Limiting access to application features in cloud applications
First Claim
Patent Images
1. A method for providing access to an application feature, the method comprising:
- receiving, by an integration cloud service system of a cloud environment, a request to access an access controlled feature in an application in the cloud environment, wherein the access controlled feature is configured to be accessed by using an access key that is generated based on user information;
dynamically generating, by the integration cloud service system, the access key for the access controlled feature in the application based on the user information, wherein the user information comprises at least one from a group consisting of a user role, a user permission, user environment information, user system version information, and feature information;
validating, by the integration cloud service system, the access key for the access controlled feature in the application based on the user information; and
in response to the access key being valid, executing, by the integration cloud service system the access controlled feature in the application.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques are provided for limiting access to a feature in an application. Certain application features, such as access controlled features, are not generally accessible to all users of an integration cloud service system. When a user makes a request to access an access controlled feature, the system can determine whether user information satisfies the requirements to access a requested access controlled feature. If the user satisfies the requirements for the requested access controlled feature, an access key can be dynamically generated based on the user information.
-
Citations
20 Claims
-
1. A method for providing access to an application feature, the method comprising:
-
receiving, by an integration cloud service system of a cloud environment, a request to access an access controlled feature in an application in the cloud environment, wherein the access controlled feature is configured to be accessed by using an access key that is generated based on user information; dynamically generating, by the integration cloud service system, the access key for the access controlled feature in the application based on the user information, wherein the user information comprises at least one from a group consisting of a user role, a user permission, user environment information, user system version information, and feature information; validating, by the integration cloud service system, the access key for the access controlled feature in the application based on the user information; and in response to the access key being valid, executing, by the integration cloud service system the access controlled feature in the application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computing device for providing access to an application feature, the computing device comprising:
-
a memory; and one or more processors in an integration cloud service system of a cloud environment, the one or more processors configured to; receive a request to access an access controlled feature in an application in the cloud environment, wherein the access controlled feature is configured to be accessed by using an access key that is generated based on user information; dynamically generate the access key for the access controlled feature in the application based on the user information; validate the access key for the access controlled feature in the application based on the user information, wherein the user information comprises at least one from a group consisting of a user role, a user permission, user environment information, user system version information, and feature information; and in response to the access key being valid, execute the access controlled feature in the application. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A non-transitory computer readable storage medium storing instructions which, when executed by one or more processors of a computing device, cause the one or more processors to perform a method comprising:
-
receiving, by an integration cloud service system of a cloud environment, a request to access an access controlled feature in an application in the cloud environment, wherein the access controlled feature is configured to be accessed by using an access key that is generated based on user information; dynamically generating, by the integration cloud service system, the access key for the access controlled feature in the application based on the user information, wherein the user information comprises at least one from a group consisting of a user role, a user permission, user environment information, user system version information, and feature information; validating, by the integration cloud service system, the access key for the access controlled feature in the application based on the user information; and in response to the access key being valid, executing, by the integration cloud service system the access controlled feature in the application. - View Dependent Claims (17, 18, 19, 20)
-
Specification