Please download the dossier by clicking on the dossier button x
×

Method and system for assessing cumulative access entitlements of an entity in a system

  • US 8,429,708 B1
  • Filed: 06/22/2007
  • Issued: 04/23/2013
  • Est. Priority Date: 06/23/2006
  • Status: Active Grant
First Claim
Patent Images

1. A method, performed by a computer, with regard to analyzing cumulative entitlements in an information system including a plurality of users, each user having a corresponding user account, the information system including a plurality of security groups, each security group including a subset of the users or other security groups, and wherein the information system includes a plurality of securable assets, each securable asset corresponding to an access control list, each access control list including access control entries that identify at least one security group or user account having access to the corresponding securable asset, wherein the securable assets include the user accounts, the method comprising:

  • in the computer, determining which security groups directly include or transitively include a given one of the users;

    in the computer, determining a set of access control lists that identify any of the security groups or the given user;

    in the computer, determining an effective system-level access granted to the given user in view of the access control entries in the set of access control lists, wherein determining the effective system-level access includes resolving any access conflicts as a function of operating system rules or according to access check methodologies, wherein an access check methodology is defined as the process by which access control mechanisms of the information system protect the securable assets, by subjecting a user'"'"'s access request to a given securable asset, to an access check that processes the user'"'"'s security affiliations as defined by the security groups and the access control list corresponding to the given securable asset to determine whether to allow the access requested; and

    in the computer, mapping the effective system-level access granted to the given user into administrative tasks to determine a cumulative access entitlement set for the given user, wherein the cumulative access entitlement set includes administrative tasks that the given user is entitled to perform with regard to the securable assets corresponding to the set of access control lists.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×