×

Securing resource stores with claims-based security

  • US 8,095,963 B2
  • Filed: 04/30/2008
  • Issued: 01/10/2012
  • Est. Priority Date: 04/30/2008
  • Status: Active Grant
First Claim
Patent Images

1. At a computer system where, during a session, one or more applications are running and the one or more applications require access to resources from a resource store, a method for securing the resources maintained at the resource store with claims-based security, the method comprising the following acts:

  • in response to a claims request submitted to a policy store from one or more applications running during the session, receiving from the policy store policy information for the resource store;

    deriving permissions for accessing secured resources in the resource store from the received policy information, the permissions being derived from;

    a secured resources table defining the resources secured within the resource store, each secured resource being of a specified resource type, from among a plurality of different resource types, and each of the plurality of different resource types in turn being defined in a secured resource types table; and

    a secured operations table defining secured operations that are possible for the resources defined in the secured resources table;

    receiving identity information for the session, wherein the identity information is accumulated in a claims list compiled from one or more claims obtained for the session from an identity store and/or the policy store in response to requests submitted by the one or more applications running in the session;

    determining the resource types that any of the one or more applications of the session can access based on the derived permissions and the received identity information as defined by the compiled claims list for the session;

    accessing a metadata table that maps secured resource identifiers to corresponding resource types;

    filtering the metadata table into a subset of metadata that includes resource identifiers for secured resources of the resource types; and

    during the session, providing access to the subset of metadata that includes resource identifiers for secured resources of the resource types by any of the one or more applications of the session.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×