Employing wrapper profiles
First Claim
1. A method of controlling profile access, comprising the step of:
- (a) creating a wrapper profile for a first profile; and
(b) setting a locking state of said wrapper profile for said first profile.
5 Assignments
0 Petitions
Accused Products
Abstract
Technology is disclosed for controlling access to data store information among multiple entities. A corresponding wrapper is created for information that may be subject to simultaneous access attempts. The wrapper includes an attribute that identifies the accessibility of the information—indicating whether the information is locked from further access, shareable among multiple entities, or not restricted at all. Before accessing information in the data store, an entity looks at the wrapper associated with the information to determine the type of access allowed, if any. An Identity, Access, or integrated Identity/Access System may maintain the wrappers as objects in the data store, with each wrapper object controlling another object containing information. Wrappers can be utilized when multiple provisioning applications are employed to provision resources. Each user and their corresponding resources are represented as objects with corresponding wrappers. Each provisioning application employs the wrappers to ensure that it has exclusive ownership of selected user and resource objects when provisioning resources to the selected user.
210 Citations
98 Claims
-
1. A method of controlling profile access, comprising the step of:
-
(a) creating a wrapper profile for a first profile; and
(b) setting a locking state of said wrapper profile for said first profile. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. One or more processor readable storage devices having processor readable code embodied on said one or more processor readable storage devices, said processor readable code for programming one or more processors to perform a method comprising the steps of:
-
(a) creating a wrapper profile for a first profile; and
(b) setting a locking state of said wrapper profile for said first profile. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. An apparatus, comprising:
-
one or more storage devices; and
one or more processors in communication with said one or more storage devices, said one or more processors perform a method comprising the steps of;
(a) creating a wrapper profile for a first profile;
(b) setting a locking state of said wrapper profile for said first profile; and
(c) performing a task related to said first profile after said step (b) is performed.
-
-
23. A method of controlling profile access, comprising the steps of:
-
(a) creating a first profile; and
(b) locking said first profile. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30)
-
-
31. One or more processor readable storage devices having processor readable code embodied on said one or more processor readable storage devices, said processor readable code for programming one or more processors to perform a method comprising the steps of:
-
(a) creating a first profile; and
(b) locking said first profile. - View Dependent Claims (32, 33, 34, 35, 36)
-
-
37. A method of controlling profile access, comprising the steps of:
-
(a) selecting a task request corresponding to a first profile;
(b) accessing a wrapper profile corresponding to said first profile to determine if said first profile is locked; and
(c) setting a locking state of said wrapper profile to lock said first profile, if it is determined in said step (b) that said wrapper profile is not locked. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49)
-
-
50. One or more processor readable storage devices having processor readable code embodied on said one or more processor readable storage devices, said processor readable code for programming one or more processors to perform a method comprising the steps of:
-
(a) selecting a task request corresponding to a first profile;
(b) accessing a wrapper profile corresponding to said first profile to determine if said first profile is locked; and
(c) setting a locking state of said wrapper profile to lock said first profile, if it is determined in said step (b) that said wrapper profile is not locked. - View Dependent Claims (51, 52, 53, 54, 55, 56)
-
-
57. A method of controlling profile access, comprising the steps of:
-
(a) identifying at least one wrapper profile satisfying criteria, wherein said criteria calls for said at least one wrapper profile to have a locking status of locked and said locking status to have been in place for at least a threshold period of time; and
(b) for each wrapper profile identified in said step (a), setting a current time stamp. - View Dependent Claims (58, 59, 60, 61)
-
-
62. One or more processor readable storage devices having processor readable code embodied on said one or more processor readable storage devices, said processor readable code for programming one or more processors to perform a method comprising the steps of:
-
(a) identifying at least one wrapper profile satisfying criteria, wherein said criteria calls for said at least one wrapper profile to have a locking status of locked and said locking status to have been in place for at least a threshold period of time; and
(b) for each wrapper profile identified in said step (a), setting a current time stamp. - View Dependent Claims (63, 64)
-
-
65. A method of controlling profile access, comprising the step of:
-
(a) identifying at least one wrapper profile corresponding to a criteria, wherein said at least one wrapper profile corresponds to at least one profile and said criteria calls for said at least one wrapper profile to have a locking status corresponding to a profile being accessible; and
(b) for each wrapper profile identified in said step (a) that has a locking status of not locked, setting a locking state. - View Dependent Claims (66, 67, 68, 69, 70)
-
-
71. One or more processor readable storage devices having processor readable code embodied on said one or more processor readable storage devices, said processor readable code for programming one or more processors to perform a method comprising the steps of:
-
(a) identifying at least one wrapper profile corresponding to a criteria, wherein said at least one wrapper profile corresponds to at least one profile and said criteria calls for said at least one wrapper profile to have a locking status corresponding to a profile being accessible; and
(b) for each wrapper profile identified in said step (a) that has a locking status of not locked, setting a locking state. - View Dependent Claims (72, 73)
-
-
74. A method of controlling profile access, comprising the steps of:
-
(a) identifying at least one wrapper profile corresponding to a criteria, wherein said at least one wrapper profile corresponds to at least one profile and said criteria calls for said at least one wrapper profile to have a locking status of not locked; and
(b) for each wrapper profile identified in said step (a), setting a locking status. - View Dependent Claims (75, 76, 77)
-
-
78. One or more processor readable storage devices having processor readable code embodied on said one or more processor readable storage devices, said processor readable code for programming one or more processors to perform a method comprising the steps of:
-
(a) identifying at least one wrapper profile corresponding to a criteria, wherein said at least one wrapper profile corresponds to at least one profile and said criteria calls for said at least one wrapper profile to have a locking status of not locked; and
(b) for each wrapper profile identified in said step (a), setting a locking status. - View Dependent Claims (79)
-
-
80. A method of controlling profile access, comprising the steps of:
-
(a) creating a user profile;
(b) creating a first wrapper profile for said user profile;
(c) creating at least one resource profile corresponding to said user profile; and
(d) creating a wrapper profile for each resource profile in said at least one resource profile. - View Dependent Claims (81, 82, 83, 84, 85, 86, 87, 88, 89)
-
-
90. One or more processor readable storage devices having processor readable code embodied on said one or more processor readable storage devices, said processor readable code for programming one or more processors to perform a method comprising the steps of:
-
(a) creating a user profile;
(b) creating a first wrapper profile for said user profile;
(c) creating at least one resource profile corresponding to said user profile; and
(d) creating a wrapper profile for each resource profile in said at least one resource profile. - View Dependent Claims (91, 92, 93, 94, 95)
-
-
96. An apparatus, comprising:
-
one or more storage devices; and
one or more processors in communication with said one or more storage devices, said one or more processors perform a method comprising the steps of;
(a) creating a user profile;
(b) creating a first wrapper profile for said user profile;
(c) creating at least one resource profile corresponding to said user profile;
(d) creating a wrapper profile for each resource profile in said at least one resource profile;
(e) submitting a provisioning request;
(f) selecting said provisioning request;
(g) accessing said first wrapper profile to determine if said user profile is locked; and
(h) setting a locking state of said first wrapper profile to lock said user profile, if it is determined in said step (g) that said user profile is not locked. - View Dependent Claims (97, 98)
-
Specification