PROJECT MANAGEMENT BLACK BOX PROTECTIONS
First Claim
Patent Images
1. A method, comprising:
- receiving a request from a first principal to take an action on behalf of the first principal within a first processing environment, wherein the request is received within a context of a first stage for a lifecycle of a project;
authenticating the first principal;
evaluating policy when the first principal is successfully authenticated; and
taking the action on behalf of the first principal when policy permits.
7 Assignments
0 Petitions
Accused Products
Abstract
Techniques for project management black box protections are provided. A first principal associated with a first processing environment and a first stage of a project'"'"'s lifecycle requests that an action be taken on its behalf. The first principal is authenticated and policy is evaluated when the first principal is successfully authenticated. Moreover, the action is taken on behalf of the principal when the policy permits and the when the principal was successfully authenticated.
-
Citations
25 Claims
-
1. A method, comprising:
-
receiving a request from a first principal to take an action on behalf of the first principal within a first processing environment, wherein the request is received within a context of a first stage for a lifecycle of a project; authenticating the first principal; evaluating policy when the first principal is successfully authenticated; and taking the action on behalf of the first principal when policy permits. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
-
detecting an attempt made by a first principal in a first processing environment to promote a project from a first stage of its lifecycle to a second stage of its lifecycle; determining in response to a first policy evaluation that the attempt has to be made by a second principal; requesting that the second principal authorize the transition of the project from the first stage to the second stage by interacting with a third principal associated with the a second processing environment of the second stage. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system, comprising:
-
a project black box first security service implemented in a machine-accessible and readable medium and to process on a machine within a first processing environment of a network; and a project black box second security service implemented in a machine-accessible and readable medium and to process on a different machine within a second processing environment of the network; wherein the project black box first security service facilitates transitioning a project from a first stage of its lifecycle within the first processing environment to a second stage of its lifecycle within the second processing environment by interacting with the project black box second security service, actions of the project black box first security service are triggered in response to policy evaluation vis-à
-vis a first principal operating within the first processing environment when an attempt is made by the first principal to transition the project from the first stage to the second stage. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A system, comprising:
-
a project black box first security service implemented in a machine-accessible and readable medium and to process within a first processing environment of a network; and a project lifecycle management service implemented in a machine-accessible and readable medium and to process with the first processing environment of the network; wherein the project lifecycle management service is to monitor activities of a first principal within the first processing environment with respect to a first policy and when dictated by the first policy invoke the project black box first security service to perform a lifecycle management operation on behalf of the first principal. - View Dependent Claims (22, 23, 24, 25)
-
Specification