Security migration in a business intelligence environment
First Claim
Patent Images
1. A computer implemented method comprising:
- receiving an authentication request, for a Security Migration System Namespace, to authorize access to a Business Intelligence Environment of a user based on provided user identification information;
determining whether to authorize the access by requesting validation of the user based at least on the provided user identification information;
determining a local identifier associated with the validated user at least partially based on a retrieved mapping, if a determination is made to authorize a user, wherein the retrieved mapping includes local identifiers generated by a different Security Namespace; and
enabling the access in the Business Intelligence Environment based at least on the determined local identifier.
1 Assignment
0 Petitions
Accused Products
Abstract
In various implementations, local identifiers associated with users may be utilized to enable access one or more functions in a Business Intelligence (BI) Environment. A mapping may be generated to associate local identifiers and users. The mapping may be utilized to enable access in the BI environment by retrieving the local identifier from a mapping and enabling access in the BI environment based on the local identifier. In various implementations, a user may access the system as another user.
-
Citations
22 Claims
-
1. A computer implemented method comprising:
-
receiving an authentication request, for a Security Migration System Namespace, to authorize access to a Business Intelligence Environment of a user based on provided user identification information; determining whether to authorize the access by requesting validation of the user based at least on the provided user identification information; determining a local identifier associated with the validated user at least partially based on a retrieved mapping, if a determination is made to authorize a user, wherein the retrieved mapping includes local identifiers generated by a different Security Namespace; and enabling the access in the Business Intelligence Environment based at least on the determined local identifier. - View Dependent Claims (2, 3, 4)
-
-
5. A computerized method comprising:
-
receiving a request to access to a Business Intelligence Environment from a user; receiving user information associated with the user; determining whether to self-authenticate or delegate authentication of the user based at least one of a type of user associated with the received user information or additional user information retrieved from a memory coupled to a Security Migration Namespace; if a determination is made to self-authenticate the user; determining whether to allow access to the Business Intelligence Environment based at least partially on the received user information; and if a determination is made to allow access to the Business Intelligence Environment, exposing a security principal, via the Security Migration Namespace, which is retrieved from a mapping based on the received user information, to allow access to the Business Intelligence Environment, wherein the mapping is stored in a memory coupled to the Security Migration Namespace; and if a determination is made to delegate authentication of the user, delegating authentication of the user to an External Security Source, wherein the External Security Source is distinct of the Security Migration Namespace. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12)
-
-
13. A Security Migration System to enable access to a Business Intelligence Environment, the Security Migration System comprising:
-
a memory comprising a mapping, wherein the mapping comprises references to security principals from one or more External Security Sources along with local identifiers previously generated by a first Security Namespace; and a Security Migration Namespace capable of exposing one or more security principals from the mapping to allow access to the Business Intelligence Environment; wherein the Security Migration System is distinct from one or more External Security Sources that define a plurality of security principals for the Business Intelligence Environment and distinct from the Business Intelligence Environment, and wherein the Security Migration Namespace is distinct from the first Security Namespace. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification