Dispersed storage network with access control and methods for use therewith
First Claim
1. A method for authenticating, through use of a dispersed storage managing unit, a user device request regarding dispersed storage data from a user device attempting to access a dispersed storage network (DSN), the method comprising:
- receiving, from a first proxy system element of the DSN, a first authentication request regarding executing a first portion that includes less than all of the user device request;
verifying the first authentication request;
when the first authentication request is validated, determining when a permissions list indicates that the user device has access permission corresponding to the user device request;
sending, to the first proxy system element, a first favorable response such that the first proxy system element is allowed to execute the first portion of the user device request when the permissions list indicates that the user device has access permission corresponding to the user device request;
receiving, from a second proxy system element, a second authentication request regarding executing a second portion that includes less than all of the user device request;
verifying the second authentication request;
when the second authentication request is validated, determining when the permissions list indicates that the user device has access permission corresponding to the user device request;
sending, to the second proxy system element, a second favorable response such that the second proxy system element is allowed to execute the second portion of the user device request when the permissions list indicates that the user device has access permission corresponding to the user device request.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for authenticating a user device request by a dispersed storage managing unit (DSMU) in a dispersed storage network (DSN) begins by the DSMU receiving from a proxy element an authentication request for a portion of a user device request, verifying the request and when validated determining when a permissions list indicates the user device has access permission. The method continues with the proxy element being allowed to execute the portion of the user device request and receiving from another proxy element an authentication request for another portion of the user device request. The method then continues with the request being verified, and when validated, determining when the permissions list indicates the user device has access permission. The method then continues with the another proxy element being allowed to execute the authentication request for the another portion of the user request.
103 Citations
20 Claims
-
1. A method for authenticating, through use of a dispersed storage managing unit, a user device request regarding dispersed storage data from a user device attempting to access a dispersed storage network (DSN), the method comprising:
-
receiving, from a first proxy system element of the DSN, a first authentication request regarding executing a first portion that includes less than all of the user device request; verifying the first authentication request; when the first authentication request is validated, determining when a permissions list indicates that the user device has access permission corresponding to the user device request; sending, to the first proxy system element, a first favorable response such that the first proxy system element is allowed to execute the first portion of the user device request when the permissions list indicates that the user device has access permission corresponding to the user device request; receiving, from a second proxy system element, a second authentication request regarding executing a second portion that includes less than all of the user device request; verifying the second authentication request; when the second authentication request is validated, determining when the permissions list indicates that the user device has access permission corresponding to the user device request; sending, to the second proxy system element, a second favorable response such that the second proxy system element is allowed to execute the second portion of the user device request when the permissions list indicates that the user device has access permission corresponding to the user device request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A dispersed storage managing unit adapted to be coupled to a dispersed storage network (DSN), the dispersed storage managing unit comprising:
-
input/output interface circuitry adapted to be coupled to the DSN; memory; and a processing module operably coupled to the memory and to the input/output interface circuitry, wherein the processing module is operable to; receive from a first proxy system element of the DSN, a first authentication request regarding executing a first portion that includes less than all of the user device request, wherein the user device request is regarding dispersed storage data from a user device; verify the first authentication request; when the first authentication request is validated, determine when a permissions list indicates that the user device has access permission corresponding to the user device request; send to the first proxy system element, a first favorable response such that the first proxy system element is allowed to execute the first portion of the user device request when the permissions list indicates that the user device has access permission corresponding to the user device request; receive from a second proxy system element, a second authentication request regarding executing a second portion of the user device request, wherein the second portion is associated with a second one or more of the plurality of DSN functions; verify the second authentication request; when the second authentication request is validated, determine when the permissions list indicates that the user device has access permission corresponding to the user device request; send to the second proxy system element, a second favorable response such that the second proxy system element is allowed to execute the second portion of the user device request when the permissions list indicates that the user device has access permission corresponding to the user device request. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification