a cloud service architecture with anephemeral token, in accordance with one or more embodiments.

FIG. 5 illustrates an example of a cloud computing environment featuringa short-lived resource principal, in accordance with one or moreembodiments.

FIG. 6 illustrates an example of a compute instance configured toexecute software code under a Functions as a Service (FaaS) model, inaccordance with one or more embodiments.

FIG. 7 illustrates an example of a token renewal mechanism for extendingthe duration in which a resource principal can access another resource,in accordance with one or more embodiments.

FIG. 8 is a simplified flowchart depicting a process for enabling aresource to access another resource, according to certain embodiments.

FIG. 9 is a simplified flowchart depicting a process for limiting theduration of access for a resource, according to certain embodiments.

FIG. 10 is a simplified flowchart depicting a process for limiting theduration of access for a resource, according to certain embodiments.

FIG. 11 is a block diagram illustrating one pattern for implementing acloud infrastructure as a service system, according to at least oneembodiment.

FIG. 12 is a block diagram illustrating another pattern for implementinga cloud infrastructure as a service system, according to at least oneembodiment.

FIG. 13 is a block diagram illustrating another pattern for implementinga cloud infrastructure as a service system, according to at least oneembodiment.

FIG. 14 is a block diagram illustrating another pattern for implementinga cloud infrastructure as a service system, according to at least oneembodiment.

FIG. 15 is a block diagram illustrating an example computer system,according to at least one embodiment.

DETAILED DESCRIPTION

In the following description, various embodiments will be described. Forpurposes of explanation, specific configurations and details are setforth in order to provide a thorough understanding of the embodiments.However, it will also be apparent to one skilled in the art that theembodiments may be practiced without the specific details. Furthermore,well-known features may be omitted or simplified in order not to obscurethe embodiment being described.

The present disclosure relates to cloud computing systems, and moreparticularly, to techniques for enabling resources within a cloudcomputing system to interact with each other. In a distributed computingenvironment such as an environment that includes a computing platformoperating under an IaaS cloud service model, various entities mayrequest access permission to protected resources. The level of accesscan vary among entities. For instance, as indicated above, differentusers within a tenancy may have access privileges that depend on theiruser role (e.g., human resources, administrators, sales, etc.). Thus,access control can be based upon user identity. In addition to humanusers, entities that request access to resources may include computeinstances (e.g., virtual or bare metal machines). More generally, aresource within a particular client tenancy or logical container may attimes request access to another resource within the tenancy/logicalcontainer, where the other resource is protected. Like human users,instances can have identities assigned to them. Within an identity andaccess management (IAM) service provided as part of a cloud platform,such entities are sometimes referred to as “principals.” A principal isan entity that can be permitted, based on the identity of the principal,to interact with (e.g., access) resources in a cloud computingenvironment (e.g., to perform a read, a write, or a service-relatedoperation). Thus, a principal can be a user principal or a resourceprincipal (e.g., an instance principal).

Security within a cloud computing environment can be managed based onactions performed by the cloud service provider as well as actionsperformed by the client (e.g., tenant). For example, in a shared,multi-tenant computing environment, the cloud service provider may beresponsible for the security of the underlying cloud infrastructure(such as data-center facilities, and hardware and software systems) andtenants may be responsible for securing their workloads and securelyconfiguring their services (such as compute, network, storage, anddatabase, etc.).

Resources in a cloud computing environment may be organized intodifferent logical containers. A client tenancy is an example of alogical container that functions as a secure and isolated partition inwhich the client can administer and manage cloud resources that havebeen provided by a cloud service provider using one or more cloudservices (e.g., data storage, compute, or network services). Theunderlying infrastructure resources upon which the resources of a clienttenancy are built are typically not visible to the client, and theclient has no access control over such infrastructure resources.

Because resources can exist at different levels or security domains ofthe cloud computing environment (e.g., within different logicalcontainers and/or sub-containers that are accessed-managed by differententities) and are often built on top of each other, interaction betweenresources is often not possible. For example, if a client requests adatabase to be provisioned for their tenancy, the cloud service providermay, as part of providing a database service, allocate a computeinstance to a database tenancy and then run software on the computeinstance to associate the compute instance with the client's network.Since the compute instance is identified as being a compute instancewithin the database tenancy and not the client's tenancy, the clientcannot apply access control to the compute instance acting as a database(e.g., to define access privileges of individual users to the contentsof the database based on a client specified access policy).

FIG. 1 is a simplified block diagram of an example cloud computingenvironment 100 in accordance with one or more embodiments. Theenvironment 100 includes a cloud infrastructure system 105 operated by acloud service provider. The cloud infrastructure system 105 may includeinfrastructure resources 110 (e.g., hardware and/or software componentsconfigurable to provide cloud services 150 to clients of the cloudinfrastructure system 105. As illustrated, the infrastructure resourcescan be partitioned into different client tenancies 120A-120-N. Eachclient tenancy 120 is a logical container that can contain logicalresources to which the corresponding client has secure and privateaccess. For example a logical resource could be a database, a loadbalancer, or a testing platform for testing software code.

The logical resources within a client tenancy 120 can be built frominfrastructure resources provided to the client through one or more ofthe cloud services 150. For example, cloud infrastructure system 105 maybe configured to provide a database to the client tenancy 120-A usingone or more compute instances (e.g., bare metal servers or virtualmachines). To instantiate the database, the client associated with theclient tenancy 120-A may communicate, using a client device (notdepicted), a provisioning request specifying details of how the databaseis to be configured (e.g., a certain number of compute instances toallocate to the database, performance requirements, and the like).Although the database may be managed by the client, the client generallyhas no knowledge of how the database is actually implemented (e.g.,knowledge of which particular compute instances among a set of computeinstances within the cloud infrastructure system 105 are used to providethe database). The infrastructure resources upon which the logicalresources are built may belong to one or more logical containers thatare separately managed. For example, a compute instance may belong to afunction tenancy managed by the cloud service provider as part ofproviding a function (code execution) service under a Functions as aService (Faas) model such as that available through Oracle CloudInfrastructure (OCI).

In an FaaS model, a cloud service provider provides a platform forclients to develop, execute, and manage application functionalitieswithout needing to be concerned about the supporting infrastructurebecause the infrastructure is supplied by the cloud service provider andthus “serverless” from the client's perspective. An application mayinclude multiple functions.

Each function can be a block of code configured to perform a limited setof operations (e.g., a single task). In some embodiments, functions arestored as software images (e.g., images compatible with the DockerEngine software available from Docker, Inc. of San Francisco, Calif.).Each software image may include software code, libraries, system tools,configuration settings, and/or other information that enables thesoftware image to be converted into executable code at runtime. Forexample, in some embodiments, a software image may be converted intoexecutable code running within its own container that isolates thesoftware from its execution environment. The container can be removed(e.g., deleted from a memory of a compute instance) upon termination ofexecution or after an idle period of a certain duration.

In FaaS, software code (e.g., a function forming part of a softwareapplication) can be executed based on client specified conditions ortriggers, such as according to a schedule or in response to eventsoccurring on a system or device in the client's tenancy. For example, acompute instance providing a function service can be configured toexecute a function each time a write occurs to a particular bucket in aclient's cloud database. Functions can also be manually invoked by aclient. Upon execution, the function may access the cloud database oranother resource (e.g. the client's backup object storage). Although theclient may be able to specify an access policy with respect to thecontents of the database (e.g., by defining a user group and creating arule that assigns certain access privileges to a bucket within thedatabase to the user group), such an access policy would not apply tothe compute instance since the compute instance resides in a differenttenancy/logical container to which the client has no access.

As another example of a service that may be included as part of thecloud services 150, the infrastructure resources 110 may include computeinstances that host a virtual cloud network (VCN) accessible to usersassociated with the client tenancy 120-A. Thus, the infrastructureresources 110 may be configured to provide a network service withfunctionality such as load balancing, switching, routing, and the like.As with the database example above, the client associated with clienttenancy 120-A may not have visibility into how the networking servicesare implemented.

Additionally, in some cases, a client tenancy may include resources notbuilt upon infrastructure resources supplied by a cloud serviceprovider. For example, the client associated with the client tenancy120-B may choose to supply their own database (e.g., using on-premisesservers) while taking advantage of other types of cloud services 150(e.g., a cloud based object storage service for backing up the data inthe database).

As illustrated in FIG. 1 , the cloud infrastructure system 105 mayinclude an Identity Access Management (IAM) system 140. The IAM system140 may be configured to manage access to the infrastructure resources110 by user principals and/or resource principals. For example, thefunctionality provided by the IAM system 140 may include a cloud basedidentity service (another example of cloud services 150). The cloudbased identity service can be configured to maintain stored informationabout users associated with the tenancies 120A-120N, such as usernames,passwords or other credential information 160, user information, and thelike. IAM system 140 can be implemented in hardware and/or software andmay include, for example, one or more access management serversconfigured to process requests from client devices for access toresources within the client tenancies 120A-120N.

As indicated above, principals can include user principals and resourceprincipals. Thus, the IAM system 140 may be configured to store, as partof the credential information 160, credentials for both user principalsand resource principals. Such credentials can be used to determinewhether to grant or deny an access request from a principal. Inparticular, IAM system 140 may provide authentication and/orauthorization services, whereby the identity of a principal is verified(authenticated) based upon the principal being able to present a validcredential, and whereby an authenticated principal is granted permission(authorized) to access a resource based upon an applicable accesspolicy. For example, a resource principal requesting access to anotherresource may submit an access request that is signed using a digitalcertificate or private key associated with the resource principal.

In certain embodiments, the IAM system 140 may operate as a centralaccess manager that manages credentials for infrastructure resources andresources built using infrastructure resources. In other embodiments,access management responsibilities may be distributed between the IAMsystem 140 and one or more additional components. Such additionalcomponents may be part of the cloud infrastructure system 105 and/orpart of a remote computer system in communication with the IAM system140. For example, in certain embodiments, a third-party certificateauthority may be configured to issue digital certificates to resourceprincipals, where the digital certificates are presentable to the IAMsystem 140 for verifying the identity of the resource principals towhich the digital certificates are issued.

However, even when the IAM system 140 is configured to operate as acentral access manager, permission to access resources within the cloudinfrastructure system 105 may still be subject to limitations on theability of the entity (e.g., a particular client/tenant) administering aresource principal to set access privileges. In situations where aresource principal is a logical resource built using an infrastructureresource (e.g., a database implemented using one or more computeinstances allocated by the cloud service provider), the administeringentity may be provided with the ability to set and manage accessprivileges for accessing logical resources belonging to theadministering entity, but only with respect to accesses performed byresource principals that are under the administering entity's control.The administering entity may have no ability to control access by or tounderlying infrastructure resources. Thus, even an access by a firstlogical resource to a second logical resource belonging to the sameentity may not be possible absent a mechanism for establishing trustbetween resources. Embodiments are described below which provide such amechanism based upon various techniques for establishing an identity fora resource principal.

FIG. 2 illustrates an example of a cloud service architecture 200corresponding to a single tenancy, in accordance with one or moreembodiments. The cloud service architecture 200 includes serviceresources 201 and client resources 203. An example service resource caninclude a Function as a Service instance. Service resources can includeinfrastructure resources that is used by a service to compose a clientresource. As illustrated, the service resources 201 include computeinstances 212, 222, and 232-A to 232-C, and the client resources 203include a testing platform 210, a load balancer 220, a database 230,compute instances 236-A to 236-C, and object storage systems 240 and250. A compute instance can include a virtual machine (VM) host with anoperating system (OS). The service resources 201 include infrastructureresources provided by a cloud service provider for buildingcorresponding client resources 203. Infrastructure resources can includea compute instance, storage bucket, database instance and functions. Forexample, compute instance 212 may correspond to a testing platform 210configured for testing software code, the compute instance 222 maycorrespond to a load balancer 220 configured to distribute networktraffic within a client's private network, and compute instances 232-Ato 232-C may correspond to a database 230.

The testing platform 210, the load balancer 220, and the database 230are logical resources that can each be considered a separate containerwithin the logical container representing the overall tenancy. Theobject storage systems 240, 250 are also separate containers thatprovide data storage services. Each resource allocated by the cloudservice provider to the tenancy can be assigned its own infrastructureidentifier (e.g., a digital certificate that uniquely identifies theresource). The infrastructure identifier can be assigned by the parentservice exposing the resource to the end user and can be persisted inservice-specific stores. This includes each of the service resources 201and the object storage systems 240, 250. Object storage 240 cancorrespond to storage for a region A and object storage 250 cancorrespond to storage for a region B. Region A can correspond to a firstgeographic region and region B can correspond to a second geographicregion that is different from region A. As shown in FIG. 2 , computeinstance 212 may be assigned infrastructure identifier 214, computeinstance 222 assigned infrastructure identifier 224, compute instances232-A to 232-C assigned infrastructure identifiers 234-A to 234-C,object storage system 240 assigned infrastructure identifier 244, andobject storage system 250 assigned infrastructure identifier 254.

The infrastructure identifiers may be assigned by the cloud serviceprovider (e.g., by an IAM system such as the IAM system 140 in theembodiment of FIG. 1 ) and may indicate what each corresponding resourceis. For example, infrastructure identifier 234-A may uniquely identifycompute instance 232-A as being a particular compute instance (e.g., avirtual machine or bare metal instance) from among a set of computeinstances belonging to the cloud service provider. Thus, the computeinstances 212, 222, and 232-A to 232-C may be considered to be resourceprincipals of the cloud service provider. In certain embodiments,infrastructure identifiers are issued as digital certificates by thecloud service provider (e.g., using IAM system 140). The infrastructureidentifiers and the service resources 201 are generally not visible tousers associated with the tenancy since they are not controlled by theuser.

As shown in FIG. 2 , the compute instances 236-A to 236-C may also beassigned infrastructure identifiers 238-A to 238-C by the cloud serviceprovider. However, unlike the compute instances 232-A to 232-C, thecompute instances 236-A to 236-C may be directly controlled or managedby a user associated with the tenancy. Accordingly, the infrastructureidentifiers 238-A to 238-C may be visible to the user. Theinfrastructure identifiers can be visible to a user since services canexpose API's thereby allowing a user with sufficient access to listresources and their identifiers in a tenancy. Each resource depicted inFIG. 2 may use the identity provided by its corresponding infrastructureidentifier to authenticate and gain authorization to access anotherresource.

The infrastructure identifiers reduce the number of credentials andspecial relationships to be maintained for the resources. For example,in the absence of infrastructure identifiers, a Secure Sockets Layer(SSL) or Transport Layer Security (TLS) certificate may be deployed inthe load balancer 220 to enable the load balancer 220 to direct requestsfrom the testing platform 210 to the compute instances 236-A to 236-C.Further, communications between the load balancer 220 and a computeinstance 236 may involve Mutual TLS authentication (mTLS). Likewise,communications between a compute instance 236 and the database 230 mayinvolve mTLS or creation of a database credential (e.g., a dummyusername and password) for authenticating the compute instance 236 withthe database 230. Further, communications between the database 230 andthe object storage system 240 may involve cross-service authenticationbetween a database service and an object storage service. Communicationsbetween object storage system 240 (e.g., a primary backup system forreplicating data stored in the database 230) and object storage system250 (e.g., a disaster recovery system) may involve use of a cross-regioncredential, for example, because object storage system 240 is located ina different geographic region (region A) than the object storage system250 (region B).

FIG. 3 illustrates an example of a cloud service architecture 300 withstacked identifiers, in accordance with one or more embodiments. Thecloud service architecture 300 expands upon the example illustrated inFIG. 2 and includes a stacked identifier 310 generated for the loadbalancer 220 and a stacked identifier 320 generated for the database230. A stacked identifier is generated for load balancer 220 and astacked identifier 320 for purposes of example. Stacked identifiers canbe created for each of the elements in client resources 203. Eachstacked identifier 310, 320 is generated by projecting a correspondinginfrastructure identifier onto an additional identifier (i.e., thestacked identifier) that identifies a resource as belonging to theclient tenancy. The identity associated with the infrastructureidentifier is mapped to the identity associated with the stackedidentifier. For example, stacked identifier 310 may identify loadbalancer 220 as being a load balancer belonging to the client tenancy.Further, the load balancer 220 may use the stacked identifier 310 toissue a signed request for a digital certificate used to authenticatewith another resource (e.g., mTLS authentication with compute instance236-A).

In certain embodiments, a stacked identifier is generated as a digitaltoken (e.g., a JSON web token (JWT)). The digital token can include anidentifier associated with a logical resource upon which the underlyingresource is built (e.g., a identifier of the database 230 or the loadbalancer 220), an identifier associated with a logical container towhich the logical resource belongs (e.g., an identifier of a particularclient tenancy), and information indicating a resource type of thelogical resource (e.g., database, load balancer, etc.).

As an analogy, if the infrastructure identifier 224 is like a birthcertificate, then the stacked identifier 310 is like a passport obtainedusing the birth certificate. The birth certificate enables the passportto be obtained, but the purposes of the birth certificate and thepassport, and the privileges associated with these two forms ofidentification, are different. In this manner, the identity of aresource (e.g., the load balancer 220) is tied to the purpose of theresource (e.g., operating as a load balancer of the tenant), with thepurpose being specified by the service controlling the resource (e.g., anetwork service) and not the underlying infrastructure.

Similarly, the stacked identifier 320 may be generated by projecting theinfrastructure identifier 234-A onto an additional identifier thatidentifies the database 230 as belonging to the client. A service thatcomposes a client resource is aware of the underlying service resourceused to compose the stacked identifier. The service can use the identityof the underlying resource, map it to the client identifier it belongsto from its internal store, and then project a stacked identifier usingthat information.

The database 230 may use the stacked identifier 320 to make a signedrequest (e.g., a request to send a file to the object storage system240). The signed request includes the identity of the caller. In thisexample, the stacked identifier includes a public key counterpart of anephemeral key pair generated and used as part of authenticating thestacked identifier, and the payload specific to the target. In thisexample, a database instance sends a file to an object store target. Thewhole request can be signed as per a Cloud Infrastructure (CI) signingspecification using the private key counterpart of the ephemeral keypair.

In some embodiments, a request may be signed using a credential that isperiodically rotated (e.g., every 20 minutes through a Public KeyInfrastructure (PKI) service). PKI services can include a certificateauthority that can issue certificates within the cloud Infrastructuretrusted by the Identity System in that Infrastructure. OCI uses aproprietary PKI service custom built for this purpose. Further, sincethe database 230 is implemented using additional compute instances(232-B and 232-C), the stacked identifier 320 may also have theinfrastructure identifiers 234-B and 234-C projected onto it. However,in some embodiments, a separate stacked identifier may be generated foreach underlying infrastructure resource.

As indicated above, a stacked identifier can enable a logical resource(in actuality, an underlying resource upon which the logical resource isbuilt, such as the compute instance 222) to make a signed request toanother resource (e.g., compute instance 236-A) while presenting itselfas a logical resource belonging to a particular container (e.g., asbeing the client's load balancer). Thus, stacked identifiers provide amechanism for separating the authority of the underlying resource fromthe intent or purpose for which the underlying resource is to be used.This minimizes the risk of a confused deputy problem since theunderlying resource may be prevented from being granted more authoritythan the logical resource upon which it is built when the underlyingresource uses the stacked identifier to act as the logical resource(e.g., based upon an access policy that is specified by the client anddefines access privileges for a dynamic group of resource principals,where the client specifies rules for determining which resourceprincipals are members of the dynamic group). Additionally, sincestacked identifiers provide a way for the client to, in effect, defineaccess privileges for underlying resources, the use of stackedidentifiers further reduces the number of credentials and specialrelationships to be maintained for the resources.

FIG. 4 illustrates an example of a cloud service architecture 400 withan ephemeral (short-lived) token, in accordance with one or moreembodiments. The ephemeral token is generated by the caller as part ofauthentication. For example, an ephemeral token can be generated duringbrowser authentication. Generation of an ephemeral token is describedat, for example, U.S. application Ser. No. 17/069,561 filed Oct. 13,2020, titled “Browser Login Sessions Via Non-Extractable AsymmetricKeys,” which is incorporated herein by reference in its entirety.

The cloud service architecture 400 is similar to cloud servicearchitecture 300 in FIG. 3 , but includes an ephemeral token 410 issuedto the testing platform 210. Ephemeral tokens are time-limited tokens ofrelatively short duration (e.g., 5 minutes) that are presentable forobtaining access to a resource (e.g., as part of an access requestsigned using a credential associated with the requesting resource). Incertain embodiments, ephemeral tokens are issued for resource principalsconfigured to access resources for a brief period of time. For example,testing platform 210 may be configured to, as part of providing afunction service under an FaaS model, execute a client-supplied softwarefunction one time or periodically (e.g., on a weekly basis or inresponse to an event trigger), where the function accesses one or moreof the compute instances 236-A to 236C and runs for 30 seconds each timebefore terminating. Ephemeral tokens are especially useful forcontrolling access by resources that are not controlled by the cloudservice provider (e.g., resources separate from the underlyinginfrastructure). In the example of the testing platform 210, thefunction executed by the testing platform 210 can be considered to be anephemeral resource principal executed within its own container.

As indicated above, ephemeral tokens can be used to make a signedrequest for accessing a resource. For example, the testing platform 210may include the ephemeral token 410 in a request to access computeinstance 236-A, where the request is signed using a credentialassociated with the function to be executed. Therefore, in usageephemeral tokens operate similarly to stacked identifiers. However,unlike stacked identifiers, ephemeral tokens are not tied to theidentity of the underlying resource. As an analogy, an ephemeral tokenis like a receipt issued by a coffee store upon making a purchase, wherethe receipt entitles the person holding the receipt to a free coffeelater on the same day. It is implied that the person holding the receiptis a customer of the coffee store, but the person holding the receiptcan simply present the receipt to get the free coffee without providingany other form of identification. In essence, an ephemeral token enablesa resource principal (e.g., the function executed by the testingplatform 210) to assert that the resource principal belongs to aparticular logical container (e.g., a client tenancy) in order to accesssome other resource in the logical container.

FIG. 5 illustrates an example of a cloud computing environment 500featuring an short-lived resource principal, in accordance with one ormore embodiments. A short-lived resource principal can include asecurity principal of an instance of Functions as a Service resource.These can include lambda functions that are instantiated for a fleetingamount of time. For example, instantiated for an amount of time neededto make a single calculation whose results may be used in a biggerworkflow.

Cloud computing environment 500 includes a function tenancy 510 and aclient tenancy 520. The function tenancy 510 may be managed by afunction service (e.g., an FaaS service as one of the cloud services 150in FIG. 1 ), and the function service may allocate a compute instance512 in the function tenancy 510 for executing a function 514. Forexample, compute instance 512 may correspond to an implementation of thecompute instance 512 in FIG. 4 .

As illustrated in FIG. 5 , the compute instance 512 is coupled to aservice gateway 516 via a subnet 517. The compute instance 512 maycommunicate with one or more services (e.g., the function service)through the service gateway 516. Further, the compute instance 512 iscoupled to a subnet 527 in the client tenancy 520 through a virtualnetwork interface card (VNIC) 518.

The subnet 527 may be a private network (e.g., a virtual privatenetwork) through which components in the client tenancy 520 communicatewith each other. For example, as shown in FIG. 5 , the subnet 527 maycouple a database 522 (e.g., the database 230 in FIG. 4 ), a computeinstance 524 (e.g., one of the compute instances 236-A to 236-C), and aservice gateway 526. The function 514 may use the VNIC 518 tocommunicate with one or more of the components in the client tenancy520. For instance, the function 514 may access the compute instance 524through the VNIC 518 and the subnet 527. The client tenancy 520 may nothave network connectivity into the function tenancy 510. However, theclient tenancy 520 may access one or more services (e.g., another one ofthe cloud services 150 in FIG. 1 ) through the service gateway 526.

As discussed above, ephemeral tokens are one way in which a resourcewithin a logical container (e.g., the function 514 in function tenancy510) can access a resource in another logical container (e.g., database522 or compute instance 524 in client tenancy 520) based uponidentifying itself as being a resource belonging to the other logicalcontainer. Therefore, even though the compute instance 512 may beinvisible from the perspective of the client tenancy 520, the clientassociated with the client tenancy 520 can write an access policy thatauthorizes functions belonging to the client tenancy 520 (e.g., thefunction 514, based upon an ephemeral token) to access a resource in theclient tenancy 520.

FIG. 6 illustrates an example of a compute instance 600 configured toexecute software code under an FaaS model, in accordance with one ormore embodiments. The compute instance 600 is coupled to a servicenetwork (e.g., subnet 517 in FIG. 5 ) through a VNIC 630 and maycorrespond to an implementation of the compute instance 512. In theexample of FIG. 6 , the compute instance 600 is configured to executemultiple functions 610 and 620. For instance, the functions 610, 620 mayinvolve different software code. Function 610 may communicate with aclient network (e.g., subnet 527) through a VNIC 634. Similarly,function 620 may communicate with a client network (e.g., subnet 527 ora subnet in a client tenancy other than client tenancy 520) through aVNIC 636. Further, there may be multiple instances of function 610(e.g., 610-A to 610-N) and multiple instances of function 620 (e.g.,620-A to 620-N). Each function instance can be configured to execute inits own container and may be invoked by the compute instance 600 inresponse to one or more conditions, such as time-based conditions (e.g.,scheduled one-time execution or recurring execution) and/or event-basedconditions (e.g., reading or writing to a database, or occurrence ofsome other operation with respect to a particular resource).

As shown in FIG. 6 , the compute instance 600 may be assigned aninfrastructure identifier 602. Additionally, each instance of function610 may be issued an ephemeral token 612 that permits the function 610to access a resource in a client tenancy via the VNIC 634. Similarly,each instance of function 620 may be issued an ephemeral token 622 thatpermits the function 620 to access a resource in a client tenancy viathe VNIC 636. In some embodiments, ephemeral tokens issued to resourceprincipals of the same category may include a shared identifier. Forexample, the function instances 610-A to 610-N may each be issued aseparate ephemeral token 612, but each ephemeral token 612 may indicatethat the bearer of the ephemeral token is a particular type of function.

Further, each function instance may be associated with a credential(e.g., a public-private key pair) usable for uniquely identifying thefunction instance. For example, the function 610 may be configured tomaintain a private key and a corresponding public key while the function610 is executing, where the private key is accessible to the function610, but not to other components within the compute instance 600.Accordingly, when the function 610 finishes executing, the private keyand the private key may automatically expire.

In certain embodiments, a service control plane manages resources. Theservice control plane may include a set of hardware and/or softwarecomponents responsible for allocating resources in connection withproviding a particular service. For example, a database control planemay allocate database resources, and a function control plane maygenerate function instances. When resources are managed thorough aservice control plane, tokens can be issued to the resources based uponcommunication between an identity manager (e.g., IAM system 140 in FIG.1 ) and the service control plane. For example, IAM system 140 mayassign the infrastructure identifier 602 to compute instance 600 priorto the compute instance 600 being allocated for use within a functionservice, and the function control plane may, as part of invoking thefunction 610, communicate a request to the IAM system 140 for theephemeral token 612. In response to the request, the IAM system 140 maygenerate the ephemeral token 612 and send it function control plane,which then stores the ephemeral token 612 for the function 610.Alternatively, in other embodiments, a resource principal may beconfigured to request an ephemeral token for itself. For example, thefunction 610 may be configured to execute bootstrap code that causes thefunction 610 to communicate a request to the IAM system 140 for theephemeral token 612. The bootstrap code may be executed each time thefunction 610 is invoked. In yet another embodiment, the service controlplane may generate an ephemeral token without communicating with anidentity manager.

Functions 610 and 620 may be isolated within their respective containersso as not to have access to the infrastructure identifier 602, and thusmay not be able to present themselves under the identity of the computeinstance 600. Therefore, the network connectivity of the functions 610and 620 may be limited to one or more client tenancies. However, thecompute instance 600 can use the infrastructure identifier 602 topresent itself as being an instance principal, for example, inconnection with a request sent via the VNIC 630 for accessing a serviceprovided through the service network.

FIG. 7 illustrates an example of a token renewal mechanism for extendingthe duration in which a resource principal can access another resource,in accordance with one or more embodiments. The token renewal mechanismillustrated in FIG. 7 permits a resource principal to renew atime-limited token. The token renewal mechanism is useful for resourceprincipals that are relatively longer lived, including resourceprincipals that are continuously operating or require access for anextended period of time (e.g., hours or days). Because a long-livedresource principal may require extended access, the time-limited tokenissued to a long-lived resource principal may have a validity periodthat is longer than that of an ephemeral token issued to an ephemeralresource principal (e.g., 2 hours instead of 5 minutes). In either case,the token is time-limited and may include a timestamp usable fordetermining whether the token has expired. For example, the ephemeraltokens 612 and 622 in FIG. 6 and a time-limited token 710 issued to along-lived resource 700 may each include a timestamp indicating when thetoken was issued and/or a timestamp indicating when the token expires.

As shown in FIG. 7 , the long-lived resource 700 may have associatedwith it a key pair including a private key and a corresponding publickey. The private key and the public key may be generated automatically(e.g., by the long-lived resource 700) through a key rotation algorithm.Alternatively, the private key and the public key can be manuallygenerated by an entity controlling the long-lived resource 700 (e.g., bya user associated with a tenancy in which the long-lived resourcebelongs). The long-lived resource 700 may keep the private key a secretwhile sharing the public key with other components within a cloudenvironment. The public key may be associated with the time-limitedtoken 710 issued to the long-lived resource 700. For example, asillustrated in FIG. 7 , an IAM system 740 may store an associationbetween the time-limited token 710 and an old public key 720. Due tothis stored association, the IAM system 740 can recognize the long-livedresource 700 based upon the old public key 720. For instance, when thelong-lived resource 700 sends a request for access to another resourceor a renewal request 705 for renewing the time-limited token 710, thelong-lived resource 700 may digitally sign the request using itsexisting private key (e.g., an old private key 730). The IAM system 740can use the old public key 720 to verify the digital signature in therequest, thereby confirming that the request is from the long-livedresource 700.

The renewal request 705 may include a copy of the time-limited token 710and a new public key 722 generated for the long-lived resource 700. Thenew public key 722 may be generated together with a new private key 732.As with the old private key 730, the long-lived resource 700 may keepthe new private key 732 secret. As indicated above, the renewal request705 may be digitally signed using the old private key 730. Accordingly,upon receiving the renewal request 705, the IAM system 740 can use theold public key 720 to verify the digital signature in the renewalrequest 705. If the verification is successful, the IAM system 740 mayupdate the stored association so that the time-limited token 710 isassociated with the new public key 722 (as provided in the renewalrequest 705) instead of being associated with the old public key 720.This would enable the IAM system 740 to recognize the long-livedresource 700 based upon the new public key 722 for any subsequentrequests from the long-lived resource 700. In some embodiments, the IAMsystem 740 may also compare the time-limited token included in therenewal request 705 to the time-limited token stored by the IAM systemto, as a condition for updating the stored association, verify that bothtokens are the same token 710.

The long-lived resource 700 may be subject to a mandatory key rotationpolicy that dictates the maximum lifetime of the key pair. The validityperiod of the time-limited token 710 can be at least as long as themaximum lifetime of the key pair. For example, the key rotation policymay specify that the public key or both the public key and the privatekey should be changed every 12 hours, while the time-limited token 710may be valid for 24 hours. Alternatively, the validity period of thetime-limited token 710 could be of the same duration as the maximumlifetime of the key pair. In either case, the time-limited token 710 canbe kept valid indefinitely as long as the key pair continues to beupdated. If the key pair is not updated within the lifetime of the keypair (e.g., the IAM system 740 does not receive a renewal request within12 hours of the most recent rotation), the IAM system 740 may deem thekey pair to be expired. Based upon the time-limited token 710 beingassociated with the now-expired key pair, the IAM system 740 mayinvalidate the time-limited token 710.

Key rotation based renewal of a time-limited token also enables the IAMsystem 740 to determine that a credential (e.g., the private key)associated with the resource to which the time-limited token is assignedhas been compromised. For example, the IAM system 740 may determine thatthe old private key 730 was compromised if a digital signature in arequest (e.g., an access request or a renewal request) cannot beverified based upon the public key currently associated with thetime-limited token 710. This could occur because the request is signedusing the old private key 730 and therefore the signature cannot beverified using the new public key 722. When the credential is determinedto be comprised, the IAM system 740 will not recognize the sender of therequest, and the request fails (e.g., the IAM system 740 denies therenewal request or denies authorization for the access).

Further, if the credential is compromised before the long-lived resource700 can make a renewal request, the window of time within which athird-party can use the time-limited token 710 is constrained accordingto the maximum lifetime dictated by the key rotation policy. Forexample, if the third-party stole the old private key 730 before therenewal request 705 is sent from the long-lived resource 700, thethird-party would send its own renewal request in order to keep thetime-limited token 710 valid. Assuming that the renewal request from thethird-party is successful (e.g., because the third-party also stole thetime-limited token 710), the stored association would be updated toreflect a new public key supplied by the third party. This means thatthe next time the long-lived resource 700 sends a renewal request (e.g.,within 12 hours of the last renewal request from the long-lived resource700), the IAM system 740 will not recognize the long-lived resource 700,and the renewal request from the long-lived resource 700 would fail. Insuch situations, the entity to whom the long-lived resource 700 belongs(e.g., a particular client) may notify the cloud service provider thatthere is a problem with the long-lived resource 700, and the cloudservice provider may respond by, for example, blacklisting thelong-lived resource 700 to prevent it from interacting with otherresources.

Time-based key pairs are merely one example of a type of credential thatcan be used to renew a token based upon a stored association between thecredential and the token. For example, in some embodiments, a resourcemay be manually assigned a digital certificate (e.g., a PKI certificate)containing a resource identifier and other information when the resourceis instantiated. The digital certificate may have a fixed lifetime andmay be generated based upon a public key issued to the resource and aprivate key associated with a certificate authority (e.g., the cloudinfrastructure provider or a publicly recognized certificate authorityexternal to the cloud infrastructure system), where the private key isused to sign the digital certificate. The public key may be rotatedbased upon communication between the certificate authority and theresource or between the certificate authority and the service managingthe resource, but the stored association may be between the token andthe digital certificate, not the token and the public key.

FIG. 8 is a simplified flowchart depicting a process 800 for enabling aresource to access another resource, according to certain embodiments.The process depicted in FIG. 8 may be implemented in software (e.g.,code, instructions, program) executed by one or more processing units(e.g., processors, cores) of the respective systems, hardware, orcombinations thereof. The software may be stored on a non-transitorystorage medium (e.g., on a memory device). The method presented in FIG.8 and described below is intended to be illustrative and non-limiting.Although FIG. 8 depicts the various processing steps occurring in aparticular sequence or order, this is not intended to be limiting. Incertain alternative embodiments, the steps may be performed in somedifferent order or some steps may also be performed in parallel. Incertain embodiments, the processing depicted in FIG. 8 may be performedby a cloud infrastructure system such as the cloud infrastructure system105 shown in FIG. 1 . More particularly, the processing depicted in FIG.8 may be performed at least in part by an identity manager within thecloud infrastructure system (e.g., IAM system 140).

As shown in FIG. 8 , at 802, a request to provision a first resource foruse within a logical container (e.g., a client tenancy) is received. Forexample, the request may be a request for a database to be instantiatedin the client's tenancy and using a certain number of compute instances.The request may be received by the cloud infrastructure system from acomputing device operated by a user associated with the logicalcontainer.

At 804, a second resource, upon which the first resource is built, isallocated from among a set of infrastructure resources in response tothe request in 802. The allocation can be performed by the serviceexposing the second resource, which is used by the service composing thefirst resource. In this example, the compute service allocates a computeinstance upon a request from the database service which builds adatabase on top of the compute instance.

For example, the second resource may be a compute instance that will beconfigured to operate as the first resource (e.g., a database).Configuration of the second resource may involve operations such ascopying software to a memory of the second resource (e.g., a default orclient-supplied operating system and/or a service-specific softwareapplication), setting appropriate network connections for the secondresource, and the like.

At 806, an identifier is assigned to the second resource. The identifiermay be assigned prior to receiving the request in 802. The identifiercan be assigned by the service exposing the resource. The identifier isa unique identifier which maps to metadata that the service may persistin its store. The store can include certain attributes such as name,time of creation, and the container in which it is created.

The IAM system 140 may generate identifiers for each compute instance inthe cloud infrastructure system before the compute instance is allocatedfor use as part of providing a cloud service. Alternatively, theidentifier may be assigned after receiving the request in 802. Forexample, the IAM system 140 may generate and assign the identifierduring configuration of the second resource (e.g., during bootloading ofthe compute instance). As indicated above, infrastructure resources maynot be visible to clients. Therefore, the second resource may not beaccessible from within the logical container (e.g., to another resourcein the logical container). Similarly, the second resource may not beable to access another resource in the logical container.

At 808, a second identifier is generated (e.g., by the IAM system 140).The second identifier can be generated by the service processing therequest to allocate the first resource. The second identifier can be theidentifier of the first resource, but internally it is mapped to thesecond resource from which it is composed. The second identifier can bean identifier that is mapped to the identifier assigned in 806. Forexample, in the embodiment of FIG. 3 , the identifier assigned in 806may correspond to infrastructure identifier 224 or infrastructureidentifier 234-A, and the second identifier may correspond to one of thestacked identifiers 310, 320.

At 810, the second identifier from 808 is assigned to the firstresource. Due to the second identifier being mapped to the identifierassigned to the second resource, the second resource is able to presentitself as being the first resource and belonging to the logicalcontainer. For example, as discussed above, assigning stacked identifier320 to the database 230 may permit the compute instance 232-A to make asigned request to object storage system 240 while presenting itself asbeing a database belonging to a particular client tenancy.

FIG. 9 is a simplified flowchart depicting a process 900 for limitingthe duration of access for a resource, according to certain embodiments.The process depicted in FIG. 9 may be implemented in software (e.g.,code, instructions, program) executed by one or more processing units(e.g., processors, cores) of the respective systems, hardware, orcombinations thereof. The software may be stored on a non-transitorystorage medium (e.g., on a memory device). The method presented in FIG.9 and described below is intended to be illustrative and non-limiting.Although FIG. 9 depicts the various processing steps occurring in aparticular sequence or order, this is not intended to be limiting. Incertain alternative embodiments, the steps may be performed in somedifferent order or some steps may also be performed in parallel. Incertain embodiments, the processing depicted in FIG. 9 may be performedby a cloud infrastructure system such as the cloud infrastructure system105, as shown in FIG. 1 . More particularly, the processing depicted inFIG. 9 may be performed at least in part by an identity manager withinthe cloud infrastructure system (e.g., IAM system 140).

As shown in FIG. 9 , at 902, a first resource is provided through acloud service for use within a logical container. For example, the firstresource may be a software function provided to client tenancy as partof a function service, and may be executed on a compute instance that isalso provided as part of the function service. Providing the firstresource may involve operations such as copying the software function toa memory of the compute instance on which the software function willexecute, invoking the software function through a control planeassociated with the function service, setting appropriate networkconnections for the software function, and the like.

At 904, a determination is made that the first resource will beconfigured to operate for a limited duration in the logical container.The determination can be made by the service exposing the resource. Forexample, the control plane associated with the function service mayreceive an indication from a client device (e.g., as part of a requestfor provisioning the first resource) that the first resource is ashort-lived resource.

At 906, based upon the determination that the first resource will beconfigured to operate for a limited duration in the logical container, adigital token (e.g., the ephemeral token 410 in the embodiment of FIG. 4) is generated for the first resource. For example, based upon receivingthe indication that the first resource is a short-lived resource, thecontrol plane may communicate a request to the IAM system 140 forissuing the digital token. Upon receiving the request from the controlplane, the IAM system 140 may generate the digital token and communicatethe digital token to the control plane for storage by the first resource(e.g., in a runtime memory allocated to the software function).

As discussed earlier, an ephemeral token can have a relatively shortvalidity period and can permit a short-lived resource permission toaccess another resource in the logical container (e.g., another computeinstance in the client tenancy) as long as the digital token remainsvalid. The validity period may be configured such that it is slightlylonger than needed for the short-lived resource to complete itsoperation (e.g., a validity period of 5 minutes), but short enough tocompensate for the risk that the digital token could become compromised.Additionally, as indicated above, in order to access another resource,the short-lived resource may authenticate based upon a credential (e.g.,a public-private key pair) associated with the short-lived resource, butsuch a credential may automatically expire along with the short-livedresource (e.g., because the credential is stored together with thedigital token in the runtime memory allocated to the software function).

FIG. 10 is a simplified flowchart depicting a process 1000 for limitingthe duration of access for a resource, according to certain embodiments.The process depicted in FIG. 10 may be implemented in software (e.g.,code, instructions, program) executed by one or more processing units(e.g., processors, cores) of the respective systems, hardware, orcombinations thereof. The software may be stored on a non-transitorystorage medium (e.g., on a memory device). The method presented in FIG.10 and described below is intended to be illustrative and non-limiting.Although FIG. 10 depicts the various processing steps occurring in aparticular sequence or order, this is not intended to be limiting. Incertain alternative embodiments, the steps may be performed in somedifferent order or some steps may also be performed in parallel. Incertain embodiments, the processing depicted in FIG. 10 may be performedby a cloud infrastructure system such as the cloud infrastructure system105, as shown in FIG. 1 . More particularly, the processing depicted inFIG. 10 may be performed at least in part by an identity manager withinthe cloud infrastructure system (e.g., IAM system 740 in the embodimentof FIG. 7 ).

As shown in FIG. 10 , at 1002, a digital token (e.g., the time-limitedtoken 710 in FIG. 7 ) is generated for a first resource within a logicalcontainer (e.g., a database in a client tenancy). The digital tokengenerated in 1002 has a validity period and permits the first resourceto access a second resource in the logical container while the digitaltoken remains valid. The digital token can be renewed according to thesubsequent steps depicted in FIG. 10 so that the digital token cancontinue to be used for accessing the second resource.

At 1004, an association between the digital token and a first credentialbelonging to the first resource is stored. Due to the storedassociation, access to the second resource based upon the digital tokenis conditioned upon successful authentication of the first resourceusing the first credential. For example, as discussed above, IAM system740 can associate the time-limited token 710 with the most recent publickey communicated to the IAM system 740 by the long-lived resource 700 sothat only requests signed using a corresponding private key arerecognized as being sent from the long-lived resource 700.

At 1006, a request to renew the digital token is received. The requestin 1006 includes a second credential different from the firstcredential. For example, the second credential may be a new public keygenerated by or on behalf of the first resource.

At 1008, a determination is made, using the first credential, that therequest is from the first resource. For example as discussed above, theIAM system 740 may use an existing public key stored in association withthe time-limited token 710 to verify a digital signature in a renewalrequest. If the verification is successful, this indicates that thesender of the renewal request has possession of a private keycorresponding to the existing public key.

At 1010, the digital token is renewed in response to the determinationin 1008. The renewing of the digital token may involve updating thestored association to replace the first credential with the secondcredential such that, for a subsequent request to access the secondresource based upon the digital token, access is conditioned uponsuccessful authentication of the first resource using the secondcredential. For example, in order to access the second resource, thefirst resource may send an access request that includes the digitaltoken, where the access request is digitally signed using the latestprivate key, and where the digital signature is verified using thecorresponding latest public key. In certain embodiments, the renewing ofthe digital token in 1010 may also involve resetting the validity periodof the digital token.

Example Infrastructure as a Service Architectures

As noted above, infrastructure as a service (IaaS) is one particulartype of cloud computing. IaaS can be configured to provide virtualizedcomputing resources over a public network (e.g., the Internet). In anIaaS model, a cloud computing provider can host the infrastructurecomponents (e.g., servers, storage devices, network nodes (e.g.,hardware), deployment software, platform virtualization (e.g., ahypervisor layer), or the like). In some cases, an IaaS provider mayalso supply a variety of services to accompany those infrastructurecomponents (e.g., billing, monitoring, logging, security, load balancingand clustering, etc.). Thus, as these services may be policy-driven,IaaS users may be able to implement policies to drive load balancing tomaintain application availability and performance.

In some instances, IaaS customers may access resources and servicesthrough a wide area network (WAN), such as the Internet, and can use thecloud provider's services to install the remaining elements of anapplication stack. For example, the user can log in to the IaaS platformto create virtual machines (VMs), install operating systems (OSs) oneach VM, deploy middleware such as databases, create storage buckets forworkloads and backups, and even install enterprise software into thatVM. Customers can then use the provider's services to perform variousfunctions, including balancing network traffic, troubleshootingapplication issues, monitoring performance, managing disaster recovery,etc.

In most cases, a cloud computing model will require the participation ofa cloud provider. The cloud provider may, but need not be, a third-partyservice that specializes in providing (e.g., offering, renting, selling)IaaS. An entity might also opt to deploy a private cloud, becoming itsown provider of infrastructure services.

In some examples, IaaS deployment is the process of putting a newapplication, or a new version of an application, onto a preparedapplication server or the like. It may also include the process ofpreparing the server (e.g., installing libraries, daemons, etc.). Thisis often managed by the cloud provider, below the hypervisor layer(e.g., the servers, storage, network hardware, and virtualization).Thus, the customer may be responsible for handling (OS), middleware,and/or application deployment (e.g., on self-service virtual machines(e.g., that can be spun up on demand) or the like.

In some examples, IaaS provisioning may refer to acquiring computers orvirtual hosts for use, and even installing needed libraries or serviceson them. In most cases, deployment does not include provisioning, andthe provisioning may need to be performed first.

In some cases, there are two different problems for IaaS provisioning.First, there is the initial challenge of provisioning the initial set ofinfrastructure before anything is running. Second, there is thechallenge of evolving the existing infrastructure (e.g., adding newservices, changing services, removing services, etc.) once everythinghas been provisioned. In some cases, these two challenges may beaddressed by enabling the configuration of the infrastructure to bedefined declaratively. In other words, the infrastructure (e.g., whatcomponents are needed and how they interact) can be defined by one ormore configuration files. Thus, the overall topology of theinfrastructure (e.g., what resources depend on which, and how they eachwork together) can be described declaratively. In some instances, oncethe topology is defined, a workflow can be generated that creates and/ormanages the different components described in the configuration files.

In some examples, an infrastructure may have many interconnectedelements. For example, there may be one or more virtual private clouds(VPCs) (e.g., a potentially on-demand pool of configurable and/or sharedcomputing resources), also known as a core network. In some examples,there may also be one or more security group rules provisioned to definehow the security of the network will be set up and one or more virtualmachines (VMs). Other infrastructure elements may also be provisioned,such as a load balancer, a database, or the like. As more and moreinfrastructure elements are desired and/or added, the infrastructure mayincrementally evolve.

In some instances, continuous deployment techniques may be employed toenable deployment of infrastructure code across various virtualcomputing environments. Additionally, the described techniques canenable infrastructure management within these environments. In someexamples, service teams can write code that is desired to be deployed toone or more, but often many, different production environments (e.g.,across various different geographic locations, sometimes spanning theentire world). However, in some examples, the infrastructure on whichthe code will be deployed must first be set up. In some instances, theprovisioning can be done manually, a provisioning tool may be utilizedto provision the resources, and/or deployment tools may be utilized todeploy the code once the infrastructure is provisioned.

FIG. 11 is a block diagram 1100 illustrating an example pattern of anIaaS architecture, according to at least one embodiment. Serviceoperators 1102 can be communicatively coupled to a secure host tenancy1104 that can include a virtual cloud network (VCN) 1106 and a securehost subnet 1108. In some examples, the service operators 1102 may beusing one or more client computing devices, which may be portablehandheld devices (e.g., an iPhone®, cellular telephone, an iPad®,computing tablet, a personal digital assistant (PDA)) or wearabledevices (e.g., a Google Glass® head mounted display), running softwaresuch as Microsoft Windows Mobile®, and/or a variety of mobile operatingsystems such as iOS, Windows Phone, Android, BlackBerry 8, Palm OS, andthe like, and being Internet, e-mail, short message service (SMS),Blackberry®, or other communication protocol enabled. Alternatively, theclient computing devices can be general purpose personal computersincluding, by way of example, personal computers and/or laptop computersrunning various versions of Microsoft Windows®, Apple Macintosh®, and/orLinux operating systems. The client computing devices can be workstationcomputers running any of a variety of commercially-available UNIX® orUNIX-like operating systems, including without limitation the variety ofGNU/Linux operating systems, such as for example, Google Chrome OS.Alternatively, or in addition, client computing devices may be any otherelectronic device, such as a thin-client computer, an Internet-enabledgaming system (e.g., a Microsoft Xbox gaming console with or without aKinect® gesture input device), and/or a personal messaging device,capable of communicating over a network that can access the VCN 1106and/or the Internet.

The VCN 1106 can include a local peering gateway (LPG) 1110 that can becommunicatively coupled to a secure shell (SSH) VCN 1112 via an LPG 1110contained in the SSH VCN 1112. The SSH VCN 1112 can include an SSHsubnet 1114, and the SSH VCN 1112 can be communicatively coupled to acontrol plane VCN 1116 via the LPG 1110 contained in the control planeVCN 1116. Also, the SSH VCN 1112 can be communicatively coupled to adata plane VCN 1118 via an LPG 1110. The control plane VCN 1116 and thedata plane VCN 1118 can be contained in a service tenancy 1119 that canbe owned and/or operated by the IaaS provider.

The control plane VCN 1116 can include a control plane demilitarizedzone (DMZ) tier 1120 that acts as a perimeter network (e.g., portions ofa corporate network between the corporate intranet and externalnetworks). The DMZ-based servers may have restricted responsibilitiesand help keep security breaches contained. Additionally, the DMZ tier1120 can include one or more load balancer (LB) subnet(s) 1122, acontrol plane app tier 1124 that can include app subnet(s) 1126, acontrol plane data tier 1128 that can include database (DB) subnet(s)1130 (e.g., frontend DB subnet(s) and/or backend DB subnet(s)). The LBsubnet(s) 1122 contained in the control plane DMZ tier 1120 can becommunicatively coupled to the app subnet(s) 1126 contained in thecontrol plane app tier 1124 and an Internet gateway 1134 that can becontained in the control plane VCN 1116, and the app subnet(s) 1126 canbe communicatively coupled to the DB subnet(s) 1130 contained in thecontrol plane data tier 1128 and a service gateway 1136 and a networkaddress translation (NAT) gateway 1138. The control plane VCN 1116 caninclude the service gateway 1136 and the NAT gateway 1138.

The control plane VCN 1116 can include a data plane mirror app tier 1140that can include app subnet(s) 1126. The app subnet(s) 1126 contained inthe data plane mirror app tier 1140 can include a virtual networkinterface controller (VNIC) 1142 that can execute a compute instance1144. The compute instance 1144 can communicatively couple the appsubnet(s) 1126 of the data plane mirror app tier 1140 to app subnet(s)1126 that can be contained in a data plane app tier 1146.

The data plane VCN 1118 can include the data plane app tier 1146, a dataplane DMZ tier 1148, and a data plane data tier 1150. The data plane DMZtier 1148 can include LB subnet(s) 1122 that can be communicativelycoupled to the app subnet(s) 1126 of the data plane app tier 1146 andthe Internet gateway 1134 of the data plane VCN 1118. The app subnet(s)1126 can be communicatively coupled to the service gateway 1136 of thedata plane VCN 1118 and the NAT gateway 1138 of the data plane VCN 1118.The data plane data tier 1150 can also include the DB subnet(s) 1130that can be communicatively coupled to the app subnet(s) 1126 of thedata plane app tier 1146.

The Internet gateway 1134 of the control plane VCN 1116 and of the dataplane VCN 1118 can be communicatively coupled to a metadata managementservice 1152 that can be communicatively coupled to public Internet1154. Public Internet 1154 can be communicatively coupled to the NATgateway 1138 of the control plane VCN 1116 and of the data plane VCN1118. The service gateway 1136 of the control plane VCN 1116 and of thedata plane VCN 1118 can be communicatively couple to cloud services1156.

In some examples, the service gateway 1136 of the control plane VCN 1116or of the data plan VCN 1118 can make application programming interface(API) calls to cloud services 1156 without going through public Internet1154. The API calls to cloud services 1156 from the service gateway 1136can be one-way: the service gateway 1136 can make API calls to cloudservices 1156, and cloud services 1156 can send requested data to theservice gateway 1136. But, cloud services 1156 may not initiate APIcalls to the service gateway 1136.

In some examples, the secure host tenancy 1104 can be directly connectedto the service tenancy 1119, which may be otherwise isolated. The securehost subnet 1108 can communicate with the SSH subnet 1114 through an LPG1110 that may enable two-way communication over an otherwise isolatedsystem. Connecting the secure host subnet 1108 to the SSH subnet 1114may give the secure host subnet 1108 access to other entities within theservice tenancy 1119.

The control plane VCN 1116 may allow users of the service tenancy 1119to set up or otherwise provision desired resources. Desired resourcesprovisioned in the control plane VCN 1116 may be deployed or otherwiseused in the data plane VCN 1118. In some examples, the control plane VCN1116 can be isolated from the data plane VCN 1118, and the data planemirror app tier 1140 of the control plane VCN 1116 can communicate withthe data plane app tier 1146 of the data plane VCN 1118 via VNICs 1142that can be contained in the data plane mirror app tier 1140 and thedata plane app tier 1146.

In some examples, users of the system, or customers, can make requests,for example create, read, update, or delete (CRUD) operations, throughpublic Internet 1154 that can communicate the requests to the metadatamanagement service 1152. The metadata management service 1152 cancommunicate the request to the control plane VCN 1116 through theInternet gateway 1134. The request can be received by the LB subnet(s)1122 contained in the control plane DMZ tier 1120. The LB subnet(s) 1122may determine that the request is valid, and in response to thisdetermination, the LB subnet(s) 1122 can transmit the request to appsubnet(s) 1126 contained in the control plane app tier 1124. If therequest is validated and requires a call to public Internet 1154, thecall to public Internet 1154 may be transmitted to the NAT gateway 1138that can make the call to public Internet 1154. Memory that may bedesired to be stored by the request can be stored in the DB subnet(s)1130.

In some examples, the data plane mirror app tier 1140 can facilitatedirect communication between the control plane VCN 1116 and the dataplane VCN 1118. For example, changes, updates, or other suitablemodifications to configuration may be desired to be applied to theresources contained in the data plane VCN 1118. Via a VNIC 1142, thecontrol plane VCN 1116 can directly communicate with, and can therebyexecute the changes, updates, or other suitable modifications toconfiguration to, resources contained in the data plane VCN 1118.

In some embodiments, the control plane VCN 1116 and the data plane VCN1118 can be contained in the service tenancy 1119. In this case, theuser, or the customer, of the system may not own or operate either thecontrol plane VCN 1116 or the data plane VCN 1118. Instead, the IaaSprovider may own or operate the control plane VCN 1116 and the dataplane VCN 1118, both of which may be contained in the service tenancy1119. This embodiment can enable isolation of networks that may preventusers or customers from interacting with other users', or othercustomers', resources. Also, this embodiment may allow users orcustomers of the system to store databases privately without needing torely on public Internet 1154, which may not have a desired level ofsecurity, for storage.

In other embodiments, the LB subnet(s) 1122 contained in the controlplane VCN 1116 can be configured to receive a signal from the servicegateway 1136. In this embodiment, the control plane VCN 1116 and thedata plane VCN 1118 may be configured to be called by a customer of theIaaS provider without calling public Internet 1154. Customers of theIaaS provider may desire this embodiment since database(s) that thecustomers use may be controlled by the IaaS provider and may be storedon the service tenancy 1119, which may be isolated from public Internet1154.

FIG. 12 is a block diagram 1200 illustrating another example pattern ofan IaaS architecture, according to at least one embodiment. Serviceoperators 1202 (e.g. service operators 1102 of FIG. 11 ) can becommunicatively coupled to a secure host tenancy 1204 (e.g. the securehost tenancy 1104 of FIG. 11 ) that can include a virtual cloud network(VCN) 1206 (e.g. the VCN 1106 of FIG. 11 ) and a secure host subnet 1208(e.g. the secure host subnet 1108 of FIG. 11 ). The VCN 1206 can includea local peering gateway (LPG) 1210 (e.g. the LPG 1110 of FIG. 11 ) thatcan be communicatively coupled to a secure shell (SSH) VCN 1212 (e.g.the SSH VCN 1112 of FIG. 11 ) via an LPG 1110 contained in the SSH VCN1212. The SSH VCN 1212 can include an SSH subnet 1214 (e.g. the SSHsubnet 1114 of FIG. 11 ), and the SSH VCN 1212 can be communicativelycoupled to a control plane VCN 1216 (e.g. the control plane VCN 1116 ofFIG. 11 ) via an LPG 1210 contained in the control plane VCN 1216. Thecontrol plane VCN 1216 can be contained in a service tenancy 1219 (e.g.the service tenancy 1119 of FIG. 11 ), and the data plane VCN 1218 (e.g.the data plane VCN 1118 of FIG. 11 ) can be contained in a customertenancy 1221 that may be owned or operated by users, or customers, ofthe system.

The control plane VCN 1216 can include a control plane DMZ tier 1220(e.g. the control plane DMZ tier 1120 of FIG. 11 ) that can include LBsubnet(s) 1222 (e.g. LB subnet(s) 1122 of FIG. 11 ), a control plane apptier 1224 (e.g. the control plane app tier 1124 of FIG. 11 ) that caninclude app subnet(s) 1226 (e.g. app subnet(s) 1126 of FIG. 11 ), acontrol plane data tier 1228 (e.g. the control plane data tier 1128 ofFIG. 11 ) that can include database (DB) subnet(s) 1230 (e.g. similar toDB subnet(s) 1130 of FIG. 11 ). The LB subnet(s) 1222 contained in thecontrol plane DMZ tier 1220 can be communicatively coupled to the appsubnet(s) 1226 contained in the control plane app tier 1224 and anInternet gateway 1234 (e.g. the Internet gateway 1134 of FIG. 11 ) thatcan be contained in the control plane VCN 1216, and the app subnet(s)1226 can be communicatively coupled to the DB subnet(s) 1230 containedin the control plane data tier 1228 and a service gateway 1236 (e.g. theservice gateway of FIG. 11 ) and a network address translation (NAT)gateway 1238 (e.g. the NAT gateway 1138 of FIG. 11 ). The control planeVCN 1216 can include the service gateway 1236 and the NAT gateway 1238.

The control plane VCN 1216 can include a data plane mirror app tier 1240(e.g. the data plane mirror app tier 1140 of FIG. 11 ) that can includeapp subnet(s) 1226. The app subnet(s) 1226 contained in the data planemirror app tier 1240 can include a virtual network interface controller(VNIC) 1242 (e.g. the VNIC of 1142) that can execute a compute instance1244 (e.g. similar to the compute instance 1144 of FIG. 11 ). Thecompute instance 1244 can facilitate communication between the appsubnet(s) 1226 of the data plane mirror app tier 1240 and the appsubnet(s) 1226 that can be contained in a data plane app tier 1246 (e.g.the data plane app tier 1146 of FIG. 11 ) via the VNIC 1242 contained inthe data plane mirror app tier 1240 and the VNIC 1242 contained in thedata plan app tier 1246.

The Internet gateway 1234 contained in the control plane VCN 1216 can becommunicatively coupled to a metadata management service 1252 (e.g. themetadata management service 1152 of FIG. 11 ) that can becommunicatively coupled to public Internet 1254 (e.g. public Internet1154 of FIG. 11 ). Public Internet 1254 can be communicatively coupledto the NAT gateway 1238 contained in the control plane VCN 1216. Theservice gateway 1236 contained in the control plane VCN 1216 can becommunicatively couple to cloud services 1256 (e.g. cloud services 1156of FIG. 11 ).

In some examples, the data plane VCN 1218 can be contained in thecustomer tenancy 1221. In this case, the IaaS provider may provide thecontrol plane VCN 1216 for each customer, and the IaaS provider may, foreach customer, set up a unique compute instance 1244 that is containedin the service tenancy 1219. Each compute instance 1244 may allowcommunication between the control plane VCN 1216, contained in theservice tenancy 1219, and the data plane VCN 1218 that is contained inthe customer tenancy 1221. The compute instance 1244 may allowresources, that are provisioned in the control plane VCN 1216 that iscontained in the service tenancy 1219, to be deployed or otherwise usedin the data plane VCN 1218 that is contained in the customer tenancy1221.

In other examples, the customer of the IaaS provider may have databasesthat live in the customer tenancy 1221. In this example, the controlplane VCN 1216 can include the data plane mirror app tier 1240 that caninclude app subnet(s) 1226. The data plane mirror app tier 1240 canreside in the data plane VCN 1218, but the data plane mirror app tier1240 may not live in the data plane VCN 1218. That is, the data planemirror app tier 1240 may have access to the customer tenancy 1221, butthe data plane mirror app tier 1240 may not exist in the data plane VCN1218 or be owned or operated by the customer of the IaaS provider. Thedata plane mirror app tier 1240 may be configured to make calls to thedata plane VCN 1218 but may not be configured to make calls to anyentity contained in the control plane VCN 1216. The customer may desireto deploy or otherwise use resources in the data plane VCN 1218 that areprovisioned in the control plane VCN 1216, and the data plane mirror apptier 1240 can facilitate the desired deployment, or other usage ofresources, of the customer.

In some embodiments, the customer of the IaaS provider can apply filtersto the data plane VCN 1218. In this embodiment, the customer candetermine what the data plane VCN 1218 can access, and the customer mayrestrict access to public Internet 1254 from the data plane VCN 1218.The IaaS provider may not be able to apply filters or otherwise controlaccess of the data plane VCN 1218 to any outside networks or databases.Applying filters and controls by the customer onto the data plane VCN1218, contained in the customer tenancy 1221, can help isolate the dataplane VCN 1218 from other customers and from public Internet 1254.

In some embodiments, cloud services 1256 can be called by the servicegateway 1236 to access services that may not exist on public Internet1254, on the control plane VCN 1216, or on the data plane VCN 1218. Theconnection between cloud services 1256 and the control plane VCN 1216 orthe data plane VCN 1218 may not be live or continuous. Cloud services1256 may exist on a different network owned or operated by the IaaSprovider. Cloud services 1256 may be configured to receive calls fromthe service gateway 1236 and may be configured to not receive calls frompublic Internet 1254. Some cloud services 1256 may be isolated fromother cloud services 1256, and the control plane VCN 1216 may beisolated from cloud services 1256 that may not be in the same region asthe control plane VCN 1216. For example, the control plane VCN 1216 maybe located in “Region 1,” and cloud service “Deployment 11,” may belocated in Region 1 and in “Region 2.” If a call to Deployment 11 ismade by the service gateway 1236 contained in the control plane VCN 1216located in Region 1, the call may be transmitted to Deployment 11 inRegion 1. In this example, the control plane VCN 1216, or Deployment 11in Region 1, may not be communicatively coupled to, or otherwise incommunication with, Deployment 11 in Region 2.

FIG. 13 is a block diagram 1300 illustrating another example pattern ofan IaaS architecture, according to at least one embodiment. Serviceoperators 1302 (e.g. service operators 1102 of FIG. 11 ) can becommunicatively coupled to a secure host tenancy 1304 (e.g. the securehost tenancy 1104 of FIG. 11 ) that can include a virtual cloud network(VCN) 1306 (e.g. the VCN 1106 of FIG. 11 ) and a secure host subnet 1308(e.g. the secure host subnet 1108 of FIG. 11 ). The VCN 1306 can includean LPG 1310 (e.g. the LPG 1110 of FIG. 11 ) that can be communicativelycoupled to an SSH VCN 1312 (e.g. the SSH VCN 1112 of FIG. 11 ) via anLPG 1310 contained in the SSH VCN 1312. The SSH VCN 1312 can include anSSH subnet 1314 (e.g. the SSH subnet 1114 of FIG. 11 ), and the SSH VCN1312 can be communicatively coupled to a control plane VCN 1316 (e.g.the control plane VCN 1116 of FIG. 11 ) via an LPG 1310 contained in thecontrol plane VCN 1316 and to a data plane VCN 1318 (e.g. the data plane1118 of FIG. 11 ) via an LPG 1310 contained in the data plane VCN 1318.The control plane VCN 1316 and the data plane VCN 1318 can be containedin a service tenancy 1319 (e.g. the service tenancy 1119 of FIG. 11 ).

The control plane VCN 1316 can include a control plane DMZ tier 1320(e.g. the control plane DMZ tier 1120 of FIG. 11 ) that can include loadbalancer (LB) subnet(s) 1322 (e.g. LB subnet(s) 1122 of FIG. 11 ), acontrol plane app tier 1324 (e.g. the control plane app tier 1124 ofFIG. 11 ) that can include app subnet(s) 1326 (e.g. similar to appsubnet(s) 1126 of FIG. 11 ), a control plane data tier 1328 (e.g. thecontrol plane data tier 1128 of FIG. 11 ) that can include DB subnet(s)1330. The LB subnet(s) 1322 contained in the control plane DMZ tier 1320can be communicatively coupled to the app subnet(s) 1326 contained inthe control plane app tier 1324 and to an Internet gateway 1334 (e.g.the Internet gateway 1134 of FIG. 11 ) that can be contained in thecontrol plane VCN 1316, and the app subnet(s) 1326 can becommunicatively coupled to the DB subnet(s) 1330 contained in thecontrol plane data tier 1328 and to a service gateway 1336 (e.g. theservice gateway of FIG. 11 ) and a network address translation (NAT)gateway 1338 (e.g. the NAT gateway 1138 of FIG. 11 ). The control planeVCN 1316 can include the service gateway 1336 and the NAT gateway 1338.

The data plane VCN 1318 can include a data plane app tier 1346 (e.g. thedata plane app tier 1146 of FIG. 11 ), a data plane DMZ tier 1348 (e.g.the data plane DMZ tier 1148 of FIG. 11 ), and a data plane data tier1350 (e.g. the data plane data tier 1150 of FIG. 11 ). The data planeDMZ tier 1348 can include LB subnet(s) 1322 that can be communicativelycoupled to trusted app subnet(s) 1360 and untrusted app subnet(s) 1362of the data plane app tier 1346 and the Internet gateway 1334 containedin the data plane VCN 1318. The trusted app subnet(s) 1360 can becommunicatively coupled to the service gateway 1336 contained in thedata plane VCN 1318, the NAT gateway 1338 contained in the data planeVCN 1318, and DB subnet(s) 1330 contained in the data plane data tier1350. The untrusted app subnet(s) 1362 can be communicatively coupled tothe service gateway 1336 contained in the data plane VCN 1318 and DBsubnet(s) 1330 contained in the data plane data tier 1350. The dataplane data tier 1350 can include DB subnet(s) 1330 that can becommunicatively coupled to the service gateway 1336 contained in thedata plane VCN 1318.

The untrusted app subnet(s) 1362 can include one or more primary VNICs1364(1)-(N) that can be communicatively coupled to tenant virtualmachines (VMs) 1366(1)-(N). Each tenant VM 1366(1)-(N) can becommunicatively coupled to a respective app subnet 1367(1)-(N) that canbe contained in respective container egress VCNs 1368(1)-(N) that can becontained in respective customer tenancies 1370(1)-(N). Respectivesecondary VNICs 1372(1)-(N) can facilitate communication between theuntrusted app subnet(s) 1362 contained in the data plane VCN 1318 andthe app subnet contained in the container egress VCNs 1368(1)-(N). Eachcontainer egress VCNs 1368(1)-(N) can include a NAT gateway 1338 thatcan be communicatively coupled to public Internet 1354 (e.g. publicInternet 1154 of FIG. 11 ).

The Internet gateway 1334 contained in the control plane VCN 1316 andcontained in the data plane VCN 1318 can be communicatively coupled to ametadata management service 1352 (e.g. the metadata management system1152 of FIG. 11 ) that can be communicatively coupled to public Internet1354. Public Internet 1354 can be communicatively coupled to the NATgateway 1338 contained in the control plane VCN 1316 and contained inthe data plane VCN 1318. The service gateway 1336 contained in thecontrol plane VCN 1316 and contained in the data plane VCN 1318 can becommunicatively couple to cloud services 1356.

In some embodiments, the data plane VCN 1318 can be integrated withcustomer tenancies 1370. This integration can be useful or desirable forcustomers of the IaaS provider in some cases such as a case that maydesire support when executing code. The customer may provide code to runthat may be destructive, may communicate with other customer resources,or may otherwise cause undesirable effects. In response to this, theIaaS provider may determine whether to run code given to the IaaSprovider by the customer.

In some examples, the customer of the IaaS provider may grant temporarynetwork access to the IaaS provider and request a function to beattached to the data plane tier app 1346. Code to run the function maybe executed in the VMs 1366(1)-(N), and the code may not be configuredto run anywhere else on the data plane VCN 1318. Each VM 1366(1)-(N) maybe connected to one customer tenancy 1370. Respective containers1371(1)-(N) contained in the VMs 1366(1)-(N) may be configured to runthe code. In this case, there can be a dual isolation (e.g., thecontainers 1371(1)-(N) running code, where the containers 1371(1)-(N)may be contained in at least the VM 1366(1)-(N) that are contained inthe untrusted app subnet(s) 1362), which may help prevent incorrect orotherwise undesirable code from damaging the network of the IaaSprovider or from damaging a network of a different customer. Thecontainers 1371(1)-(N) may be communicatively coupled to the customertenancy 1370 and may be configured to transmit or receive data from thecustomer tenancy 1370. The containers 1371(1)-(N) may not be configuredto transmit or receive data from any other entity in the data plane VCN1318. Upon completion of running the code, the IaaS provider may kill orotherwise dispose of the containers 1371(1)-(N).

In some embodiments, the trusted app subnet(s) 1360 may run code thatmay be owned or operated by the IaaS provider. In this embodiment, thetrusted app subnet(s) 1360 may be communicatively coupled to the DBsubnet(s) 1330 and be configured to execute CRUD operations in the DBsubnet(s) 1330. The untrusted app subnet(s) 1362 may be communicativelycoupled to the DB subnet(s) 1330, but in this embodiment, the untrustedapp subnet(s) may be configured to execute read operations in the DBsubnet(s) 1330. The containers 1371(1)-(N) that can be contained in theVM 1366(1)-(N) of each customer and that may run code from the customermay not be communicatively coupled with the DB subnet(s) 1330.

In other embodiments, the control plane VCN 1316 and the data plane VCN1318 may not be directly communicatively coupled. In this embodiment,there may be no direct communication between the control plane VCN 1316and the data plane VCN 1318. However, communication can occur indirectlythrough at least one method. An LPG 1310 may be established by the IaaSprovider that can facilitate communication between the control plane VCN1316 and the data plane VCN 1318. In another example, the control planeVCN 1316 or the data plane VCN 1318 can make a call to cloud services1356 via the service gateway 1336. For example, a call to cloud services1356 from the control plane VCN 1316 can include a request for a servicethat can communicate with the data plane VCN 1318.

FIG. 14 is a block diagram 1400 illustrating another example pattern ofan IaaS architecture, according to at least one embodiment. Serviceoperators 1402 (e.g. service operators 1102 of FIG. 11 ) can becommunicatively coupled to a secure host tenancy 1404 (e.g. the securehost tenancy 1104 of FIG. 11 ) that can include a virtual cloud network(VCN) 1406 (e.g. the VCN 1106 of FIG. 11 ) and a secure host subnet 1408(e.g. the secure host subnet 1108 of FIG. 11 ). The VCN 1406 can includean LPG 1410 (e.g. the LPG 1110 of FIG. 11 ) that can be communicativelycoupled to an SSH VCN 1412 (e.g. the SSH VCN 1112 of FIG. 11 ) via anLPG 1410 contained in the SSH VCN 1412. The SSH VCN 1412 can include anSSH subnet 1414 (e.g. the SSH subnet 1114 of FIG. 11 ), and the SSH VCN1412 can be communicatively coupled to a control plane VCN 1416 (e.g.the control plane VCN 1116 of FIG. 11 ) via an LPG 1410 contained in thecontrol plane VCN 1416 and to a data plane VCN 1418 (e.g. the data plane1118 of FIG. 11 ) via an LPG 1410 contained in the data plane VCN 1418.The control plane VCN 1416 and the data plane VCN 1418 can be containedin a service tenancy 1419 (e.g. the service tenancy 1119 of FIG. 11 ).

The control plane VCN 1416 can include a control plane DMZ tier 1420(e.g. the control plane DMZ tier 1120 of FIG. 11 ) that can include LBsubnet(s) 1422 (e.g. LB subnet(s) 1122 of FIG. 11 ), a control plane apptier 1424 (e.g. the control plane app tier 1124 of FIG. 11 ) that caninclude app subnet(s) 1426 (e.g. app subnet(s) 1126 of FIG. 11 ), acontrol plane data tier 1428 (e.g. the control plane data tier 1128 ofFIG. 11 ) that can include DB subnet(s) 1430 (e.g. DB subnet(s) 1330 ofFIG. 13 ). The LB subnet(s) 1422 contained in the control plane DMZ tier1420 can be communicatively coupled to the app subnet(s) 1426 containedin the control plane app tier 1424 and to an Internet gateway 1434 (e.g.the Internet gateway 1134 of FIG. 11 ) that can be contained in thecontrol plane VCN 1416, and the app subnet(s) 1426 can becommunicatively coupled to the DB subnet(s) 1430 contained in thecontrol plane data tier 1428 and to a service gateway 1436 (e.g. theservice gateway of FIG. 11 ) and a network address translation (NAT)gateway 1438 (e.g. the NAT gateway 1138 of FIG. 11 ). The control planeVCN 1416 can include the service gateway 1436 and the NAT gateway 1438.

The data plane VCN 1418 can include a data plane app tier 1446 (e.g. thedata plane app tier 1146 of FIG. 11 ), a data plane DMZ tier 1448 (e.g.the data plane DMZ tier 1148 of FIG. 11 ), and a data plane data tier1450 (e.g. the data plane data tier 1150 of FIG. 11 ). The data planeDMZ tier 1448 can include LB subnet(s) 1422 that can be communicativelycoupled to trusted app subnet(s) 1460 (e.g. trusted app subnet(s) 1360of FIG. 13 ) and untrusted app subnet(s) 1462 (e.g. untrusted appsubnet(s) 1362 of FIG. 13 ) of the data plane app tier 1446 and theInternet gateway 1434 contained in the data plane VCN 1418. The trustedapp subnet(s) 1460 can be communicatively coupled to the service gateway1436 contained in the data plane VCN 1418, the NAT gateway 1438contained in the data plane VCN 1418, and DB subnet(s) 1430 contained inthe data plane data tier 1450. The untrusted app subnet(s) 1462 can becommunicatively coupled to the service gateway 1436 contained in thedata plane VCN 1418 and DB subnet(s) 1430 contained in the data planedata tier 1450. The data plane data tier 1450 can include DB subnet(s)1430 that can be communicatively coupled to the service gateway 1436contained in the data plane VCN 1418.

The untrusted app subnet(s) 1462 can include primary VNICs 1464(1)-(N)that can be communicatively coupled to tenant virtual machines (VMs)1466(1)-(N) residing within the untrusted app subnet(s) 1462. Eachtenant VM 1466(1)-(N) can run code in a respective container1467(1)-(N), and be communicatively coupled to an app subnet 1426 thatcan be contained in a data plane app tier 1446 that can be contained ina container egress VCN 1468. Respective secondary VNICs 1472(1)-(N) canfacilitate communication between the untrusted app subnet(s) 1462contained in the data plane VCN 1418 and the app subnet contained in thecontainer egress VCN 1468. The container egress VCN can include a NATgateway 1438 that can be communicatively coupled to public Internet 1454(e.g. public Internet 1154 of FIG. 11 ).

The Internet gateway 1434 contained in the control plane VCN 1416 andcontained in the data plane VCN 1418 can be communicatively coupled to ametadata management service 1452 (e.g. the metadata management system1152 of FIG. 11 ) that can be communicatively coupled to public Internet1454. Public Internet 1454 can be communicatively coupled to the NATgateway 1438 contained in the control plane VCN 1416 and contained inthe data plane VCN 1418. The service gateway 1436 contained in thecontrol plane VCN 1416 and contained in the data plane VCN 1418 can becommunicatively couple to cloud services 1456.

In some examples, the pattern illustrated by the architecture of blockdiagram 1400 of FIG. 14 may be considered an exception to the patternillustrated by the architecture of block diagram 1300 of FIG. 13 and maybe desirable for a customer of the IaaS provider if the IaaS providercannot directly communicate with the customer (e.g., a disconnectedregion). The respective containers 1467(1)-(N) that are contained in theVMs 1466(1)-(N) for each customer can be accessed in real-time by thecustomer. The containers 1467(1)-(N) may be configured to make calls torespective secondary VNICs 1472(1)-(N) contained in app subnet(s) 1426of the data plane app tier 1446 that can be contained in the containeregress VCN 1468. The secondary VNICs 1472(1)-(N) can transmit the callsto the NAT gateway 1438 that may transmit the calls to public Internet1454. In this example, the containers 1467(1)-(N) that can be accessedin real-time by the customer can be isolated from the control plane VCN1416 and can be isolated from other entities contained in the data planeVCN 1418. The containers 1467(1)-(N) may also be isolated from resourcesfrom other customers.

In other examples, the customer can use the containers 1467(1)-(N) tocall cloud services 1456. In this example, the customer may run code inthe containers 1467(1)-(N) that requests a service from cloud services1456. The containers 1467(1)-(N) can transmit this request to thesecondary VNICs 1472(1)-(N) that can transmit the request to the NATgateway that can transmit the request to public Internet 1454. PublicInternet 1454 can transmit the request to LB subnet(s) 1422 contained inthe control plane VCN 1416 via the Internet gateway 1434. In response todetermining the request is valid, the LB subnet(s) can transmit therequest to app subnet(s) 1426 that can transmit the request to cloudservices 1456 via the service gateway 1436.

It should be appreciated that IaaS architectures 1100, 1200, 1300, 1400depicted in the figures may have other components than those depicted.Further, the embodiments shown in the figures are only some examples ofa cloud infrastructure system that may incorporate an embodiment of thedisclosure. In some other embodiments, the IaaS systems may have more orfewer components than shown in the figures, may combine two or morecomponents, or may have a different configuration or arrangement ofcomponents.

In certain embodiments, the IaaS systems described herein may include asuite of applications, middleware, and database service offerings thatare delivered to a customer in a self-service, subscription-based,elastically scalable, reliable, highly available, and secure manner. Anexample of such an IaaS system is the Oracle Cloud Infrastructure (OCI)provided by the present assignee.

FIG. 15 illustrates an example computer system 1500, in which variousembodiments of the present disclosure may be implemented. The system1500 may be used to implement any of the computer systems describedabove. As shown in the figure, computer system 1500 includes aprocessing unit 1504 that communicates with a number of peripheralsubsystems via a bus subsystem 1502. These peripheral subsystems mayinclude a processing acceleration unit 1506, an I/O subsystem 1508, astorage subsystem 1518 and a communications subsystem 1524. Storagesubsystem 1518 includes tangible computer-readable storage media 1522and a system memory 1510.

Bus subsystem 1502 provides a mechanism for letting the variouscomponents and subsystems of computer system 1500 communicate with eachother as intended. Although bus subsystem 1502 is shown schematically asa single bus, alternative embodiments of the bus subsystem may utilizemultiple buses. Bus subsystem 1502 may be any of several types of busstructures including a memory bus or memory controller, a peripheralbus, and a local bus using any of a variety of bus architectures. Forexample, such architectures may include an Industry StandardArchitecture (ISA) bus, Micro Channel Architecture (MCA) bus, EnhancedISA (EISA) bus, Video Electronics Standards Association (VESA) localbus, and Peripheral Component Interconnect (PCI) bus, which can beimplemented as a Mezzanine bus manufactured to the IEEE P1386.1standard.

Processing unit 1504, which can be implemented as one or more integratedcircuits (e.g., a conventional microprocessor or microcontroller),controls the operation of computer system 1500. One or more processorsmay be included in processing unit 1504. These processors may includesingle core or multicore processors. In certain embodiments, processingunit 1504 may be implemented as one or more independent processing units1532 and/or 1534 with single or multicore processors included in eachprocessing unit. In other embodiments, processing unit 1504 may also beimplemented as a quad-core processing unit formed by integrating twodual-core processors into a single chip.

In various embodiments, processing unit 1504 can execute a variety ofprograms in response to program code and can maintain multipleconcurrently executing programs or processes. At any given time, some orall of the program code to be executed can be resident in processor(s)1504 and/or in storage subsystem 1518. Through suitable programming,processor(s) 1504 can provide various functionalities described above.Computer system 1500 may additionally include a processing accelerationunit 1506, which can include a digital signal processor (DSP), aspecial-purpose processor, and/or the like.

I/O subsystem 1508 may include user interface input devices and userinterface output devices. User interface input devices may include akeyboard, pointing devices such as a mouse or trackball, a touchpad ortouch screen incorporated into a display, a scroll wheel, a click wheel,a dial, a button, a switch, a keypad, audio input devices with voicecommand recognition systems, microphones, and other types of inputdevices. User interface input devices may include, for example, motionsensing and/or gesture recognition devices such as the Microsoft Kinect®motion sensor that enables users to control and interact with an inputdevice, such as the Microsoft Xbox® 360 game controller, through anatural user interface using gestures and spoken commands. Userinterface input devices may also include eye gesture recognition devicessuch as the Google Glass® blink detector that detects eye activity(e.g., ‘blinking’ while taking pictures and/or making a menu selection)from users and transforms the eye gestures as input into an input device(e.g., Google Glass®). Additionally, user interface input devices mayinclude voice recognition sensing devices that enable users to interactwith voice recognition systems (e.g., Siri® navigator), through voicecommands.

User interface input devices may also include, without limitation, threedimensional (3D) mice, joysticks or pointing sticks, gamepads andgraphic tablets, and audio/visual devices such as speakers, digitalcameras, digital camcorders, portable media players, webcams, imagescanners, fingerprint scanners, barcode reader 3D scanners, 3D printers,laser rangefinders, and eye gaze tracking devices. Additionally, userinterface input devices may include, for example, medical imaging inputdevices such as computed tomography, magnetic resonance imaging,position emission tomography, medical ultrasonography devices. Userinterface input devices may also include, for example, audio inputdevices such as MIDI keyboards, digital musical instruments and thelike.

User interface output devices may include a display subsystem, indicatorlights, or non-visual displays such as audio output devices, etc. Thedisplay subsystem may be a cathode ray tube (CRT), a flat-panel device,such as that using a liquid crystal display (LCD) or plasma display, aprojection device, a touch screen, and the like. In general, use of theterm “output device” is intended to include all possible types ofdevices and mechanisms for outputting information from computer system1500 to a user or other computer. For example, user interface outputdevices may include, without limitation, a variety of display devicesthat visually convey text, graphics and audio/video information such asmonitors, printers, speakers, headphones, automotive navigation systems,plotters, voice output devices, and modems.

Computer system 1500 may comprise a storage subsystem 1518 thatcomprises software elements, shown as being currently located within asystem memory 1510. System memory 1510 may store program instructionsthat are loadable and executable on processing unit 1504, as well asdata generated during the execution of these programs.

Depending on the configuration and type of computer system 1500, systemmemory 1510 may be volatile (such as random access memory (RAM)) and/ornon-volatile (such as read-only memory (ROM), flash memory, etc.) TheRAM typically contains data and/or program modules that are immediatelyaccessible to and/or presently being operated and executed by processingunit 1504. In some implementations, system memory 1510 may includemultiple different types of memory, such as static random access memory(SRAM) or dynamic random access memory (DRAM). In some implementations,a basic input/output system (BIOS), containing the basic routines thathelp to transfer information between elements within computer system1500, such as during start-up, may typically be stored in the ROM. Byway of example, and not limitation, system memory 1510 also illustratesapplication programs 1512, which may include client applications, Webbrowsers, mid-tier applications, relational database management systems(RDBMS), etc., program data 1514, and an operating system 1516. By wayof example, operating system 1516 may include various versions ofMicrosoft Windows®, Apple Macintosh®, and/or Linux operating systems, avariety of commercially-available UNIX® or UNIX-like operating systems(including without limitation the variety of GNU/Linux operatingsystems, the Google Chrome® OS, and the like) and/or mobile operatingsystems such as iOS, Windows® Phone, Android® OS, BlackBerry® 15 OS, andPalm® OS operating systems.

Storage subsystem 1518 may also provide a tangible computer-readablestorage medium for storing the basic programming and data constructsthat provide the functionality of some embodiments. Software (programs,code modules, instructions) that when executed by a processor providethe functionality described above may be stored in storage subsystem1518. These software modules or instructions may be executed byprocessing unit 1504. Storage subsystem 1518 may also provide arepository for storing data used in accordance with the presentdisclosure.

Storage subsystem 1500 may also include a computer-readable storagemedia reader 1520 that can further be connected to computer-readablestorage media 1522. Together and, optionally, in combination with systemmemory 1510, computer-readable storage media 1522 may comprehensivelyrepresent remote, local, fixed, and/or removable storage devices plusstorage media for temporarily and/or more permanently containing,storing, transmitting, and retrieving computer-readable information.

Computer-readable storage media 1522 containing code, or portions ofcode, can also include any appropriate media known or used in the art,including storage media and communication media, such as but not limitedto, volatile and non-volatile, removable and non-removable mediaimplemented in any method or technology for storage and/or transmissionof information. This can include tangible computer-readable storagemedia such as RAM, ROM, electronically erasable programmable ROM(EEPROM), flash memory or other memory technology, CD-ROM, digitalversatile disk (DVD), or other optical storage, magnetic cassettes,magnetic tape, magnetic disk storage or other magnetic storage devices,or other tangible computer readable media. This can also includenontangible computer-readable media, such as data signals, datatransmissions, or any other medium which can be used to transmit thedesired information and which can be accessed by computing system 1500.

By way of example, computer-readable storage media 1522 may include ahard disk drive that reads from or writes to non-removable, nonvolatilemagnetic media, a magnetic disk drive that reads from or writes to aremovable, nonvolatile magnetic disk, and an optical disk drive thatreads from or writes to a removable, nonvolatile optical disk such as aCD ROM, DVD, and Blu-Ray® disk, or other optical media.Computer-readable storage media 1522 may include, but is not limited to,Zip® drives, flash memory cards, universal serial bus (USB) flashdrives, secure digital (SD) cards, DVD disks, digital video tape, andthe like. Computer-readable storage media 1522 may also include,solid-state drives (SSD) based on non-volatile memory such asflash-memory based SSDs, enterprise flash drives, solid state ROM, andthe like, SSDs based on volatile memory such as solid state RAM, dynamicRAM, static RAM, DRAM-based SSDs, magnetoresistive RAM (MRAM) SSDs, andhybrid SSDs that use a combination of DRAM and flash memory based SSDs.The disk drives and their associated computer-readable media may providenon-volatile storage of computer-readable instructions, data structures,program modules, and other data for computer system 1500.

Communications subsystem 1524 provides an interface to other computersystems and networks. Communications subsystem 1524 serves as aninterface for receiving data from and transmitting data to other systemsfrom computer system 1500. For example, communications subsystem 1524may enable computer system 1500 to connect to one or more devices viathe Internet. In some embodiments communications subsystem 1524 caninclude radio frequency (RF) transceiver components for accessingwireless voice and/or data networks (e.g., using cellular telephonetechnology, advanced data network technology, such as 3G, 4G or EDGE(enhanced data rates for global evolution), WiFi (IEEE 802.11 familystandards, or other mobile communication technologies, or anycombination thereof), global positioning system (GPS) receivercomponents, and/or other components. In some embodiments communicationssubsystem 1524 can provide wired network connectivity (e.g., Ethernet)in addition to or instead of a wireless interface.

In some embodiments, communications subsystem 1524 may also receiveinput communication in the form of structured and/or unstructured datafeeds 1526, event streams 1528, event updates 1530, and the like onbehalf of one or more users who may use computer system 1500.

By way of example, communications subsystem 1524 may be configured toreceive data feeds 1526 in real-time from users of social networksand/or other communication services such as Twitter® feeds, Facebook®updates, web feeds such as Rich Site Summary (RSS) feeds, and/orreal-time updates from one or more third party information sources.

Additionally, communications subsystem 1524 may also be configured toreceive data in the form of continuous data streams, which may includeevent streams 1528 of real-time events and/or event updates 1530, thatmay be continuous or unbounded in nature with no explicit end. Examplesof applications that generate continuous data may include, for example,sensor data applications, financial tickers, network performancemeasuring tools (e.g. network monitoring and traffic managementapplications), clickstream analysis tools, automobile trafficmonitoring, and the like.

Communications subsystem 1524 may also be configured to output thestructured and/or unstructured data feeds 1526, event streams 1528,event updates 1530, and the like to one or more databases that may be incommunication with one or more streaming data source computers coupledto computer system 1500.

Computer system 1500 can be one of various types, including a handheldportable device (e.g., an iPhone® cellular phone, an iPad® computingtablet, a PDA), a wearable device (e.g., a Google Glass® head mounteddisplay), a PC, a workstation, a mainframe, a kiosk, a server rack, orany other data processing system.

Due to the ever-changing nature of computers and networks, thedescription of computer system 1500 depicted in the figure is intendedonly as a specific example. Many other configurations having more orfewer components than the system depicted in the figure are possible.For example, customized hardware might also be used and/or particularelements might be implemented in hardware, firmware, software (includingapplets), or a combination. Further, connection to other computingdevices, such as network input/output devices, may be employed. Based onthe disclosure and teachings provided herein, a person of ordinary skillin the art will appreciate other ways and/or methods to implement thevarious embodiments.

Although specific embodiments of the disclosure have been described,various modifications, alterations, alternative constructions, andequivalents are also encompassed within the scope of the disclosure.Embodiments of the present disclosure are not restricted to operationwithin certain specific data processing environments, but are free tooperate within a plurality of data processing environments.Additionally, although embodiments of the present disclosure have beendescribed using a particular series of transactions and steps, it shouldbe apparent to those skilled in the art that the scope of the presentdisclosure is not limited to the described series of transactions andsteps. Various features and aspects of the above-described embodimentsmay be used individually or jointly.

Further, while embodiments of the present disclosure have been describedusing a particular combination of hardware and software, it should berecognized that other combinations of hardware and software are alsowithin the scope of the present disclosure. Embodiments of the presentdisclosure may be implemented only in hardware, or only in software, orusing combinations thereof. The various processes described herein canbe implemented on the same processor or different processors in anycombination. Accordingly, where components or modules are described asbeing configured to perform certain operations, such configuration canbe accomplished, e.g., by designing electronic circuits to perform theoperation, by programming programmable electronic circuits (such asmicroprocessors) to perform the operation, or any combination thereof.Processes can communicate using a variety of techniques including butnot limited to conventional techniques for inter process communication,and different pairs of processes may use different techniques, or thesame pair of processes may use different techniques at different times.

The specification and drawings are, accordingly, to be regarded in anillustrative rather than a restrictive sense. It will, however, beevident that additions, subtractions, deletions, and other modificationsand changes may be made thereunto without departing from the broaderspirit and scope as set forth in the claims. Thus, although specificdisclosure embodiments have been described, these are not intended to belimiting. Various modifications and equivalents are within the scope ofthe following claims.

The use of the terms “a” and “an” and “the” and similar referents in thecontext of describing the disclosed embodiments (especially in thecontext of the following claims) are to be construed to cover both thesingular and the plural, unless otherwise indicated herein or clearlycontradicted by context. The terms “comprising,” “having,” “including,”and “containing” are to be construed as open-ended terms (i.e., meaning“including, but not limited to,”) unless otherwise noted. The term“connected” is to be construed as partly or wholly contained within,attached to, or joined together, even if there is something intervening.Recitation of ranges of values herein are merely intended to serve as ashorthand method of referring individually to each separate valuefalling within the range, unless otherwise indicated herein and eachseparate value is incorporated into the specification as if it wereindividually recited herein. All methods described herein can beperformed in any suitable order unless otherwise indicated herein orotherwise clearly contradicted by context. The use of any and allexamples, or exemplary language (e.g., “such as”) provided herein, isintended merely to better illuminate embodiments of the disclosure anddoes not pose a limitation on the scope of the disclosure unlessotherwise claimed. No language in the specification should be construedas indicating any non-claimed element as essential to the practice ofthe disclosure.

Disjunctive language such as the phrase “at least one of X, Y, or Z,”unless specifically stated otherwise, is intended to be understoodwithin the context as used in general to present that an item, term,etc., may be either X, Y, or Z, or any combination thereof (e.g., X, Y,and/or Z). Thus, such disjunctive language is not generally intended to,and should not, imply that certain embodiments require at least one ofX, at least one of Y, or at least one of Z to each be present.

Preferred embodiments of this disclosure are described herein, includingthe best mode known to the inventors for carrying out the disclosure.Variations of those preferred embodiments may become apparent to thoseof ordinary skill in the art upon reading the foregoing description. Theinventors expect skilled artisans to employ such variations asappropriate and the inventors intend for the disclosure to be practicedotherwise than as specifically described herein. Accordingly, thisdisclosure includes all modifications and equivalents of the subjectmatter recited in the claims appended hereto as permitted by applicablelaw. Moreover, any combination of the above-described elements in allpossible variations thereof is encompassed by the disclosure unlessotherwise indicated herein or otherwise clearly contradicted by context.

All references, including publications, patent applications, andpatents, cited herein are hereby incorporated by reference to the sameextent as if each reference were individually and specifically indicatedto be incorporated by reference and were set forth in its entiretyherein.

In the foregoing specification, aspects of the disclosure are describedwith reference to specific embodiments thereof, but those skilled in theart will recognize that the disclosure is not limited thereto. Variousfeatures and aspects of the above-described disclosure may be usedindividually or jointly. Further, embodiments can be utilized in anynumber of environments and applications beyond those described hereinwithout departing from the broader spirit and scope of thespecification. The specification and drawings are, accordingly, to beregarded as illustrative rather than restrictive.

What is claimed is:
 1. A method comprising: receiving, by a computersystem, a request to provision a first resource for use within a logicalcontainer associated with a client of the computer system, the firstresource being one of a plurality of resources provided within thelogical container by the computer system through one or more cloudservices; responsive to the request, allocating, by the computer systemand from among a set of infrastructure resources, a second resource uponwhich the first resource is built, wherein the second resource is notaccessible from within the logical container; assigning, by the computersystem, an identifier to the second resource; generating, by thecomputer system, a second identifier that is mapped to the identifierassigned to the second resource; and assigning, by the computer system,the second identifier to the first resource, wherein due to the secondidentifier being mapped to the identifier assigned to the secondresource, the second resource is able to present itself as being thefirst resource and belonging to the logical container.
 2. The method ofclaim 1, further comprising: storing, by the computer system, the secondidentifier for the first resource as a digital token in a memory of thecomputer system.
 3. The method of claim 1, further comprising:responsive to the request, allocating, by the computer system and fromamong the set of infrastructure resources, a third resource upon whichthe first resource is built, wherein the third resource is notaccessible from within the logical container; and assigning, by thecomputer system, an identifier to the third resource, wherein the secondidentifier is mapped to the identifier assigned to the third resource,and wherein due to the second identifier being mapped to the identifierassigned to the third resource, the third resource can present itself asbeing the first resource and belonging to the logical container.
 4. Themethod of claim 3, wherein the second resource and the third resourceare bare metal compute instances.
 5. The method of claim 3, wherein thesecond resource and the third resource are virtual machines.
 6. Themethod of claim 1, further comprising: accessing, by the second resourceusing the second identifier, a third resource within the logicalcontainer.
 7. The method of claim 6, wherein the first resource is acloud based database, and wherein the third resource is a cloud basedobject storage system.
 8. The method of claim 6, wherein the firstresource is a load balancer, and wherein the third resource is a cloudbased database.
 9. A computer system comprising: one or more processors;and a memory in communication with the one or more processors, thememory storing instructions that, when executed by the one or moreprocessors, cause the one or more processors to: receive a request toprovision a first resource for use within a logical container associatedwith a client of the computer system, the first resource being one of aplurality of resources provided within the logical container by thecomputer system through one or more cloud services; responsive to therequest, allocate, from among a set of infrastructure resources, asecond resource upon which the first resource is built, wherein thesecond resource is not accessible from within the logical container;assign an identifier to the second resource; generate a secondidentifier that is mapped to the identifier assigned to the secondresource; and assign the second identifier to the first resource,wherein due to the second identifier being mapped to the identifierassigned to the second resource, the second resource is able to presentitself as being the first resource and belonging to the logicalcontainer.
 10. The computer system of claim 9, wherein the instructionsfurther cause the one or more processors to store the second identifierfor the first resource as a digital token in a memory of the computersystem.
 11. The computer system of claim 9, wherein the instructionsfurther cause the one or more processors to: responsive to the request,allocate, from among the set of infrastructure resources, a thirdresource upon which the first resource is built, wherein the thirdresource is not accessible from within the logical container; and assignan identifier to the third resource, wherein the second identifier ismapped to the identifier assigned to the third resource, and wherein dueto the second identifier being mapped to the identifier assigned to thethird resource, the third resource can present itself as being the firstresource and belonging to the logical container.
 12. The computer systemof claim 11, wherein the second resource and the third resource are baremetal compute instances.
 13. The computer system of claim 11, whereinthe second resource and the third resource are virtual machines.
 14. Thecomputer system of claim 9, wherein the second resource is configured toaccess, using the second identifier, a third resource within the logicalcontainer.
 15. The computer system of claim 14, wherein the firstresource is a cloud based database, and wherein the third resource is acloud based object storage system.
 16. The computer system of claim 14,wherein the first resource is a load balancer, and wherein the thirdresource is a cloud based database.
 17. A non-transitorycomputer-readable storage medium storing instructions that, whenexecuted by one or more processors of a computer system, cause the oneor more processors to perform steps comprising: receiving a request toprovision a first resource for use within a logical container associatedwith a client of the computer system, the first resource being one of aplurality of resources provided within the logical container by thecomputer system through one or more cloud services; responsive to therequest, allocating, from among a set of infrastructure resources, asecond resource upon which the first resource is built, wherein thesecond resource is not accessible from within the logical container;assigning an identifier to the second resource; generating a secondidentifier that is mapped to the identifier assigned to the secondresource; and assigning the second identifier to the first resource,wherein due to the second identifier being mapped to the identifierassigned to the second resource, the second resource is able to presentitself as being the first resource and belonging to the logicalcontainer.
 18. The non-transitory computer-readable storage medium ofclaim 17, wherein the instructions further cause the one or moreprocessors to store the second identifier for the first resource as adigital token in a memory of the computer system.
 19. The non-transitorycomputer-readable storage medium of claim 17, wherein the instructionsfurther cause the one or more processors to perform steps comprising:responsive to the request, allocating, from among the set ofinfrastructure resources, a third resource upon which the first resourceis built, wherein the third resource is not accessible from within thelogical container; and assigning an identifier to the third resource,wherein the second identifier is mapped to the identifier assigned tothe third resource, and wherein due to the second identifier beingmapped to the identifier assigned to the third resource, the thirdresource can present itself as being the first resource and belonging tothe logical container.
 20. The non-transitory computer-readable storagemedium of claim 17, wherein the second resource is configured to access,using the second identifier, a third resource within the logicalcontainer.