Method and system for modeling options for opaque management data for a user and/or an owner
First Claim
1. A method for network management, the method comprising:
- authenticating, in a system managed via one or more Distributed Management Task Force (DMTF) protocols, requested access operations performed during opaque management data operations in a network device according to one or more Common Information Model (CIM) data model access profiles by utilizing one or more instances of at least one of a CIM_Role and a CIM_Privilege via one or more instances of a CIM_Identity class, wherein the opaque management data operations are handled by the network device using one or more instances of a CIM based OpaqueManagementData class.
7 Assignments
0 Petitions
Accused Products
Abstract
Distributed Management Task Force (DMTF) management profiles, based on the Common Information Model (CIM) protocol, may be utilized to perform access authentication during opaque management data profile operations based on DMTF/CIM Role Based Authorization (RBA) profile and/or Simple Identity Management (SIM) profiles. Instances of CIM_Identity class may be utilized to enable validation of ownership and/or access rights, via instances of CIM_Role class and/or instances of CIM_Privilege class for a plurality of common users and/or applications. Quota related operations may be performed via “QuotaAffectsElement” associations between instances of CIM_Identity class and instances of the CIM_OpaqueManagementDataService class. The “QuotaAffectsElement” association may comprise “AllocationQuota” and/or “AllocatedBytes” properties to enable tracking and/or validating of quota related information within the opaque management data profile.
19 Citations
20 Claims
-
1. A method for network management, the method comprising:
authenticating, in a system managed via one or more Distributed Management Task Force (DMTF) protocols, requested access operations performed during opaque management data operations in a network device according to one or more Common Information Model (CIM) data model access profiles by utilizing one or more instances of at least one of a CIM_Role and a CIM_Privilege via one or more instances of a CIM_Identity class, wherein the opaque management data operations are handled by the network device using one or more instances of a CIM based OpaqueManagementData class. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
12. A system for network management, the system comprising:
one or more processors in a network device managed via a Distributed Management Task Force (DMTF) protocol, said one or more processor enable authentication of access operations performed during opaque management data operations in said network device via one or more Common Information Model (CIM) data model access profiles utilizing one or more instances of at least one of a CIM_Role and a CIM_Privilege via one or more instances of a CIM_Identity class, wherein the opaque management data operations are handled by the network device using one or more instances of a CIM based OpaqueManagementData class. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
19. A non-transitory computer-readable medium having a program that, when executed by processing circuitry in a system managed via one or more Distributed Management Task Force (DMTF) protocols, causes the processing circuitry to:
authenticate requested access operations performed during opaque management data operations in a network device according to one or more Common Information Model (CIM) data model access profiles by utilizing one or more instances of at least one of a CIM_Role and a CIM_Privilege via one or more instances of a CIM_Identity class, wherein the opaque management data operations are handled by the network device using one or more instances of a CIM based OpaqueManagementData class. - View Dependent Claims (20)
Specification