Method and system for implementing shared schemas for users in a distributed computing system
First Claim
Patent Images
1. A method for managing user schemas in a distributed computing system, the method comprising:
- creating a first global user identification for a first user;
creating a second global user identification for a second user;
creating a local user schema at a network node, the local user schema accessible by the first and the second users;
mapping the first global user identification to the local user schema;
mapping the second global user identification to the local user schema, wherein the steps of mapping are performed without using a user name;
when the first user logs into the network node, assigning the local user schema to the first user with a first user role;
when the second user logs into the network node, assigning the local user schema to the second user with a second user role; and
wherein the first user and the second user have different privileges on the network node, a scope of the privilege for the first user is based at least partially on the first user role, and a scope of the privilege for the second user is based at least partially on the second user role.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for managing access information for users and other entities in a distributed computing system is disclosed. An aspect is directed to sharing schemas across multiple users. This can be accomplished by mapping multiple global users to the same local schema. Any users mapped to that local schema would, upon logging in, receive the set of privileges associated with the global user and the local schema. In this manner, separate schemas would not need to be defined for each global user.
-
Citations
57 Claims
-
1. A method for managing user schemas in a distributed computing system, the method comprising:
-
creating a first global user identification for a first user; creating a second global user identification for a second user; creating a local user schema at a network node, the local user schema accessible by the first and the second users; mapping the first global user identification to the local user schema; mapping the second global user identification to the local user schema, wherein the steps of mapping are performed without using a user name; when the first user logs into the network node, assigning the local user schema to the first user with a first user role; when the second user logs into the network node, assigning the local user schema to the second user with a second user role; and wherein the first user and the second user have different privileges on the network node, a scope of the privilege for the first user is based at least partially on the first user role, and a scope of the privilege for the second user is based at least partially on the second user role. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A computer program product that includes a medium usable by a processor, the medium having stored thereon a sequence of instructions which, when executed by said processor, causes said processor to execute a process for user schemas in a distributed computing system, the process comprising:
-
creating a first global user identification for a first user; creating a second global user identification for a second user; creating a local user schema at a network node, the local user schema comprising an account accessible by the first and the second users; mapping the first global user identification to the local user schema; mapping the second global user identification to the local user schema, wherein the steps of mapping are performed without using a user name; when the first user logs into the network node, assigning the local user schema to the first user with a first user role; when the second user logs into the network node, assigning the local user schema to the second user with a second user role; and wherein the first user and the second user have different privileges on the network node, a scope of the privilege for the first user is based at least partially on the first user role, and a scope of the privilege for the second user is based at least partially on the second user role. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48)
-
-
49. A system for managing user schemas in a distributed computing system, the method comprising:
-
means for creating a first global user identification for a first user; means for creating a second global user identification for a second user; means for creating a local user schema at a network node, the local user schema comprising an account accessible by the first and the second users; means for mapping the first global user identification to the local user schema; means for mapping the second global user identification to the local user schema, wherein the steps of mapping are performed without using a user name; means for assigning the local user schema to the first user with a first user role when the first user logs into the network node; means for assigning the local user schema to the second user with a second user role when the second user logs into the network node; and wherein the first user and the second user have different privileges on the network node, a scope of the privilege for the first user is based at least partially on the first user role, and a scope of the privilege for the second user is based at least partially on the second user role. - View Dependent Claims (50, 51, 52, 53, 54, 55, 56, 57)
-
Specification