International Business Machines Corporation
API ACCESS TO SECURITY-SENSITIVE COMPUTING SYSTEM
Last updated:
Abstract:
Controlling an (API) access action in a security-sensitive computing system includes, for an action to be performed, selecting from an operator account database an available operator account, generating a unique action tag which encompasses an identifier for the API access action and a unique API access key for executing the API access action; maintaining a dynamic access list having a mapping of the identifier of the API access action and the unique API access key and a selected operator account; granting, via the dynamic access list and the unique action tag, to the selected operator account an authorization for the API access to the security-sensitive computing system limited to performing the mapped API access; and revoking a further API access based on the unique action tag after the operator has performed the API access.
Utility
14 Dec 2020
16 Jun 2022