File access control in a multi-protocol file server
First Claim
1. A method of operating a file server, said method including steps foridentifying a first file on said file server with a first security style selected from among a plurality of security styles;
- and enforcing said first security style for all accesses to said file server;
wherein said steps for enforcing include steps for recognizing a first set of permissions associated with said first file in said first security style;
defining a first user type associated with said firsts security style;
translating a user from a second user type associated with a second security style into said first user type; and
enforcing a file server request from said second user type using said first user type and said first set of permissions.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention provides a method and system for enforcing file access control among client devices using multiple diverse access control models and multiple diverse file server protocols. A multi-protocol file server identifies each file with one particular access control model out of a plurality of possible models, and enforces that one particular model for all accesses to that file. When the file server receives a file server request for that file using a different access control model, the file server translates the access control limits for that file into no-less-restrictive limits in the different model. The file server restricts access by the client device using the translated access control limits. Each file is assigned the access control model of the user who created the file or who last set access control limits for the file. When a user having a different access control model sets access control limits, the access control model for the file is changed to the new model. Files are organized in a tree hierarchy, in which each tree is limited to one or more access control models (which can limit the ability of users to set access control limits for files in that tree). Each tree can be limited to NT-model-only format, Unix-model-only format, or mixed NT-or-Unix-models format.
-
Citations
60 Claims
-
1. A method of operating a file server, said method including steps for
identifying a first file on said file server with a first security style selected from among a plurality of security styles; - and
enforcing said first security style for all accesses to said file server;
wherein said steps for enforcing include steps for recognizing a first set of permissions associated with said first file in said first security style;
defining a first user type associated with said firsts security style;
translating a user from a second user type associated with a second security style into said first user type; and
enforcing a file server request from said second user type using said first user type and said first set of permissions. - View Dependent Claims (2, 3, 4, 5)
- and
-
6. A method of operating a file server, said method including steps for
identifying a first file on said file server with a first security style selected from among a plurality of security styles corresponding to a plurality of operating systems implemented on said file server; - and
enforcing said first security style for all accesses to said first file;
wherein said steps for enforcing include steps for translating a first set of permissions associated with said first file in said first security style to a second set of permissions in a second security style, wherein said second set of permissions is no less restrictive that said first set of permissions; and
enforcing a file server request in said second security style using said second set of permissions. - View Dependent Claims (7, 8, 9, 10, 11)
- and
-
12. A method of operating a file server, said method including steps for
identifying a first file on said file server with a first security style selected from among a plurality of security styles corresponding to a plurality of operating systems; -
enforcing said first security style for all accesses to said file server; and
identifying said first file with a second security style selected from among the plurality of security styles in response to a file server request;
wherein said steps for identifying include steps for translating a first set of permissions associated with said first file in said first security style to a second set of permissions in said second security style, wherein said second set of permissions is no less restrictive than said first set of permissions. - View Dependent Claims (13, 14)
-
-
15. A file server including
a set of files available on said file server, each said file having an associated security style selected from among a plurality of security styles corresponding to a plurality of operating systems available on said file server; -
wherein said file server enforces said associated security style for all accesses to said file;
wherein said file server is capable of altering the security style associated with said file in response to a file server request; and
wherein said file server is capable of translating a first set of permissions associated with said file in a first security style to a second set of permissions in a second security style, wherein said second set of permissions is no less restrictive than said first set of permissions.
-
-
16. A file server comprising
interfaces to one or more client devices; -
a file system;
a processor operating under program control to cause the file server to perform file server operations on the file system and to communicate with the client devices; and
storage for the program control, the program control comprising steps for (a) identifying a first file on said file server with a first security style selected from among a plurality of security styles, and (b) enforcing said first security style for all accesses to said file server, wherein said steps for enforcing include steps for (c) recognizing a first set of permissions associated with said first file in said first security style, (d) defining a first user type associated with said firsts security style, (e) translating a user from a second user type associated with a second security style into said first user type, and (f) enforcing a file server request from said second user type using said first user type and said first set of permissions. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A file server comprising
interfaces to one or more client devices; -
a file system;
a processor operating under program control to cause the file server to perform file server operations on the file system and to communicate with the client devices; and
storage for the program control, the program control comprising steps for (a) identifying a first file on said file server with a first security style selected from among a plurality of security styles corresponding to a plurality of operating systems implemented on said file server, and (b) enforcing said first security style for all accesses to said first file, wherein said steps for enforcing include steps for (c) translating a first set of permissions associated with said first file in said first security style to a second set of permissions in a second security style, wherein said second set of permissions is no less restrictive that said first set of permissions, and (d) enforcing a file server request in said second security style using said second set of permissions. - View Dependent Claims (22, 23, 24, 25, 26)
-
-
27. A file server comprising
interfaces to one or more client devices; -
a file system;
a processor operating under program control to cause the file server to perform file server operations on the file system and to communicate with the client devices; and
storage for the program control, the program control comprising steps for (a) identifying a first file on said file server with a first security style selected from among a plurality of security styles corresponding to a plurality of operating systems, (b) enforcing said first security style for all accesses to said file server, and (c) identifying said first file with a second security style selected from among the plurality of security styles in response to a file server request, wherein said steps for identifying include steps for translating a first set of permissions associated with said first file in said first security style to a second set of permissions in said second security style, and wherein said second set of permissions is no less restrictive than said first set of permissions. - View Dependent Claims (28, 29)
-
-
30. Storage for instructions, the instructions executable by a processor to perform file server operations, the instructions comprising steps for
identifying a first file on said file server with a first security style selected from among a plurality of security styles; - and
enforcing said first security style for all accesses to said file server;
wherein said steps for enforcing include steps for recognizing a first set of permissions associated with said first file in said first security style;
defining a first user type associated with said firsts security style;
translating a user from a second user type associated with a second security style into said first user type; and
enforcing a file server request from said second user type using said first user type and said first set of permissions. - View Dependent Claims (31, 32, 33, 34)
- and
-
35. Storage for instructions, the instructions executable by a processor to perform file server operations, the instructions comprising steps for
identifying a first file on said file server with a first security style selected from among a plurality of security styles corresponding to a plurality of operating systems implemented on said file server; - and
enforcing said first security style for all accesses to said first file;
wherein said steps for enforcing include steps for translating a first set of permissions associated with said first file in said first security style to a second set of permissions in a second security style, wherein said second set of permissions is no less restrictive that said first set of permissions; and
enforcing a file server request in said second security style using said second set of permissions. - View Dependent Claims (36, 37, 38, 39, 40)
- and
-
41. Storage for instructions, the instructions executable by a processor to perform file server operations, the instructions comprising steps for
identifying a first file on said file server with a first security style selected from among a plurality of security styles corresponding to a plurality of operating systems; -
enforcing said first security style for all accesses to said file server; and
identifying said first file with a second security style selected from among the plurality of security styles in response to a file server request;
wherein said steps for identifying include steps for translating a first set of permissions associated with said first file in said first security style to a second set of permissions in said second security style; and
wherein said second set of permissions is no less restrictive than said first set of permissions. - View Dependent Claims (42, 43)
-
-
44. A method of operating a file server, said method including steps of
identifying a first file on said file server with a first security style selected from among a plurality of security styles; - and
enforcing said first security style for all accesses to said file server;
wherein said steps of enforcing include steps of recognizing a first set of permissions associated with said first file in said first security style;
defining a first user type associated with said firsts security style;
translating a user from a second user type associated with a second security style into said first user type; and
enforcing a file server request from said second user type using said first user type and said first set of permissions. - View Dependent Claims (45, 46, 47, 48)
- and
-
49. A method of operating a file server, said method including steps of
identifying a first file on said file server with a first security style selected from among a plurality of security styles corresponding to a plurality of operating systems implemented on said file server; - and
enforcing said first security style for all accesses to said first file;
wherein said steps of enforcing include steps of translating a first set of permissions associated with said first file in said first security style to a second set of permissions in a second security style, wherein said second set of permissions is no less restrictive that said first set of permissions; and
enforcing a file server request in said second security style using said second set of permissions. - View Dependent Claims (50, 51, 52, 53, 54)
- and
-
55. A method of operating a file server, said method including steps of
identifying a first file on said file server with a first security style selected from among a plurality of security styles corresponding to a plurality of operating systems; -
enforcing said first security style for all accesses to said file server; and
identifying said first file with a second security style selected from among the plurality of security styles in response to a file server request;
wherein said steps of identifying include steps of translating a first set of permissions associated with said first file in said first security style to a second set of permissions in said second security style, wherein said second'"'"'set of permissions is no less restrictive than said first set of permissions. - View Dependent Claims (56, 57)
-
-
58. A file server comprising
means for identifying a first file on said file server with a first security style selected from among a plurality of security styles; - and
means for enforcing said first security style for all accesses to said file server;
wherein said means for enforcing include means for recognizing a first set of permissions associated with said first file in said first security style;
means for defining a first user type associated with said firsts security style;
means for translating a user from a second user type associated with a second security style into said first user type; and
means for enforcing a file server request from said second user type using said first user type and said first set of permissions.
- and
-
59. A file server comprising
means for identifying a first file on said file server with a first security style selected from among a plurality of security styles corresponding to a plurality of operating systems implemented on said file server; - and
means for enforcing said first security style for all accesses to said first file;
wherein said means for enforcing include means for translating a first set of permissions associated with said first file in said first security style to a second set of permissions in a second security style, wherein said second set of permissions is no less restrictive that said first set of permissions; and
means for enforcing a file server request in said second security style using said second set of permissions.
- and
-
60. A file server comprising
means for identifying a first file on said file server with a first security style selected from among a plurality of security styles corresponding to a plurality of operating systems; -
means for enforcing said first security style for all accesses to said file server; and
means for identifying said first file with a second security style selected from among the plurality of security styles in response to a file server request;
wherein said means for identifying include means for translating a first set of permissions associated with said first file in said first security style to a second set of permissions in said second security style, wherein said second set of permissions is no less restrictive than said first set of permissions.
-
Specification