Intelligent system for enabling automated secondary authorization for service requests in an agile information technology environment
First Claim
Patent Images
1. An automated method for seeking and obtaining service request authorizations, comprising:
- receiving, from a requesting entity and at a service request authorization management system that is communicably coupled to one or more elements of a managed computer system, a service request for a resource of the managed computer system, said service request having been granted a primary authorization indicating at least that the requesting entity is authorized for the service request;
determining whether or not secondary authorization is necessary for the received service request; and
if no secondary authorization is necessary for the received service request, deeming the received service request authorized, otherwise, if secondary authorization is necessary for the received service request, then;
determining whether, prior to seeking secondary authorization, any additional pre-authorization conditions require completion;
if no additional pre-authorization conditions require completion, requesting secondary authorization for the received service request according to configured policies for and a current context of the managed computer system, otherwise, if additional pre-authorization conditions do require completion, postponing requesting secondary authorization for the received service request pending resolution of the additional pre-authorization conditions requiring completion and periodically determining whether or not the additional pre-authorization conditions have been completed such that if the additional pre-authorization conditions are not completed at least within a time limit, denying the service request, otherwise, if the additional pre-authorization conditions are completed at least within the time limit requesting the secondary authorization for the received service request according to then-configured policies for and a then-current context of the managed computer system;
if the requested secondary authorization is received, deeming the received service request authorized, pending resolution of any post-secondary authorization conditions, otherwise, if the requested secondary authorization is not received, denying the service request;
if the received service request is deemed authorized, determining whether or not any post-authorization conditions must be satisfied before a service request authorization can be returned in response to the received service request, and, if so, postponing providing the service request authorization pending resolution of the post-authorization conditions requiring completion, otherwise, issuing the secondary authorization for the received service request.
6 Assignments
0 Petitions
Accused Products
Abstract
A service request for a managed computer system is received and once a primary authorization for same has been given, a secondary authorization management system (SAMS) determines whether or not the service request requires secondary authorization. This determination is made according to a context of the managed computer system and an authorization profile for the received service request. If needed, the SAMS resolves the secondary authorization request and returns the resolution decision.
-
Citations
12 Claims
-
1. An automated method for seeking and obtaining service request authorizations, comprising:
-
receiving, from a requesting entity and at a service request authorization management system that is communicably coupled to one or more elements of a managed computer system, a service request for a resource of the managed computer system, said service request having been granted a primary authorization indicating at least that the requesting entity is authorized for the service request; determining whether or not secondary authorization is necessary for the received service request; and
if no secondary authorization is necessary for the received service request, deeming the received service request authorized, otherwise, if secondary authorization is necessary for the received service request, then;determining whether, prior to seeking secondary authorization, any additional pre-authorization conditions require completion; if no additional pre-authorization conditions require completion, requesting secondary authorization for the received service request according to configured policies for and a current context of the managed computer system, otherwise, if additional pre-authorization conditions do require completion, postponing requesting secondary authorization for the received service request pending resolution of the additional pre-authorization conditions requiring completion and periodically determining whether or not the additional pre-authorization conditions have been completed such that if the additional pre-authorization conditions are not completed at least within a time limit, denying the service request, otherwise, if the additional pre-authorization conditions are completed at least within the time limit requesting the secondary authorization for the received service request according to then-configured policies for and a then-current context of the managed computer system; if the requested secondary authorization is received, deeming the received service request authorized, pending resolution of any post-secondary authorization conditions, otherwise, if the requested secondary authorization is not received, denying the service request; if the received service request is deemed authorized, determining whether or not any post-authorization conditions must be satisfied before a service request authorization can be returned in response to the received service request, and, if so, postponing providing the service request authorization pending resolution of the post-authorization conditions requiring completion, otherwise, issuing the secondary authorization for the received service request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
Specification