System and method for providing a role table GUI via company group
First Claim
1. System for controlling access to code and tables in a first non-relational database and to data tables in a second relational database, comprising:
- said first non-relational database for storing code and documents which a user must access;
said second relational database for storing data files which said user must access;
access control list control on access to said first database;
said first and second database being in communication in a web environment;
a role table including for each authorized user web identifier one of a plurality of possible roles and one of a plurality of possible authorization levels;
a user profile for each said web identifier including user name and web identifier; and
access to said first non-relational database through said access control list and access to said second relational database both being enabled responsive to said web user identifier.
1 Assignment
0 Petitions
Accused Products
Abstract
A hybird Notes/DB2 environment provides a requisition catalog on the Web. Client browsers are connected to a GWA infrastructure including a first network dispatcher and a virtual cluster of Domino.Go servers. The network dispatcher sprays out browser requests among configured .nsf servers in virtual server cluster. Communications from this virtual server cluster are, in turn, dispatched by a second network dispatcher in a Domino cluster. External objects, primarily for a GUI, are served in a .dfs and include graphic files, Java files, HTML images and net.data macros. The catalog is built from supplier provided flat files. A front end is provided for business logic and validation, as also is a relation database backend. HTML forms are populated using relational database agents. A role table is used for controlling access both to Notes code and DB2 data. Large amounts of data are quickly transferred using an intermediate agent and window.
-
Citations
15 Claims
-
1. System for controlling access to code and tables in a first non-relational database and to data tables in a second relational database, comprising:
-
said first non-relational database for storing code and documents which a user must access;
said second relational database for storing data files which said user must access;
access control list control on access to said first database;
said first and second database being in communication in a web environment;
a role table including for each authorized user web identifier one of a plurality of possible roles and one of a plurality of possible authorization levels;
a user profile for each said web identifier including user name and web identifier; and
access to said first non-relational database through said access control list and access to said second relational database both being enabled responsive to said web user identifier. - View Dependent Claims (2)
-
-
3. System for controlling access to code and tables in a first non-relational database and to data tables in a second relational database, comprising:
-
said first non-relational database for storing code and documents which a user must access;
said second relational database for storing data files which said user must access;
access control list control on access to said first database;
said first and second database being in communication in a web environment;
a role table including for each authorized user web identifier one of a plurality of possible roles and one of a plurality of possible authorization levels;
a user profile for each said web identifier including user name and web identifier;
access to said first non-relational database through said access control list and access to said second relational database both being enabled responsive to said web user identifier;
authorization code for locating in said role table responsive to user entry of a web identifier said role and authorization level corresponding to said web identifier; and
function code responsive to said role and authorization level for accessing tables and code in said first non-relational database and data tables in said second relational database. - View Dependent Claims (4, 5)
-
-
6. System for controlling access to non-relational Notes and relational DB2 databases, comprising:
-
a Notes non-relational database for storing code and documents which a user must access;
access control list control on access to said non-relational Notes database;
a relational DB2 database for storing data files which said user must access;
a role table including for each authorized user web identifier one of a plurality of possible roles and one of a plurality of possible authorization levels;
a user profile for each said web identifier including user name, web identifier, charge information and delivery information;
access to said non-relational Notes database through said access control list and access to said relational DB2 database both being enabled responsive to said web user identifier. - View Dependent Claims (7)
-
-
8. System for controlling access to non-relational Notes and relational DB2 databases, comprising:
-
a Notes non-relational database for storing code and documents which a user must access;
access control list control on access to said non-relational Notes database;
a relational DB2 database for storing data files which said user must access;
a role table including for each authorized user web identifier one of a plurality of possible roles and one of a plurality of possible authorization levels;
a user profile for each said web identifier including user name, web identifier, charge information and delivery information;
access to said non-relational Notes database through said access control list and access to said relational DB2 database both being enabled responsive to said web user identifier;
authorization code for locating in said role table responsive to user entry of a web identifier said role and authorization level corresponding to said web identifier; and
function code responsive to said role and authorization level for accessing tables and code in said non-relational Notes database and data tables in said relational DB2 database. - View Dependent Claims (9)
a Notes server for accessing said role table and said DB2 tables; and
said role table providing for applying a level of authority to said user to be applied to said DB2 tables by said Notes server.
-
-
10. System for controlling access to code and tables in a first non-relational database and to data tables in a second relational database, comprising:
-
said first non-relational database for storing code and documents which a user must access;
said second relational database for storing data files which said user must access;
access control list control on access to said first non-relational database;
said first non-relational database and said second relational database being in communication in a web environment;
a role table including for each authorized user web identifier a role selected from a plurality of possible roles and an authorization level selected from a plurality of possible authorization levels;
a user profile for each said web identifier including user name and web identifier;
access to said first non-relational database through said access control list and access to said second relational database both being enabled responsive to said web user identifier.
-
-
11. Method for controlling access to code and tables in a first database of a first type and to data tables in a second database of a second, disparate type, comprising the steps of:
-
providing in a role table for each of a plurality of user web identifiers corresponding role indicia and level indicia;
providing access control list control to said code and tables in said first database;
granting access to said role table to a server to obtain said role indicia and level indicia for said user; and
operating said server to access both said first and second databases of disparate types and to apply said role indicia and level indicia to access said code, said tables, and said data tables.
-
-
12. Method for accessing from at least two disparate databases having distinct access control requirements code and data implementing a requisition catalog application on the web, comprising the steps of:
-
populating in a first of said disparate databases a relational database role table with user web identifiers and associated roles and levels for each said identifier selected from among a plurality of possible roles and possible levels;
granting access to a database server responsive to a request from a user having a user web identifier to locate in said role table said user'"'"'s web identifier and said role and level for said user;
granting access to said database server to access said code and data for said user; and
responsive to said database server accessing, executing code from a second of said disparate databases implementing said requisition catalog application with respect to said data to perform procedures authorized to said role and level for said user.
-
-
13. A program storage device readable by a machine, tangibly embodying a program of instructions executable by a machine to perform method steps for accessing from at least two disparate databases having different access control requirements code and data implementing a requisition catalog application on the web, said method steps comprising:
-
populating in a first of said databases a relational database role table with user web identifiers and associated roles and levels selected from a plurality of possible roles and a plurality of possible levels for each said identifier;
granting access to a database server responsive to request from a user having a user web identifier to locate in said role table said user'"'"'s web identifier the role and level for said user;
granting access to said database server to access in a second of said databases said code and data for said user; and
responsive to said database server accessing, executing code implementing said requisition catalog application with respect to said data to perform procedures authorized to said role and level for said user.
-
-
14. A program storage device readable by a machine, tangibly embodying a program of instructions executable by a machine to perform method steps for controlling access to code and tables in a first database and to data tables in a second database, said first database and said second database being of disparate types and having different access control requirements, said method steps comprising:
-
providing in said first database a role table for each of a plurality of user web identifiers corresponding to role indicia selected from among a plurality of different role indicia and level indicia selected from among a plurality of different level indicia;
providing access control list control to said code and tables in said first database;
granting access to said role table to a server to obtain said role indicia and level indicia for said user; and
operating said server to access both said first and second databases and to apply said role indicia and level indicia to access said code, said tables, and said data tables.
-
-
15. A computer program product or computer program element for executing method steps for controlling access to code and tables in a first database of a first, non-relational type and to data tables in a second database of a second, relational type, the steps comprising:
-
providing in said first database a role table for each of a plurality of user web identifiers corresponding role indicia and level indicia;
providing access control list control to said code and tables in said first database;
granting access to said role table to a server to obtain said role indicia and level indicia for said user; and
operating said server to access both said first and second databases and to apply said role indicia and level indicia to access said code, said tables, and said data tables.
-
Specification