Techniques for supporting application-specific access controls with a separate server
First Claim
1. A method for controlling access to application-specific operations performed by an application, comprising the steps of:
- receiving privilege information at a server that is distinct from the application;
causing the server to determine, based on the privilege information, whether a particular application-specific operation is allowed under a particular set of conditions; and
causing the server to communicate to the application an indication of whether the particular application-specific operation is allowed under said particular set of conditions.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for supporting access controls on application-specific operations performed by an application include receiving first data at a server distinct from the application. The first data describes a first set of privileges for performing a first set of application-specific operations. Second data is also received at the server. The second data associates a first user of the application with a privilege in the first set of privileges. In response to receiving a request at the server from the application, it is determined whether a particular user may have the application perform a particular application-specific operation based on the first data and the second data. The request indicates the particular user and the particular application-specific operation. A response is sent to the application. The response indicates whether the particular user may have the application perform the particular application-specific operation.
-
Citations
38 Claims
-
1. A method for controlling access to application-specific operations performed by an application, comprising the steps of:
-
receiving privilege information at a server that is distinct from the application;
causing the server to determine, based on the privilege information, whether a particular application-specific operation is allowed under a particular set of conditions; and
causing the server to communicate to the application an indication of whether the particular application-specific operation is allowed under said particular set of conditions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method for controlling access to application-specific operations performed by an application, comprising the steps of:
-
communicating privilege information to a server that is distinct from the application;
sending a request, from the application to the server, for the server to determine, based on the privilege information, whether a particular application-specific operation is allowed under a particular set of conditions;
receiving from the server an indication of whether the particular application-specific operation is allowed under said particular set of conditions; and
the application only allowing the particular application-specific operation if the server indicated that the application-specific operation was allowed under said particular set of conditions. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
Specification