COMPUTER IMPLEMENTED METHODS AND APPARATUS FOR MANAGING PERMISSION SETS AND VALIDATING USER ASSIGNMENTS
First Claim
1. A computer implemented method for modifying permission sets and validating permission set assignments to users, the method comprising:
- receiving, at a server, a request to create a permission set containing one or more permissions;
creating the permission set;
receiving, at the server, a request to assign the permission set to a first user, the first user associated with a first user constraint, the first user constraint defining a first group of permissions available to the first user;
determining that the permission set to be assigned to the first user does not violate the first user constraint associated with the first user; and
assigning the permission set to the first user.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are methods, apparatus, systems, and computer-readable storage media for modifying permission sets and validating permission set assignments to users. In some implementations, a computing device receives a request to create a permission set containing one or more permissions and assign the permission set to a first user. The first user is associated with a first user constraint that defines a first group of permissions available to the first user. The computing device may determine that the permission set to be assigned to the first user does not violate the first user constraint, and may assign the permission set to the first user.
198 Citations
20 Claims
-
1. A computer implemented method for modifying permission sets and validating permission set assignments to users, the method comprising:
-
receiving, at a server, a request to create a permission set containing one or more permissions; creating the permission set; receiving, at the server, a request to assign the permission set to a first user, the first user associated with a first user constraint, the first user constraint defining a first group of permissions available to the first user; determining that the permission set to be assigned to the first user does not violate the first user constraint associated with the first user; and assigning the permission set to the first user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. One or more computing devices for modifying permission sets and validating permission set assignments to users, the one or more computing devices comprising:
one or more processors operable to execute one or more instructions to; create a permission set containing one or more permissions in response to receiving a request message; receive a request to assign the permission set to a first user, the first user associated with a first user constraint, the first user constraint defining a first group of permissions available to the first user; determine that the permission set to be assigned to the first user does not violate the first user constraint associated with the first user; and assign the permission set to the first user.
-
17. A non-transitory computer-readable storage medium storing instructions executable by a computing device to perform a method for modifying permission sets and validating permission set assignments to users, the method comprising:
-
receiving, at a server, a request to create a permission set containing one or more permissions; creating the permission set; receiving, at the server, a request to assign the permission set to a first user, the first user associated with a first user constraint, the first user constraint defining a first group of permissions available to the first user; determining that the permission set to be assigned to the first user does not violate the first user constraint associated with the first user; and assigning the permission set to the first user.
-
-
18. A computer implemented method for modifying permission sets and validating permission set assignments to users, the method comprising:
-
receiving, at a server, a request to assign a permission set containing one or more permissions to a first user, the first user associated with a first user constraint, the first user constraint defining a first group of permissions available to the first user; determining that the permission set to be assigned to the first user does not violate the first user constraint associated with the first user; and assigning the permission set to the first user. - View Dependent Claims (19, 20)
-
Specification