Method and system for modeling options for opaque management data for a user and/or an owner
First Claim
1. A method for network management, the method comprising:
- in a network device managed via Distributed Management Task Force (DMTF) protocols;
receiving a request during opaque management data operations, wherein said request is handled in said network device using one or more instances of Common Information Model (CIM) based CIM_OpaqueManagementData class representing one or more corresponding storage components in said network device; and
authenticating operations performed during said handling of said request using Common Information Model (CIM) data model access profiles by utilizing one or more instances of at least one of CIM_Role and CIM_Privilege, via one or more instances of CIM_Identity class.
4 Assignments
0 Petitions
Accused Products
Abstract
Distributed Management Task Force (DMTF) management profiles, based on the Common Information Model (CIM) protocol, may be utilized to perform access authentication during opaque management data profile operations based on DMTF/CIM Role Based Authorization (RBA) profile and/or Simple Identity Management (SIM) profiles. Instances of CIM_Identity class may be utilized to enable validation of ownership and/or access rights, via instances of CIM_Role class and/or instances of CIM_Privilege class for a plurality of common users and/or applications. Quota related operations may be performed via “QuotaAffectsElement” associations between instances of CIM_Identity class and instances of the CIM_OpaqueManagementDataService class. The “QuotaAffectsElement” association may comprise “AllocationQuota” and/or “AllocatedBytes” properties to enable tracking and/or validating of quota related information within the opaque management data profile.
13 Citations
33 Claims
-
1. A method for network management, the method comprising:
in a network device managed via Distributed Management Task Force (DMTF) protocols; receiving a request during opaque management data operations, wherein said request is handled in said network device using one or more instances of Common Information Model (CIM) based CIM_OpaqueManagementData class representing one or more corresponding storage components in said network device; and authenticating operations performed during said handling of said request using Common Information Model (CIM) data model access profiles by utilizing one or more instances of at least one of CIM_Role and CIM_Privilege, via one or more instances of CIM_Identity class. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
12. A system for network management, the system comprising:
one or more processors in a network device that is managed via Distributed Management Task Force (DMTF) protocol, said one or more processors being operable to; receive a request during opaque management data operations, wherein said request is handled in said network device using one or more instances of Common Information Model (CIM) based CIM_OpaqueManagementData class representing one or more corresponding storage components in said network device; and authenticate operations performed during said handling of said request using Common Information Model (CIM) data model access profile by utilizing one or more instances of at least one of CIM_Role and CIM_Privilege, via one or more instances of CIM_Identity class. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
23. A non-transitory computer readable medium having stored thereon, a computer program having at least one code section for network management, the at least one code section being executable by a computer, managed via Distributed Management Task Force (DMTF) protocols, for causing the computer to perform steps comprising:
-
receiving a request during opaque management data operations, wherein said request is handled in the computer using one or more instances of Common Information Model (CIM) based CIM_OpaqueManagementData class representing one or more corresponding storage components in the computer; and authenticating operations performed during said handling of said request using Common Information Model (CIM) data model access profiles by utilizing one or more instances of at least one of CIM_Role and CIM_Privilege, via one or more instances of CIM_Identity class. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification