CyberArk Software Ltd.
PROXY MANAGER USING REPLICA AUTHENTICATION INFORMATION
Last updated:
Abstract:
Systems and methods are provided for enabling source resources to communicate with access-restricted target resources. The method can include receiving, at a proxy manager, a request from a source resource to access an access-restricted target resource. The request can include replica authentication information inoperable to enable the source resource to access the access-restricted target resource. The method can further include generating, in response to the request, temporary authentication information corresponding to the replica authentication information. The temporary authentication information can be operable to enable the source resource to access the access-restricted target resource. The method can additionally include making available to the access-restricted target resource the temporary authentication information, without sending the temporary authentication information to the source resource. The method can further include revoking the temporary authentication information after it was made available to the access-restricted target resource.
Utility
21 May 2018
21 Nov 2019