摘要 |
Techniques for identity controlled data centers are provided. Remote processing environments are authenticated via identity associations (160). Virtual remote processing environments are subsequently installed and authenticated (320) on the remote processing environments on which they are deployed and they receive unique virtual remote processing environment identities, which are locally and independently assigned within their remote processing environments (170). Applications deployed (171) to the virtual remote processing environments are also authenticated and acquire identities (540) for the virtual remote processing environments in which they are deployed. The processing of the remote virtual processing environments and the applications are circumscribed by independently acquired policies (162,550) within the remote processing environments. |