×

Access management in a data storage system

  • US 10,225,325 B2
  • Filed: 02/13/2015
  • Issued: 03/05/2019
  • Est. Priority Date: 02/13/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • receiving, by a first computer system of a data storage system and from a clientdevice, a first request by a requester to access first information managed by the data storage system;

    providing, by the first computer system, credential information included in the first request to an identity management (IDM) system for authenticating the requester, the IDM system comprising one or more second computer systems;

    receiving, by the first computer system, from the IDM system, an access token that is generated by the IDM system upon authenticating the requester using the credential information sent to the IDM system, wherein the access token indicates that the requester is authenticated by the IDM system;

    determining a plurality of roles associated with the requester and with the access token, wherein the plurality of roles specifies a set of privileges for the plurality of roles for accessing information managed by the data storage system;

    storing, in a cache of the first computer system, the access token for the requester in association with the plurality of roles;

    determining, by the first computer system and without communicating with the IDM system, whether the requester is authorized to access the first information based upon the plurality of roles and the set of privileges, wherein determining whether the requester is authorized to access the first information comprises determining that the plurality of roles associated with the access token comprises a first role that permits the requester to access the first information;

    based on determining that the requester is authorized to access the first information, sending, by the first computer system, the first information to a device of the requester;

    based on a second request by the requester to access second information managed by the data storage system, determining, by the first computer system, that the requester has previously been authenticated by the IDM system based on identifying that the access token is stored in the cache for the requester;

    based on determining that the requester is authenticated by the IDM system according to the access token, determining, by the first computer system and without communicating with the IDM system, the plurality of roles associated with the access token by retrieving the plurality of roles associated with the access token stored in the cache;

    determining, by the first computer system and without communicating with the IDM system, whether the requester is authorized to access the second information based upon the plurality of roles and the set of privileges, wherein determining whether the requester is authorized to access the second information comprises determining that the plurality of roles associated with the access token comprises a second role that permits the requester to access the second information; and

    based on determining that the requester is authorized to access the second information, sending, by the first computer system, the second information to the device of the requester.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×