User authorization for file level restoration from image level backups
First Claim
1. A backup server, comprising:
- a processor configured to execute a backup application; and
a storage configured to store at least one image level backup of a machine located on a host system,wherein the backup application, when executed by the processor, is configured to;
save, during backup or replication activity to a database, a plurality of user accounts belonging to an access control group associated with the machine;
receive a restoration request via a backup application user interface on the machine from a user system, the restoration request including a first machine identifier and a user identifier of a user currently logged onto the machine through the user system, wherein the restoration request is configured to request access to the at least one image level backup;
retrieve, by the backup server, a second machine identifier associated with the machine from the at least one image level backup;
perform a comparison between the first machine identifier and the second machine identifier associated with the machine; and
accept the restoration request based at least in part on the comparison between the first machine identifier and the second machine identifier; and
based on accepting the restoration request, transmit an acceptance response to the machine, wherein the acceptance response is configured to cause the backup application user interface to provide, to the user system, an interface for selecting an object for restoration from the at least one image level backup.
3 Assignments
0 Petitions
Accused Products
Abstract
Embodiments provide systems, methods, and computer program products for enabling user authorization to perform a file level recovery from an image level backup of a virtual machine without the need for access control by an administrator. Specifically, embodiments enable an access control mechanism for controlling access to stored image level backups of a virtual machine. In an embodiment, the virtual machine includes a backup application user interface that can be used to send a restoration request to a backup server. The restoration request can include a machine identifier and a user identifier of the user logged onto the virtual machine. The backup server includes a backup application that determines whether or not the machine identifier contained in the restoration request can be matched to a machine identifier of a virtual machine present in one of the virtual machine backups stored on the backup server.
-
Citations
36 Claims
-
1. A backup server, comprising:
-
a processor configured to execute a backup application; and a storage configured to store at least one image level backup of a machine located on a host system, wherein the backup application, when executed by the processor, is configured to; save, during backup or replication activity to a database, a plurality of user accounts belonging to an access control group associated with the machine; receive a restoration request via a backup application user interface on the machine from a user system, the restoration request including a first machine identifier and a user identifier of a user currently logged onto the machine through the user system, wherein the restoration request is configured to request access to the at least one image level backup; retrieve, by the backup server, a second machine identifier associated with the machine from the at least one image level backup; perform a comparison between the first machine identifier and the second machine identifier associated with the machine; and accept the restoration request based at least in part on the comparison between the first machine identifier and the second machine identifier; and based on accepting the restoration request, transmit an acceptance response to the machine, wherein the acceptance response is configured to cause the backup application user interface to provide, to the user system, an interface for selecting an object for restoration from the at least one image level backup. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 36)
-
-
9. A computer-implemented method, comprising:
-
saving, during backup or replication activity to a database, a plurality of user accounts belonging to an access control group associated with a machine, the machine having at least image level backup stored on a backup server; receiving, by the backup server, a restoration request from a user system via a host system, the restoration request including a first machine identifier and a user identifier of a user currently logged onto the machine through the user system, wherein the restoration request is configured to request access to the at least one image level backup; retrieving, by the backup server, a second machine identifier associated with the machine from the at least one image level backup; performing a comparison between the first machine identifier and the second machine identifier associated with the machine; based on the comparison between the first machine identifier and the second machine identifier, transmitting a prompt to the user system via the host system to provide an authentication cookie; and accepting the restoration request based at least in part on the comparison between the first machine identifier and the second machine identifier and receiving the authentication cookie in response to the prompt. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product comprising a non-transitory computer readable medium including computer control logic stored therein, wherein the computer control logic, when executed by one or more processors, enables a method for user authorization for file level restoration from an image level backup, the method comprising:
-
saving, during backup or replication activity to a database, a plurality of user accounts belonging to an access control group associated with a machine located on a host system, the machine having at least one image level backup stored on a backup server; receiving, by the backup server, a restoration request from a user system via a backup application user interface on the virtual machine, the restoration request including a first machine identifier and a user identifier of a user currently logged onto the machine through the user system, wherein the restoration request is configured to request access to the at least one image level backup; retrieving, by the backup server, a second machine identifier associated with the machine from the at least one image level backup; performing a comparison between the first machine identifier and the second machine identifier associated with the machine; accepting the restoration request based at least in part on the comparison between the first machine identifier and the second machine identifier; and based on accepting the restoration request, transmitting an acceptance response to the machine, wherein the acceptance response is configured to cause the backup application user interface to provide an interface to the user system for selecting an object for restoration from the at least one image level backup. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
-
24. A backup server, comprising:
-
a processor configured to execute a backup application; and a storage configured to store at least one image level backup of a machine located on a host system, wherein the backup application when executed by the processor is configured to; save, during backup or replication activity to a database, a plurality of user accounts belonging to an access control group associated with the machine, wherein the plurality of user accounts include a plurality of user identifiers; receive a restoration request from a user system via a backup application user interface on the machine, the restoration request including a machine identifier and a user identifier of a user currently logged onto the machine through the user system, wherein the restoration request is configured to request access to the at least one image level backup; compare the user identifier to the plurality of user identifiers, wherein the plurality of user identifiers are included with the at least one image level backup of the machine; accept the restoration request based at least in part on whether or not the user identifier matches one of the plurality of user identifiers; and based on accepting the restoration request, transmit an acceptance response to the machine, wherein the acceptance response is configured to cause the backup application user interface to provide an interface to the user system for selecting an object for restoration from the at least one image level backup. - View Dependent Claims (25, 26, 27)
-
-
28. A computer-implemented method, comprising:
-
saving, during backup or replication activity to a database, a plurality of user accounts belonging to an access control group associated with a machine located on a host system, the plurality of user accounts including a plurality of user identifiers, the machine having at least one image level backup stored on a backup server; receiving a restoration request from a user system via a backup application user interface on the machine, the restoration request including a machine identifier and a user identifier of a user currently logged onto the machine through the user system, wherein the restoration request is configured to request access to the at least one image level backup; comparing the user identifier to the plurality of user identifiers, wherein the plurality of user identifiers are included with the at least one image level backup of the machine; accepting the restoration request based at least in part on whether or not the user identifier matches one of the plurality of user identifiers; and based on accepting the restoration request, transmitting an acceptance response to the machine, wherein the acceptance response is configured to cause the backup application user interface to provide an interface to the user system for selecting an object for restoration from the at least one image level backup. - View Dependent Claims (29, 30, 31)
-
-
32. A computer program product comprising a non-transitory computer readable medium including computer control logic stored therein, wherein the computer control logic, when executed by one or more processors, enables a method for user authorization for file level restoration from an image level backup, the method comprising:
-
saving, during backup or replication activity to a database, a plurality of user accounts belonging to an access control group associated with a machine located on a host system, the plurality of user accounts including a plurality of user identifiers, the machine having at least one image level backup stored on a backup server; receiving a restoration request from a user system via a backup application user interface on the machine, the restoration request including a machine identifier and a user identifier of a user currently logged onto the machine through the user system, wherein the restoration request is configured to request access to the at least one image level backup; comparing the user identifier to the plurality of user identifiers, wherein the plurality of user identifiers are included with the at least one image level backup of the machine; accepting or denying the restoration request based at least in part on whether or not the user identifier matches one of the plurality of user identifiers; and based on accepting the restoration request, transmitting an acceptance response to the machine, wherein the acceptance response is configured to cause the backup application user interface to provide an interface to the user system for selecting an object for restoration from the at least one image level backup. - View Dependent Claims (33, 34, 35)
-
Specification