Security synchronization services
First Claim
Patent Images
1. A method of synchronizing role membership within security roles of disparate computer applications, the method comprising:
- interfacing, by a management console, with disparate computer applications having different established security infrastructures that support security roles for users, the management console configured to interface with the disparate computer applications via a synchronization web service;
collecting, by the management console, the security roles used in each of the disparate computer applications;
storing, at the management console, synchronization rules for associating collected security roles among the disparate computer applications;
presenting, by the management console, one or more user interfaces for selecting a particular computer application from the disparate computer applications, selecting a particular security role, selecting one or more users to be granted the particular security role, and selecting a synchronization rule that is related to the particular computer application and to the particular security role; and
executing, by the management console via the synchronization web service, a selected synchronization rule that specifies the particular computer application as a source application, specifies a destination application from the disparate computer applications, and associates the particular security role with a collected security role of the destination application;
wherein execution of the selected synchronization rule synchronizes role membership within the particular security role of the particular application specified as the source application and role membership within the collected security role of the destination application.
2 Assignments
0 Petitions
Accused Products
Abstract
As a result of the inability to assign security in multiple applications at one time, there is an opportunity to tie the disparate security systems together. Security synchronization services is a method and apparatus that uses roles to provide a common administration experience for all applications that use it and fits better for new applications.
-
Citations
20 Claims
-
1. A method of synchronizing role membership within security roles of disparate computer applications, the method comprising:
-
interfacing, by a management console, with disparate computer applications having different established security infrastructures that support security roles for users, the management console configured to interface with the disparate computer applications via a synchronization web service; collecting, by the management console, the security roles used in each of the disparate computer applications; storing, at the management console, synchronization rules for associating collected security roles among the disparate computer applications; presenting, by the management console, one or more user interfaces for selecting a particular computer application from the disparate computer applications, selecting a particular security role, selecting one or more users to be granted the particular security role, and selecting a synchronization rule that is related to the particular computer application and to the particular security role; and executing, by the management console via the synchronization web service, a selected synchronization rule that specifies the particular computer application as a source application, specifies a destination application from the disparate computer applications, and associates the particular security role with a collected security role of the destination application; wherein execution of the selected synchronization rule synchronizes role membership within the particular security role of the particular application specified as the source application and role membership within the collected security role of the destination application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer system comprising:
-
a processor configured to execute computer-executable instructions; and memory storing computer-executable instructions for implementing a method of synchronizing role memberships within security roles of disparate computer applications, the method comprising; interfacing, by a management console, with disparate computer applications having different established security infrastructures that support security roles for users, the management console configured to interface with the disparate computer applications via a synchronization web service; collecting, by the management console, the security roles used in each of the disparate computer applications; storing, at the management console, synchronization rules for associating collected security roles among the disparate computer applications; presenting, by the management console, one or more user interfaces for selecting a particular computer application from the disparate computer applications, selecting a particular security role, selecting one or more users to be granted the particular security role, and selecting a synchronization rule that is related to the particular computer application and to the particular security role; and executing, by the management console via the synchronization web service, a selected synchronization rule that specifies the particular computer application as a source application, specifies a destination application from the disparate computer applications, and associates the particular security role with a collected security role of the destination application; wherein execution of the selected synchronization rule synchronizes role membership within the particular security role of the particular computer application specified as the source application and role membership within the collected security role of the destination application. - View Dependent Claims (10, 11, 12)
-
-
13. A computer-readable storage medium storing computer executable instructions that, when executed by a computing device, cause the computing device to perform a method of synchronizing role membership within security roles of disparate computer applications, the method comprising:
-
interfacing, by a management console, with disparate computer applications having different established security infrastructures that support security roles for users, the management console configured to interface with the disparate computer applications via a synchronization web service; collecting, by the management console, the security roles used in each of the disparate computer applications; storing, at the management console, synchronization rules for associating collected security roles among the disparate computer applications; presenting, by the management console, one or more user interfaces for selecting a particular computer application from the disparate computer applications, selecting a particular security role, selecting one or more users to be granted the particular security role, and selecting a synchronization rule that is related to the particular computer application and to the particular security role; and executing, by the management console via the synchronization web service, a selected synchronization rule that specifies the particular computer application as a source application, specifies a destination application from the disparate computer applications, and associates the particular security role with a collected security role of the destination application; wherein execution of the selected synchronization rule synchronizes role membership within the particular security role of the particular computer application specified as the source application and role membership within the collected security role of the destination application. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification