Method of applying constraints against discovered attributes in provisioning computers
First Claim
1. A method of applying constraints in installing software on a target computer, comprising:
- selecting a policy from a list of policies, wherein the policies contain at least one build operator;
selecting a constraint from a list of constraints;
applying the selected policy to a group of target computers;
applying the selected constraint to the group of target computers;
selecting, for a given target computer within said group of target computers, a build operator based on attribute criteria associated with the build operator; and
excluding target computers from the group of target computers where attributes of the excluded target computer do not satisfy the constraint.
0 Assignments
0 Petitions
Accused Products
Abstract
A method of installing software on a target computer using policies and constraints. Policies include at least one provisioning rule specifying a provisioning instruction. The provisioning instruction specifies at an action to be performed in installing software on a target computer. Constraints specify criteria a target computer must satisfy. A policy applied to a group of target computers subject to a constraint will only be applied to those target computers satisfying the constraint. Target computers satisfying the constraint will have a provisioning instruction selected from a provisioning rule, the provisioning rule selected according to attribute criteria corresponding to the attributes of the target computer.
-
Citations
20 Claims
-
1. A method of applying constraints in installing software on a target computer, comprising:
-
selecting a policy from a list of policies, wherein the policies contain at least one build operator;
selecting a constraint from a list of constraints;
applying the selected policy to a group of target computers;
applying the selected constraint to the group of target computers;
selecting, for a given target computer within said group of target computers, a build operator based on attribute criteria associated with the build operator; and
excluding target computers from the group of target computers where attributes of the excluded target computer do not satisfy the constraint. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of installing software on a target computer, said target computer having at least one attribute, comprising:
-
applying a policy to a target computer, said policy including at least one provisioning rule applying a constraint to said target computer;
halting the installation process in the event the attributes of said target computer do not satisfy the constraint; and
selecting a rule from said policy based on attribute criteria associated with said provisioning rule. - View Dependent Claims (8)
-
-
9. The method of claim 9, wherein executing the at least one provisioning instruction initiates using a vendor tool on the target computer.
-
10. A method of installing software on a target computer, said target computer having at least one attribute, comprising:
-
applying a policy to a target computer, said policy including at least one build operator;
applying a constraint to said target computer;
halting the installation process in the event the attributes of said target computer do not satisfy the constraint; and
selecting a rule from said build operator based on attribute criteria associated with said provisioning rule. - View Dependent Claims (11, 12)
-
-
13. A method of installing software on a target computer, comprising:
-
selecting a provisioning instruction by;
selecting a policy from a list of policies, selecting a constraint from a list of constraints;
selecting a build operator associated with said policy, selecting, from said build operator, a ruleset matching a state value, and selecting a provisioning rule from said ruleset, wherein the provisioning rule selected has attribute criteria matching the attribute criteria of said target computer; and
determining whether attributes of said target computer satisfy the constraint, in the event said target computer'"'"'s attributes satisfy the constraint executing a provisioning instruction contained within said provisioning rule. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification