System and method for propagating security information in a web portal system
First Claim
1. A method for propagating security information for an application between a first environment and a second environment, the method comprising:
- receiving a first snap shot of security information from a first version of the application on the first environment;
determining a set of changes to be made to security information on a second version of the application on the second environment includingstoring the first snap shot of security information in an archive,storing a second snap shot of security information in the archive,comparing the first snap shot of security information in the first version of the application on the first environment to the second snap shot of security information in the second version of the application on the second environment to determine a set of differences between the security information in the first version of the application and security information in the second version of the application,viewing the set of differences through a change election user interface which provides a graphical listing of the set of differences, andusing the change election user interface to select the set of changes to send to the second version of the application based on the set of differences;
sending the set of changes from a first security adapter residing on the first environment to a second security adapter residing on the second environment;
receiving the set of changes in the second environment, wherein the set of changes indicates modification made to security parameters of the first version of the application; and
applying the set of changes to the second version of the application in the second environment to match the first version of the application on the first environment, wherein applying the set of changes includestracking which changes in the set of changes which are accepted at the application in the second environment, and for the changes not accepted, applying a suggested ordering of the application changes to be made.
2 Assignments
0 Petitions
Accused Products
Abstract
In accordance with embodiments, there are provided mechanisms and methods for propagating security information for an application between a first environment and a second environment. These mechanisms and methods can enable embodiments to propagate changes to security information from a first application instance in a first environment to a second application instance in a second environment. For example, an embodiment can receive security information from an adapter associated with a test version of an application, and then propagate the security information to a production version of the application residing in a production environment. The ability of embodiments to propagate security information between adapters associated with application versions can enable propagation of changes to security information, i.e., information about changes to permissions, rules, policies and so forth relating to security, between a first environment and a second environment without necessitating taking the production version of the application off line.
43 Citations
20 Claims
-
1. A method for propagating security information for an application between a first environment and a second environment, the method comprising:
-
receiving a first snap shot of security information from a first version of the application on the first environment; determining a set of changes to be made to security information on a second version of the application on the second environment including storing the first snap shot of security information in an archive, storing a second snap shot of security information in the archive, comparing the first snap shot of security information in the first version of the application on the first environment to the second snap shot of security information in the second version of the application on the second environment to determine a set of differences between the security information in the first version of the application and security information in the second version of the application, viewing the set of differences through a change election user interface which provides a graphical listing of the set of differences, and using the change election user interface to select the set of changes to send to the second version of the application based on the set of differences; sending the set of changes from a first security adapter residing on the first environment to a second security adapter residing on the second environment; receiving the set of changes in the second environment, wherein the set of changes indicates modification made to security parameters of the first version of the application; and applying the set of changes to the second version of the application in the second environment to match the first version of the application on the first environment, wherein applying the set of changes includes tracking which changes in the set of changes which are accepted at the application in the second environment, and for the changes not accepted, applying a suggested ordering of the application changes to be made. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer readable medium, including instructions stored thereon for propagating security information for an application between a first environment and a second environment, which when executed by one or more processors, cause the one or more processors to perform the steps of:
-
receiving a first snap shot of security information from a first version of the application on the first environment; determining a set of changes to be made to security information on a second version of the application on the second environment including storing the first snap shot of security information in an archive, storing a second snap shot of security information in the archive, comparing the first snap shot of security information in the first version of the application on the first environment to the second snap shot of security information in the second version of the application on the second environment to determine a set of differences between the security information in the first version of the application and the security information in the second version of the application, viewing the set of differences through a change election user interface which provides a graphical listing of the set of differences, and using the change election user interface to select the set of changes to send to the second version of the application based on the set of differences; sending the set of changes from a first security adapter residing on the first environment to a second security adapter residing on the second environment; receiving the set of changes in the second environment, wherein the set of changes indicates modifications made to security parameters of the first version of the application; and applying the set of changes to the second version of the application in the second environment to match the first version of the application on the first environment, wherein applying the set of changes includes tracking which changes in the set of changes which are accepted at the application in the second environment, and for the changes not accepted, applying a suggested ordering of the application changes to be made. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A system for managing applications, the system comprising:
-
a processor; and one or more stored sequences of instructions which, when executed by the processor, cause the processor to carry out the steps of;
receiving a first snap shot of security information from a first version of the application on the first environment;determining a set of changes to be made to security information on a second version of the application on the second environment including storing the first snap shot of security information in an archive, storing a second snap shot of security information in the archive, comparing the first snap shot of security information in the first version of the application on the first environment to the second snap shot of security information in the second version of the application on the second environment to determine a set of differences between the security information in the first version of the application and the security information in the second version of the application, viewing the set of differences through a change election user interface which provides a graphical listing of the set of differences, and using the change election user interface to select the set of changes to send to the second version of the application based on the set of differences; sending the set of changes from a first security adapter residing on the first environment to a second security adapter residing on the second environment; receiving the set of changes in the second environment, wherein the set of changes indicates modifications made to the security parameters of the first version of the application; and applying the set of changes to the second version of the application in the second environment to match the first version of the application on the first environment, wherein applying the set of changes includes tracking which changes in the set of changes which are accepted at the application in the second environment, and for the changes not accepted, applying a suggested ordering of the application changes to be made.
-
Specification