Access policy management using identified roles
First Claim
1. A method comprising:
- identifying, by a computer system, an account associated with an identity of a user, wherein the account has an entitlement to access a resource of a target system;
determining, by the computer system, a set of access policies that are used to manage access to one or more resources of the target system;
determining, by the computer system, that the account is not managed by an access policy in the set of access policies;
identifying, by the computer system, a role associated with the identity;
determining, by the computer system, a first access policy in the set of access policies, the first access policy being determined as associated with the identified role;
determining a value of an attribute in access policy data corresponding to the first access policy, wherein the value of the attribute indicates whether the first access policy is to be associated with one or more accounts enabling access to the resource of the target system;
storing, by the computer system, data indicating an association between the account and the first access policy based on determining that the identified role is associated with the first access policy and based on the value of the attribute;
detecting a change in the first access policy, wherein the change is associated with the access to the resource of the target system; and
sending, by the computer system, a request to the target system, wherein the request causes the target system to configure the account to change the access to the resource based on the detected change in the first access policy.
1 Assignment
0 Petitions
Accused Products
Abstract
The present disclosure relates generally to techniques for automatically associating one or more access policies with an account. Specifically, these techniques enable one or more access policies to retroactively be associated with an account that is not associated with at least one access policy. By associating an access policy with an account, managing access to one or more resources provided by the account may be automated based on the associated access policy. An identity management system (IDM) system may manage access policies for determining access to resources of target systems. Accounts that are not associated with an access policies may be associated with the access policies governing access to resources identified by those accounts. Access to the resource(s) associated with those accounts may be updated based on the access granted by the access policies which are associated with those accounts.
-
Citations
18 Claims
-
1. A method comprising:
-
identifying, by a computer system, an account associated with an identity of a user, wherein the account has an entitlement to access a resource of a target system; determining, by the computer system, a set of access policies that are used to manage access to one or more resources of the target system; determining, by the computer system, that the account is not managed by an access policy in the set of access policies; identifying, by the computer system, a role associated with the identity; determining, by the computer system, a first access policy in the set of access policies, the first access policy being determined as associated with the identified role; determining a value of an attribute in access policy data corresponding to the first access policy, wherein the value of the attribute indicates whether the first access policy is to be associated with one or more accounts enabling access to the resource of the target system; storing, by the computer system, data indicating an association between the account and the first access policy based on determining that the identified role is associated with the first access policy and based on the value of the attribute; detecting a change in the first access policy, wherein the change is associated with the access to the resource of the target system; and sending, by the computer system, a request to the target system, wherein the request causes the target system to configure the account to change the access to the resource based on the detected change in the first access policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer system of an identity management system, the computer system comprising:
-
one or more processors; and a memory storing instructions that, when executed by the one or more processors, cause the one or more processors to; identify account data corresponding to an account associated with an identity of a user, wherein the account data has an entitlement to access a resource of a target system; identify policy profile data corresponding to a policy profile associated with the identity; determine whether the policy profile data indicates an association between an identifier corresponding to the target system and an access policy that grants access to the resource of the target system by a role associated with the identity; determine that the account is not managed by an access policy when the policy profile data does not indicate an association between the identifier and the access policy that manages access to the resource of the target system; determine a set of access policies that are used to manage access to the resource; identify from the set of access policies, a first access policy, the first access policy being determined as associated with the identified role; determine a value of an attribute in access policy data corresponding to the first access policy, wherein the value of the attribute indicates whether the first access policy is to be associated with one or more accounts enabling access to the resource of the target system; store data indicating an association between the account and the first access policy based on determining that the role is associated with the first access policy and based on the value of the attribute detect a change in the first access policy, wherein the change is associated with the access to the resource of the target system; and send a request to the target system, wherein the request causes the target system to configure the account to change the access to the resource based on the detected change in the first access policy. - View Dependent Claims (12, 13, 14)
-
-
15. A non-transitory computer-readable memory storing a set of instructions that are executable by one or more processors to:
-
identify an account associated with an identity of a user, wherein the account has an entitlement to access a resource of a target system; determine a set of access policies that are used to manage access to one or more resources of the target system; determine that the account is not managed by an access policy in the set of access policies; identify a role associated with the identity; determine a first access policy in the set of access policies, the first access policy being determined as associated with the identified role; determine a value of an attribute in the access policy data corresponding to the first access policy, wherein the attribute indicates whether the first access policy can be associated with accounts created for accessing the resource of the target system; store data indicating an association between the account and the first access policy based on determining that the identified role is associated with the first access policy and based on the value of the attribute; detect a change in the first access policy, wherein the change is associated with the access to the resource of the target system; and send a request to the target system, wherein the request causes the target system to configure the account to change the access to the resource based on the detected change in the first access policy. - View Dependent Claims (16, 17, 18)
-
Specification