×

Controlling consumption of hierarchical repository data

  • US 10,069,838 B2
  • Filed: 12/18/2012
  • Issued: 09/04/2018
  • Est. Priority Date: 12/18/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • receiving, at a server device, one or more selections via a graphical user interface, the one or more selections for assigning an open standard for authentication privilege for a private resource hosted by the server device and owned by a first user to a second user from a set of user or user groups, wherein the private resource comprises a software file in a networked hierarchical repository, and wherein the one or more selections specify;

    a selected path of the networked hierarchical repository identifying the private resource from a plurality of paths for a plurality of private resources, a first option specifying the open standard for authentication privilege from a set of privileges defining access for the private resource, and a second option specifying the second user from the set of user or user groups;

    modifying, via a privilege service executing on the server device, metadata of the private resource identified by the selected path, wherein the metadata comprises a list of permissions identifying users and groups permitted to access the private resource and the metadata is stored in the networked hierarchical repository and associated with the private resource, wherein the privilege service automatically inserts code at the server device to modify the metadata of the private resource to permit the second user to access the private resource via the open standard for authentication privilege;

    receiving a request to provide the second user with access to the private resource referenced by the selected path of the networked hierarchical repository, wherein the request includes a unique open standard for authentication privilege token provided by the second user;

    responsive to determining that the selected path exists in the networked hierarchical repository on the server device, retrieving, from the networked hierarchical repository, the metadata associated with the private resource; and

    responsive to determining that the unique open standard for authentication privilege token includes a unique identifier for the second user and that the token corresponds with the second user indicated by the metadata, providing the private resource to the second user without prompting the second user for credentials.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×