Patent application number | Description | Published |
20080263638 | AUTHORIZATION FOR ACCESS TO WEB SERVICE RESOURCES - A web service includes a protected resource. A requester requests access to the protected resource by sending a request to the web service. The web service prevents access to the web service until the request has been authorized by an authorizer. After the request has been authorized by the authorizer, the web service allows the requester to access the protected resource. | 10-23-2008 |
20080263652 | REQUEST-SPECIFIC AUTHENTICATION FOR ACCESSING WEB SERVICE RESOURCES - Requests for access to Web service resources are evaluated based on the type of request that is received. Requests are not granted unless sufficient proof of authentication is provided to grant that request. An authentication service evaluates one or more factors to determine whether or not to authenticate the client. After being authenticated by the authentication service, proof of authentication is provided to the Web service, which grants access to the Web service resource. | 10-23-2008 |
20090007157 | Mapping Data Sources to a Procedural API - Described are embodiments directed to use of workflows for developing management agents that connect operations of a data source to a procedural API of an application. The management agents include a workflow that corresponds to an operation of a data source. The workflow includes a number of activities that make calls to the procedural API in order to perform the operation of the data source with respect to an object of the application. The use of workflows makes the development of management agents easier and more efficient. | 01-01-2009 |
20090049176 | SCALABLE VIRTUAL PARTITIONING OF RESOURCES - Resources are partitioned via a virtual partitioning system to distribute the resources over a plurality of resource servers. A virtual partition table can be kept at each of a set of resource managers handling requests for resources in tandem. When a resource is requested, a virtual partition value is calculated algorithmically, and the value is mapped to a resource component via the virtual partition table. The resource component encapsulates information indicating on which of the resource servers the resource resides and can provide a component for performing operations on the resource even though the requester does not have information about where the resource resides. The resources can be repartitioned by modifying the virtual partition table, thus allowing the addition of additional resource servers to the system while the resources remain available. Additional resource types can be added without reengineering the system. | 02-19-2009 |
20090119500 | Managing software configuration using mapping and repeatable processes - The embodiments described herein generally relate to a method and system of injecting automated repeatable processes, or workflows, into software configuration management sequences. The benefits of such a system include the ability to delegate configurability change abilities to an IT administrator while still maintaining efficiency and management control over such changes. A request made by a system administrator to process configuration data may be subject to multiple phases of processing, such as, authentication, authorization, and action. A declarative mapping associates workflows, or meaningful repeatable processes, with the configuration process request criteria and processing phase. The mapping may be created by, or at the direction of, management through the application of the processing concept in API or UI. Upon a triggering event, e.g., receiving a configuration processing request, a stored mapping based on the attributes of the principal and request type may be consulted to determine the workflows which may then execute. | 05-07-2009 |
20090222881 | RESOURCE STATE TRANSITION BASED ACCESS CONTROL SYSTEM - Enforcing access control based on resource state. A method includes receiving a request for an operation on one or more objects stored on computer readable media. One or more pre-operation states of the one or more objects are determined. One or more post-operation states of the one or more objects are determined. One or more access control rules are referenced. The access control rules control access to resources based on pre-operation state and post operation state. It can then be determined that the one or more access control rules allow the operation to succeed based on the one or more pre-operation states and the one or more post operation states. Based on determining that the one or more access control rules allow the operation to succeed, the operation is allowed to succeed. | 09-03-2009 |
20090222882 | UNIFIED MANAGEMENT POLICY - Defining a unified access management policy expression that unifies access control policy with events or workflows. Unified management policy information is stored. The unified management policy information defines permissions for access to resources together with events or workflows. A request is received to execute the one or more operations on one or more objects. The requested operation is verified against the unified management rules. Verifying includes performing a single retrieval, retrieving both the access control information and the events or workflows and calculating the applicability of the rule to the conditions represented by the request. Matching rules are applied, access control decisions performed and associated workflows are executed. | 09-03-2009 |
20140143546 | REQUEST-SPECIFIC AUTHENTICATION FOR ACCESSING WEB SERVICE RESOURCES - Requests for access to Web service resources are evaluated based on the type of request that is received. Requests are not granted unless sufficient proof of authentication is provided to grant that request. An authentication service evaluates one or more factors to determine whether or not to authenticate the client. After being authenticated by the authentication service, proof of authentication is provided to the Web service, which grants access to the Web service resource. | 05-22-2014 |