Project-based configuration management method and apparatus
2 Assignments
0 Petitions
Accused Products
Abstract
A configuration management system creates (602) each configuration by assigning a configuration identifier to each configuration. In addition, relational information is computed (706) that indicates the relationships between the configuration and any configurations upon which it is based. The system then tracks (604) changes to files of the configuration by storing information associating each new file version with the configuration identifier. The system also tracks (1210) changes to file properties. A configuration is then reconstructed (608) as of a desired date, by identifying (2104, 2106) the file versions and properties associated with that configuration as of the desired date. A determination is made (2110) whether a user that has requested the file versions has access privileges by first checking a security cache (2600) for the user privileges information. If the information is not on the cache, it is computed from a security table (2800) and stored on the cache. The system automatically compresses (3118) and reconstitutes (3006) file versions that are stored in the version store.
-
Citations
57 Claims
-
1-50. -50. (canceled)
-
51. A method, performed by a configuration management system, for determining whether a user has access privileges to file versions of a desired configuration of a project, the method comprising:
-
determining whether a record for the user exists in a security cache, wherein the security cache includes user capabilities information for users who have requested access to files of the project;
if no record exists for the user;
determining the user capabilities information for the user from an access token for the user and security descriptors for the system, wherein the access token and security descriptors are stored in a security table, which is separate from the security cache, and adding a new record to the security cache that includes the user capabilities for the user; and
determining, from the user capabilities and from information describing all versions of all files managed by the system, whether the user has the access privileges to the file versions of the desired configuration. - View Dependent Claims (52, 53, 54, 55, 56)
-
-
57-74. -74. (canceled)
Specification