DEPLOYMENT TEMPLATES WITH EMBEDDED PERMISSIONS
First Claim
1. A method comprising:
- receiving a publication request to enable third-party use of actionable data, the publication request authorized by a first account with a first set of permissions;
recording the first set of permissions in association with the actionable data;
receiving a use request to execute the actionable data, the use request authorized by a second account with a second set of permissions, wherein the second set of permissions is different from the first set of permissions;
determining that a unified set of permissions inclusive of the first set of permissions and the second set of permissions is sufficient to authorize execution of the actionable data; and
authorizing execution of the actionable data responsive to the determination that the unified set of permissions is sufficient.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for authorizing execution of actionable data by receiving a request to enable third-party use of the actionable data, the request authorized by an account with a first set of permissions, and recording the first set of permissions in association with the actionable data, receiving a request to execute the actionable data, the request authorized by an account with a second set of permissions, determining that a unified set of permissions inclusive of the first set of permissions and the second set of permissions is sufficient to authorize execution of the actionable data, and authorizing execution of the actionable data responsive to the determination. Presented as an example of actionable data is a deployment template for provisioning resources in a cloud computing environment. The disclosed systems and methods are equally applicable to other forms and contexts of actionable data.
-
Citations
21 Claims
-
1. A method comprising:
-
receiving a publication request to enable third-party use of actionable data, the publication request authorized by a first account with a first set of permissions; recording the first set of permissions in association with the actionable data; receiving a use request to execute the actionable data, the use request authorized by a second account with a second set of permissions, wherein the second set of permissions is different from the first set of permissions; determining that a unified set of permissions inclusive of the first set of permissions and the second set of permissions is sufficient to authorize execution of the actionable data; and authorizing execution of the actionable data responsive to the determination that the unified set of permissions is sufficient. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
a data storage device comprising computer-readable memory configured to store permission information in association with actionable data information; a computing device comprising computer-readable memory configured to store computer-executable instructions and a processor configured to execute the stored instructions, wherein the instructions, when executed, cause the processor to; receive a publication request to enable third-party use of actionable data, the publication request authorized by a first account with a first set of permissions; record, in the data storage device, the first set of permissions in association with the actionable data; receive a use request to execute the actionable data, the use request authorized by a second account with a second set of permissions, wherein the second set of permissions is different from the first set of permissions; determine that a unified set of permissions inclusive of the first set of permissions and the second set of permissions is sufficient to authorize execution of the actionable data; and authorize execution of the actionable data responsive to the determination that the unified set of permissions is sufficient. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A method comprising:
-
receiving, from a first requestor, a dissemination request to disseminate a custom deployment template, wherein the custom deployment template includes instructions for configuring a plurality of resources in one or more computing clouds, and wherein configuring at least one resource in the plurality of resources requires a sufficient authorization; recording, in association with the custom deployment template, authorization information indicating that the first requestor has the sufficient authorization; receiving, from a second requestor, a launch request to launch the custom deployment template; determining that the launch request is authorized based on the authorization information recorded in association with the custom deployment template; and executing the launch request responsive to the determination, wherein executing the launch request causes configuration of the at least one resource. - View Dependent Claims (19, 20, 21)
-
Specification