Amazon.com, Inc.
Generating resources in a secured network
Last updated:
Abstract:
Technologies are disclosed for generating resources within a secured network. When a user from an outside network wants to perform actions involving resources of a secured network, the user simply indicates the actions to perform within a resource file. Upon specifying the actions to perform, the requested actions specified in the resource file are securely transferred to the secured network where a cleared user of the secured network may approve/reject the actions to perform. In some cases, the cleared user may view the actions within a graphical user interface (GUI) and approve/reject the requested actions. The approved actions are then executed within the secured network. Results obtained from executing the approved actions are transferred to the user of the outside network without the user having to message, or call, the cleared user of the secured network.
Utility
15 Sep 2020
5 Jul 2022