Distributed security system with dynamic roles
First Claim
Patent Images
1. A system for distributed enterprise security, comprising:
- a security control module (SCM) operable to accept information, wherein the information includes one or more policies;
at least one security service module (SSM) operable to accept the information from the SCM;
a role mapping module coupled to the at least one SSM, wherein the role mapping module is operable to map a user to at least one role based on the information; and
wherein the information accepted by the SCM is relevant to the at least one SSM.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for distributed enterprise security, comprising, a security control module (SCM) operable to accept information, wherein the information includes one or more policies, at least one security service module (SSM) operable to accept the information from the SCM, a role mapping module coupled to the at least one SSM, wherein the role mapping module is operable to map a user to at least one role based on the information, and wherein the information accepted by the SCM is relevant to the at least one SSM.
140 Citations
25 Claims
-
1. A system for distributed enterprise security, comprising:
-
a security control module (SCM) operable to accept information, wherein the information includes one or more policies;
at least one security service module (SSM) operable to accept the information from the SCM;
a role mapping module coupled to the at least one SSM, wherein the role mapping module is operable to map a user to at least one role based on the information; and
wherein the information accepted by the SCM is relevant to the at least one SSM. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for providing distributed enterprise security, comprising:
-
distributing changes to information to a first process, wherein the information can include one or more of;
a policy and configuration information;
distributing the information from the first process to at least one second process on the same computing device as the first process; and
wherein the at least one second process can include a configurable security service module that is operable to provide a role mapping service based on the information and operable to provide an authorization service based on the information. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A machine readable medium having instructions stored thereon to cause a system to:
-
distribute changes to information to a first process, wherein the information can include one or more of;
a policy and configuration information;
distribute the information from the first process to at least one second process on the same computing device as the first process; and
wherein the at least one second process can include a configurable security service module that is operable to provide a role mapping service based on the information and operable to provide an authorization service based on the information. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
-
25. A computer signal embodied in a transmission medium, comprising:
-
a code segment including instructions for distributing changes to information to a first process, wherein the information can include one or more of;
a policy and configuration information;
a code segment including instructions for distributing the information from the first process to at least one second process on the same computing device as the first process; and
wherein the at least one second process can include a configurable security service module that is operable to provide a role mapping service based on the information and operable to provide an authorization service based on the information.
-
Specification