Automatic creation of roles for a role-based access control system
First Claim
1. Process for the automated creation of roles for a role-based access control system of an enterprise, whereas the system organizes and manages the access of users to sensitive information in an inter- and/or intranet, by means of at least one data base comprising at least the relevant, existing security data about users and their access to sensitive information, the data base being connected to a computer, the process comprises the following steps:
- a) loading the security data from the data base into the computer b) mining the loaded data to find similarities that will allow the creation of organizational roles and/or functional roles and c) creation of at least one role based on the outcome of step b.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to a process for the automated creation of roles for a role-based access control system of an enterprise, whereas the system organizes and manages the access of users to sensitive information in an inter- and/or intranet, by means of at least one data base comprising at least the relevant, existing security data about users and their access to sensitive information, the data base being connected to a computer, the process comprises the following steps:
a) loading the data from the data base into the computer
b) mining the loaded data to find similarities that will allow the creation of organizational roles and/or functional roles and
c) creation of at least one role based on the outcome of step b.
-
Citations
10 Claims
-
1. Process for the automated creation of roles for a role-based access control system of an enterprise, whereas the system organizes and manages the access of users to sensitive information in an inter- and/or intranet, by means of at least one data base comprising at least the relevant, existing security data about users and their access to sensitive information, the data base being connected to a computer, the process comprises the following steps:
-
a) loading the security data from the data base into the computer b) mining the loaded data to find similarities that will allow the creation of organizational roles and/or functional roles and c) creation of at least one role based on the outcome of step b. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
Specification