CONTROLLING CONSUMPTION OF HIERARCHICAL REPOSITORY DATA
First Claim
1. A computer-implemented method comprising:
- receiving, at a server device comprising a processor, a request to provide a set of privileges to at least one of a set of users and a set of user groups to access resources referenced by a path of a networked hierarchical repository, the set of privileges including at least one privilege for authorized access to the resources; and
modifying, at the server device, a metadata associated with the resources to indicate the set of privileges to provide to the at least one of the set of users and the set of user groups for accessing the resources.
2 Assignments
0 Petitions
Accused Products
Abstract
One exemplary embodiment involves receiving, from an administrator device, a first request to provide a set of privileges to at least one of a set of users and a set of user groups to access private resources referenced by a path of a networked hierarchical repository, the set of privileges including at least one authorized access privilege. The embodiment also involves modifying a metadata associated with the private resources to indicate the set of privileges to provide to the at least one of the set of users and the set of user groups, the metadata associated with the private resources being modified to at least indicate the authorized access privilege. Additionally, the embodiment involves receiving a second request for authorized access to a set of resources associated with the networked hierarchical repository and providing the authorized access based on whether the metadata associated with the set of resources indicates to provide the authorized access.
-
Citations
20 Claims
-
1. A computer-implemented method comprising:
-
receiving, at a server device comprising a processor, a request to provide a set of privileges to at least one of a set of users and a set of user groups to access resources referenced by a path of a networked hierarchical repository, the set of privileges including at least one privilege for authorized access to the resources; and modifying, at the server device, a metadata associated with the resources to indicate the set of privileges to provide to the at least one of the set of users and the set of user groups for accessing the resources. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
a processor for executing instructions stored in computer-readable medium on one or more devices, the application comprising one or more modules configured to perform the steps comprising; receiving, from a client device, a request to access a set of resources associated with a networked hierarchical repository; determining whether a metadata associated with the requested resources indicates to provide authorized access to the resources; and responsive to the determination that the metadata indicates to provide access according to the authorized access, providing, to the client device, the authorized access to the requested resources. - View Dependent Claims (10, 11, 12, 13, 14, 20)
-
-
15. A non-transitory computer-readable medium on which is encoded program code, the program code comprising:
-
program code for receiving, from an administrator device, a first request to provide a set of privileges to at least one of a set of users and a set of user groups to access private resources referenced by a path of a networked hierarchical repository, the set of privileges including at least one authorized access privilege; program code for modifying a metadata associated with the private resources to indicate the set of privileges to provide to the at least one of the set of users and the set of user groups, the metadata associated with the private resources being modified to at least indicate the authorized access privilege; program code for receiving, from a client device, a second request for authorized access to a set of resources associated with the networked hierarchical repository; program code for determining whether the metadata associated with the set of resources indicates to provide the authorized access; and responsive to a determination that the metadata indicates to provide the authorized access, program code for providing, to the requesting client device, the authorized access to the second set of resources. - View Dependent Claims (16, 17, 18, 19)
-
Specification