Controlling consumption of hierarchical repository data
First Claim
1. A computer-implemented method comprising:
- receiving, at a server device, one or more selections via a graphical user interface, the one or more selections for assigning an open standard for authentication privilege for a private resource hosted by the server device and owned by a first user to a second user from a set of user or user groups, wherein the private resource comprises a software file in a networked hierarchical repository, and wherein the one or more selections specify;
a selected path of the networked hierarchical repository identifying the private resource from a plurality of paths for a plurality of private resources, a first option specifying the open standard for authentication privilege from a set of privileges defining access for the private resource, and a second option specifying the second user from the set of user or user groups;
modifying, via a privilege service executing on the server device, metadata of the private resource identified by the selected path, wherein the metadata comprises a list of permissions identifying users and groups permitted to access the private resource and the metadata is stored in the networked hierarchical repository and associated with the private resource, wherein the privilege service automatically inserts code at the server device to modify the metadata of the private resource to permit the second user to access the private resource via the open standard for authentication privilege;
receiving a request to provide the second user with access to the private resource referenced by the selected path of the networked hierarchical repository, wherein the request includes a unique open standard for authentication privilege token provided by the second user;
responsive to determining that the selected path exists in the networked hierarchical repository on the server device, retrieving, from the networked hierarchical repository, the metadata associated with the private resource; and
responsive to determining that the unique open standard for authentication privilege token includes a unique identifier for the second user and that the token corresponds with the second user indicated by the metadata, providing the private resource to the second user without prompting the second user for credentials.
2 Assignments
0 Petitions
Accused Products
Abstract
One exemplary embodiment involves receiving, from an administrator device, a first request to provide a set of privileges to at least one of a set of users and a set of user groups to access private resources referenced by a path of a networked hierarchical repository, the set of privileges including at least one authorized access privilege. The embodiment also involves modifying a metadata associated with the private resources to indicate the set of privileges to provide to the at least one of the set of users and the set of user groups, the metadata associated with the private resources being modified to at least indicate the authorized access privilege. Additionally, the embodiment involves receiving a second request for authorized access to a set of resources associated with the networked hierarchical repository and providing the authorized access based on whether the metadata associated with the set of resources indicates to provide the authorized access.
54 Citations
18 Claims
-
1. A computer-implemented method comprising:
-
receiving, at a server device, one or more selections via a graphical user interface, the one or more selections for assigning an open standard for authentication privilege for a private resource hosted by the server device and owned by a first user to a second user from a set of user or user groups, wherein the private resource comprises a software file in a networked hierarchical repository, and wherein the one or more selections specify;
a selected path of the networked hierarchical repository identifying the private resource from a plurality of paths for a plurality of private resources, a first option specifying the open standard for authentication privilege from a set of privileges defining access for the private resource, and a second option specifying the second user from the set of user or user groups;modifying, via a privilege service executing on the server device, metadata of the private resource identified by the selected path, wherein the metadata comprises a list of permissions identifying users and groups permitted to access the private resource and the metadata is stored in the networked hierarchical repository and associated with the private resource, wherein the privilege service automatically inserts code at the server device to modify the metadata of the private resource to permit the second user to access the private resource via the open standard for authentication privilege;
receiving a request to provide the second user with access to the private resource referenced by the selected path of the networked hierarchical repository, wherein the request includes a unique open standard for authentication privilege token provided by the second user;responsive to determining that the selected path exists in the networked hierarchical repository on the server device, retrieving, from the networked hierarchical repository, the metadata associated with the private resource; and responsive to determining that the unique open standard for authentication privilege token includes a unique identifier for the second user and that the token corresponds with the second user indicated by the metadata, providing the private resource to the second user without prompting the second user for credentials. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
-
a processor; and a non-transitory computer-readable medium communicatively coupled to the processor, wherein the processor is configured to execute program code stored on the non-transitory computer-readable medium for performing operations comprising; receiving, at a server device, one or more selections via a graphical user interface, the one or more selections for assigning an open standard for authentication privilege for a private resource hosted by the server device and owned by a first user to a second user from a set of user or user groups, wherein the private resource comprises a software file in a networked hierarchical repository, and wherein the one or more selections specify;
a selected path of the networked hierarchical repository identifying the private resource from a plurality of paths for a plurality of private resources, a first option specifying the open standard for authentication privilege from a set of privileges defining access for the private resource, and a second option specifying the second user from the set of user or user groups;modifying, via a privilege service executing on the server device, metadata of the private resource identified by the selected path, wherein the metadata comprises a list of permissions identifying users and groups permitted to access the private resource and the metadata is stored in the networked hierarchical repository and associated with the private resource, wherein the privilege service automatically inserts code at the server device to modify the metadata of the private resource to permit the second user to access the private resource via the open standard for authentication privilege;
receiving a request to provide the second user with access to the private resource referenced by the selected path of the networked hierarchical repository, wherein the request includes a unique open standard for authentication privilege token provided by the second user;responsive to determining that the selected path exists in the networked hierarchical repository on the server device, retrieving, from the networked hierarchical repository, the metadata associated with the private resource; and responsive to determining that the unique open standard for authentication privilege token includes a unique identifier for the second user and that the token corresponds with the second user indicated by the metadata, providing the private resource to the second user without prompting the second user for credentials. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable medium having stored thereon instructions for performing a method comprising machine executable code which when executed by at least one machine, causes the machine to:
-
receive one or more selections via a graphical user interface, the one or more selections for assigning an open standard for authentication privilege for a private resource hosted by a server device and owned by a first user to a second user from a set of user or user groups, wherein the private resource comprises a software file in a networked hierarchical repository, and wherein the one or more selections specify;
a selected path of the networked hierarchical repository identifying the private resource from a plurality of paths for a plurality of private resources, a first option specifying the open standard for authentication privilege from a set of privileges defining access for the private resource, and a second option specifying the second user from the set of user or user groups;modify, via a privilege service executing on the server device, metadata of the private resource identified by the selected path, wherein the metadata comprises a list of permissions identifying users and groups permitted to access the private resource and the metadata is stored in the networked hierarchical repository and associated with the private resource, wherein the privilege service automatically inserts code at the server device to modify the metadata of the private resource to permit the second user to access the private resource via the open standard for authentication privilege;
receive a request to provide the second user with access to the private resource referenced by the selected path of the networked hierarchical repository, wherein the request includes a unique open standard for authentication privilege token provided by the second user;responsive to determining that the selected path exists in the networked hierarchical repository on the server device, retrieve, from the networked hierarchical repository, the metadata associated with the private resource; and responsive to determining that the unique open standard for authentication privilege token includes a unique identifier for the second user and that the token corresponds with the second user indicated by the metadata, provide the private resource to the second user without prompting the second user for credentials. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification