SECURITY MIGRATION IN A BUSINESS INTELLIGENCE ENVIRONMENT
1 Assignment
0 Petitions
Accused Products
Abstract
In various implementations, local identifiers associated with users may be utilized to enable access one or more functions in a Business Intelligence (BI) Environment. A mapping may be generated to associate local identifiers and users. The mapping may be utilized to enable access in the BI environment by retrieving the local identifier from a mapping and enabling access in the BI environment based on the local identifier. In various implementations, a user may access the system as another user.
-
Citations
40 Claims
-
1-20. -20. (canceled)
-
21. A computer implemented method comprising:
-
receiving a request from a first user for access, as a second user, to a business intelligence environment, wherein the first user provides first user identification information associated with the first user and second user identification information associated with the second user; determining whether to allow the first user to access the business intelligence environment as the second user based at least partially on an access listing, wherein the access listing includes; user identification information for one or more authorized users authorized to access the business intelligence environment as another user; and at least one of user identities, user identification information, roles, or groups of users on which one or more of the authorized users is authorized to request access; determining a local identifier of the second user if the determination is made to allow the first user access as the second user; and allowing the first user access to the business intelligence environment as the second user if the determination is made to allow the access, wherein the access in the business intelligence environment is enabled based on the determined local identifier of the second user. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
-
28. A computer implemented method comprising:
-
receiving an authentication request, via a Security Migration System Namespace, for authorization for access to a Business Intelligence Environment of a user based on provided user identification information, wherein the Security Migration System Namespace is adapted to coordinate with a Security Migration System to expose one or more security principals to the Business Intelligence Environment; determining whether to authorize the access by requesting validation of the user based at least partially on the provided user identification information, wherein determining whether to authorize the access comprises authenticating the provided user information by delegating authentication to a First External Security Source; determining a local identifier associated with the validated user at least partially based on a retrieved mapping, if a determination is made to authorize a user, wherein the retrieved mapping includes local identifiers generated by a Second Security Namespace, wherein the Second Security Namespace is associated with a Second External Security Source, and wherein the Second External Security Source is distinct from the First External Security Source; and enabling the access in the Business Intelligence Environment based at least partially on the determined local identifier. - View Dependent Claims (29, 30, 31, 32, 33, 34)
-
-
35. A computer implemented method comprising:
-
retrieving at least a portion of a plurality of security principals defined in a First External Security Source; retrieving, from a First Security Namespace, at least one or more local identifiers associated with one or more of the retrieved security principals, wherein each local identifier uniquely identifies one of the security principals in a Business Intelligence Environment, and wherein one or more of the local identifiers are generated by the First Security Namespace, and wherein the First Security Namespace exposes one or more of the security principals from the First External Security Source for functions in the Business Intelligence Environment using one or more of the local identifiers; generating a mapping of at least a portion of the retrieved security principals and one or more of the retrieved associated local identifiers; retrieving one or more additional security principals defined in a Second External Security Source; identifying one or more matching security principals based on a determination of whether one or more of the security principals in the generated mapping are associated with one or more of the additional security principals; generating one or more additional associations in the mapping, wherein one or more of the additional associations comprises an association of one or more of the local identifiers in the mapping that are associated with one or more of the matching security principals and one or more of the additional security principals; providing a Security Migration System Namespace adapted to coordinate with the Security Migration System to expose one or more of the additional security principals to the Business Intelligence Environment using one or more of the local identifiers from the generated mapping and previously used by the First Security Namespace, wherein the Security Migration System Namespace is distinct from the First Security Namespace, and wherein the Security Migration System Namespace is capable of enabling access in the Business Intelligence Environment that is based on the generated mapping and that is independent of user authentication provided by the First External Security Source. - View Dependent Claims (36, 37, 38, 39, 40)
-
Specification