Resource management with roles
First Claim
Patent Images
1. A method for controlling access to a resource in a distributed computing environment, comprising:
- receiving a request for a principal to access the resource;
determining a role that is appropriate for the principal given the resource;
determining whether access to the resource is allowed given the role;
wherein the role is associated with a first resource in a hierarchy of resources; and
wherein the role can supersede a second role associated with a parent of the resource in the hierarchy of resources.
1 Assignment
0 Petitions
Accused Products
Abstract
A system, method and media for controlling access to a resource in a distributed computing environment, comprising: receiving a request to access the resource for a principal; determining a role that is appropriate for the principal given the resource; determining whether access to the resource is allowed given the role.
122 Citations
17 Claims
-
1. A method for controlling access to a resource in a distributed computing environment, comprising:
-
receiving a request for a principal to access the resource;
determining a role that is appropriate for the principal given the resource;
determining whether access to the resource is allowed given the role;
wherein the role is associated with a first resource in a hierarchy of resources; and
wherein the role can supersede a second role associated with a parent of the resource in the hierarchy of resources. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A machine readable medium having instructions stored thereon to cause a system to:
-
receive a request for a principal to access a resource;
determine a role that is appropriate for the principal given the resource;
determine whether access to the resource is allowed given the role;
wherein the role is associated with a first resource in a hierarchy of resources; and
wherein the role can supersede a second role associated with a parent of the resource in the hierarchy of resources.
-
-
10. A system for controlling access to a resource in a distributed computing environment, comprising:
-
a security framework capable of receiving a request for a principal to access the resource;
a first component coupled to the security framework and capable of determining a role that is appropriate for the principal given the resource;
a second component coupled to the security framework and capable of determining whether access to the resource is allowed given the role;
wherein the role is associated with a first resource in a hierarchy of resources; and
wherein the role can supersede a second role associated with a parent of the resource in the hierarchy of resources. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
Specification