Facilitating separation-of-duties when provisioning access rights in a computing system
First Claim
1. A system for managing risk management rules comprising:
- at least one processor;
a rule configuration interface used to configure a risk management rule based on user input received, from a first user, at the rule configuration interface, wherein the rule configuration interface comprises a first list of access rights available for selection by the first user, and wherein a first plurality of access rights listed in the first list of access rights comprise at least one of (i) one or more roles, (ii) one or more tasks, or (iii) one or more permissions;
a role configuration interface used to configure a role based on user input received, from the first user, at the role configuration interface, wherein the role configuration interface comprises a second list of access rights available for selection by the first user, and wherein a second plurality of access rights listed in the second list of access rights comprise at least one of (i) one or more tasks, or (ii) one or more permissions; and
memory storing instructions that, when executed by the at least one processor, cause the system to;
facilitate configuration of the risk management rule by at least;
displaying the rule configuration interface wherein displaying the rule configuration interface comprises presenting, at a first portion of the rule configuration interface, the first list of access rights;
receiving, at the rule configuration interface, input selecting a first access right from the first list of access rights, the first access right selected corresponding to a base access right for the risk management rule,receiving, at the rule configuration interface, input selecting a second access right from the first list of access rights, the second access right selected corresponding to a conflicting access right for the risk management rule,displaying, in the rule configuration interface and in a list of conflicting access rights for the risk management rule, the conflicting access right;
facilitate configuration of the role by at least;
displaying the role configuration interface wherein displaying the role configuration interface comprises presenting, at a first portion of the role configuration interface, the second list of access rights,receiving, at the role configuration interface, input selecting an access right from the second list of access rights for association with the role,evaluating whether the access right selected for association with the role violates one or more risk management rules, andbased on determining that the access right selected for association with the role violates at least one risk management rule, displaying, in the role configuration interface, an indication that the access right selected violates at least one risk management rule; and
monitor access rights provisioned at a computing system to determine whether both the base access right and the conflicting access right are provisioned to a second user of the computing system.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for managing risk management rules are provided. A risk management rule may be configured at a rule configuration interface are described. The rule configuration interface may include a list of access rights available for selection. Based on input received, one of the access rights may be identified as a base access right and one of the access rights may be identified as a conflicting access right for the risk management rule. The access rights provisioned at the computing system may be monitored to determine whether a user is provisioned with both the base access right and the conflicting access right. If so, a violation review may be created and presented at a violation review interface at which a decision for the violation review is receivable. An exception to the risk management rule may also be configured at an exception configuration interface.
344 Citations
20 Claims
-
1. A system for managing risk management rules comprising:
-
at least one processor; a rule configuration interface used to configure a risk management rule based on user input received, from a first user, at the rule configuration interface, wherein the rule configuration interface comprises a first list of access rights available for selection by the first user, and wherein a first plurality of access rights listed in the first list of access rights comprise at least one of (i) one or more roles, (ii) one or more tasks, or (iii) one or more permissions; a role configuration interface used to configure a role based on user input received, from the first user, at the role configuration interface, wherein the role configuration interface comprises a second list of access rights available for selection by the first user, and wherein a second plurality of access rights listed in the second list of access rights comprise at least one of (i) one or more tasks, or (ii) one or more permissions; and memory storing instructions that, when executed by the at least one processor, cause the system to; facilitate configuration of the risk management rule by at least; displaying the rule configuration interface wherein displaying the rule configuration interface comprises presenting, at a first portion of the rule configuration interface, the first list of access rights; receiving, at the rule configuration interface, input selecting a first access right from the first list of access rights, the first access right selected corresponding to a base access right for the risk management rule, receiving, at the rule configuration interface, input selecting a second access right from the first list of access rights, the second access right selected corresponding to a conflicting access right for the risk management rule, displaying, in the rule configuration interface and in a list of conflicting access rights for the risk management rule, the conflicting access right; facilitate configuration of the role by at least; displaying the role configuration interface wherein displaying the role configuration interface comprises presenting, at a first portion of the role configuration interface, the second list of access rights, receiving, at the role configuration interface, input selecting an access right from the second list of access rights for association with the role, evaluating whether the access right selected for association with the role violates one or more risk management rules, and based on determining that the access right selected for association with the role violates at least one risk management rule, displaying, in the role configuration interface, an indication that the access right selected violates at least one risk management rule; and monitor access rights provisioned at a computing system to determine whether both the base access right and the conflicting access right are provisioned to a second user of the computing system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method for managing risk management rules comprising:
-
providing a rule configuration interface used to configure a risk management rule based on user input received, from a first user, at the rule configuration interface, wherein the rule configuration interface comprises a first list of access rights available for selection by the first user, and wherein a first plurality of access rights listed in the first list of access rights comprise at least one of (i) one or more roles, (ii) one or more tasks, or (iii) one or more permissions; providing a role configuration interface used to configure a role based on user input received, from the first user, at the role configuration interface, wherein the role configuration interface comprises a second list of access rights available for selection by the first user, and wherein a second plurality of access rights listed in the second list of access rights comprise at least one of (i) one or more tasks, or (ii) one or more permissions; facilitating configuration of the risk management rule by at least; displaying the rule configuration interface wherein displaying the rule configuration interface comprises presenting, at a first portion of the rule configuration interface, the first list of access rights; receiving, at the rule configuration interface, input selecting a first access right from the first list of access rights, the first access right selected corresponding to a base access right for the risk management rule; receiving, at the configuration interface, input selecting a second access right from the first list of access rights, the second access right selected corresponding to a conflicting access right for the risk management rule; displaying, in the rule configuration interface and in a list of conflicting access rights for the risk management rule, the conflicting access right; facilitating configuration of the role by at least; displaying the role configuration interface wherein displaying the role configuration interface comprises presenting, at a first portion of the role configuration interface, the second list of access rights; receiving, at the role configuration interface, input selecting an access right from the second list of access rights for association with the role; evaluating whether the access right selected for association with the role violates one or more risk management rules; and based on determining that the access right selected for association with the role violates at least one risk management rule, displaying, in the role configuration interface, an indication that the access right selected violates at least one risk management rule; and monitoring access rights provisioned at a computing system to determine whether both the base access right and the conflicting access right are provisioned to a second user of the computing system. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. Non-transitory computer-readable media storing computer-executable instructions that, when executed, cause a computing device to manage risk management rules and roles for a computing system by at least:
-
providing a rule configuration interface used to configure a risk management rule based on user input received, from a first user, at the rule configuration interface, wherein the rule configuration interface comprises a first list of access rights available for selection by the first user, and wherein a first plurality of access rights listed in the first list of access rights comprise at least one of (i) one or more roles, (ii) one or more tasks, or (iii) one or more permissions; providing a role configuration interface used to configure a role based on user input received, from the first user, at the role configuration interface, wherein the role configuration interface comprises a second list of access rights available for selection by the first user, and wherein a second plurality of access rights listed in the second list of access rights comprise at least one of (i) one or more tasks, or (ii) one or more permissions; facilitating configuration of the risk management rule by at least; displaying the rule configuration interface wherein displaying the rule configuration interface comprises presenting, at a first portion of the rule configuration interface, the first list of access rights; selecting, from the first list of access rights and based on user input received at the rule configuration interface from the first user, a first access right as a base access right for the risk management rule; selecting, from the first list of access rights and based on user input received at the rule configuration interface from the first user, a second access right as a conflicting access right for the risk management rule; displaying, in the rule configuration interface and in a list of conflicting access rights for the risk management rule, the conflicting access right; facilitating configuration of the role by at least; displaying the role configuration interface wherein displaying the role configuration interface comprises presenting, at a first portion of the role configuration interface, the second list of access rights; selecting, from the second list of access rights and based on user input received at the role configuration interface from the first user, an access right from the second list of access rights for association with the role; evaluating whether the access right selected for association with the role violates one or more risk management rules; and based on determining that the access right selected for association with the role violates at least one risk management rule, displaying, in the role configuration interface, an indication that the access right selected violates at least one risk management rule; and monitoring access rights provisioned at a computing system to determine whether both the base access right and the conflicting access right are provisioned to a second user of the computing system. - View Dependent Claims (19, 20)
-
Specification