×

Composable roles

  • US 6,574,736 B1
  • Filed: 11/30/1998
  • Issued: 06/03/2003
  • Est. Priority Date: 11/30/1998
  • Status: Expired due to Term
First Claim
Patent Images

1. A computer-implemented method of defining security for an application set comprising at least one application, the method comprising:

  • at development of an application in the application set, defining a plurality of roles for the application to specify access privileges to processing services provided by the application;

    at deployment of the application, binding one of the roles to a composite role;

    at deployment of the application, binding the composite role to at least one user identity; and

    at runtime of the application, granting a user identity access to a processing service provided by the application if a role having access privileges to the processing service is bound to a composite role bound to the user identity.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×