International Business Machines Corporation
ENFORCEMENT OF SIGNATURES FOR SOFTWARE DEPLOYMENT CONFIGURATION

Last updated:

Abstract:

In an approach, a process intercepts a deployment resource associated with software prior to deploying the software to a node, where the deployment resource configures how the software is deployed and operates. A processor verifies authenticity of a digital signature present within the deployment resource. A processor, responsive to verifying the authenticity of the digital signature, deploys the software to the node in accordance with the deployment resource.

Status:
Application
Type:

Utility

Filling date:

20 Jul 2020

Issue date:

20 Jan 2022