Computer implemented methods and apparatus for managing permission sets and validating user assignments
First Claim
Patent Images
1. A method comprising:
- receiving, at one or more servers, a first request from an authorized administrator associated with a third party application to create a new permission set including one or more permissions for accessing one or more computing resources of a multi-tenant database environment implemented using a database system, the multi-tenant database environment having a plurality of tenant organizations, the new permission set having one or more permissions for accessing resources associated with the third party application, the third party application being one of a plurality of applications being implemented in the multi-tenant database environment;
creating the new permission set;
storing the new permission set in a database of the database system;
receiving, at one or more servers, a second request to assign the new permission set to a first user associated with a first one of the plurality of tenant organizations, the first user being associated with a first user constraint defined by a first one of a plurality of user licenses available to users associated with the first tenant organization, the first user constraint defining a first group of permissions permitted to be assigned to the first user, the first user constraint being applied to other users associated with other tenant organizations of the plurality of tenant organizations;
responsive to receiving the second request, automatically determining that the one or more permissions in the new permission set do not violate the first user constraint by determining that each of the one or more permissions of the new permission set exists in the first group of permissions defined by the first user constraint; and
responsive to determining that the one or more permissions in the new permission set do not violate the first user constraint, automatically assigning the new permission set to the first user.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are methods, apparatus, systems, and computer-readable storage media for modifying permission sets and validating permission set assignments to users. In some implementations, a computing device receives a request to create a permission set containing one or more permissions and assign the permission set to a first user. The first user is associated with a first user constraint that defines a first group of permissions available to the first user. The computing device may determine that the permission set to be assigned to the first user does not violate the first user constraint, and may assign the permission set to the first user.
-
Citations
17 Claims
-
1. A method comprising:
-
receiving, at one or more servers, a first request from an authorized administrator associated with a third party application to create a new permission set including one or more permissions for accessing one or more computing resources of a multi-tenant database environment implemented using a database system, the multi-tenant database environment having a plurality of tenant organizations, the new permission set having one or more permissions for accessing resources associated with the third party application, the third party application being one of a plurality of applications being implemented in the multi-tenant database environment; creating the new permission set; storing the new permission set in a database of the database system; receiving, at one or more servers, a second request to assign the new permission set to a first user associated with a first one of the plurality of tenant organizations, the first user being associated with a first user constraint defined by a first one of a plurality of user licenses available to users associated with the first tenant organization, the first user constraint defining a first group of permissions permitted to be assigned to the first user, the first user constraint being applied to other users associated with other tenant organizations of the plurality of tenant organizations; responsive to receiving the second request, automatically determining that the one or more permissions in the new permission set do not violate the first user constraint by determining that each of the one or more permissions of the new permission set exists in the first group of permissions defined by the first user constraint; and responsive to determining that the one or more permissions in the new permission set do not violate the first user constraint, automatically assigning the new permission set to the first user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. One or more computing devices comprising:
one or more physical processors operable to execute one or more instructions to cause; creating, responsive to a first request from an authorized administrator associated with a third party application, a new permission set including one or more permissions for accessing one or more computing resources of a multi-tenant database environment implemented using a database system, the multi-tenant database environment having a plurality of tenant organizations, the new permission set having one or more permissions for accessing resources associated with the third party application, the third party application being one of a plurality of applications being implemented in the multi-tenant database environment; storing the new permission set in a database of the database system; processing a second request to assign the new permission set to a first user associated with a first one of the plurality of tenant organizations, the first user being associated with a first user constraint defined by a first one of a plurality of user licenses available to users associated with the first tenant organization, the first user constraint defining a first group of permissions permitted to be assigned to the first user, the first user constraint being applied to other users associated with other tenant organizations of the plurality of tenant organizations; automatically determining, responsive to processing the second request, that the one or more permissions in the new permission set do not violate the first user constraint by determining that each of the one or more permissions of the new permission set exists in the first group of permissions defined by the first user constraint; and automatically assigning, responsive to determining that the one or more permissions in the new permission set do not violate the first user constraint, the new permission set to the first user.
-
15. A non-transitory computer-readable storage medium storing instructions executable by a computing device to perform a method comprising:
-
receiving, at one or more servers, a first request from an authorized administrator associated with a third party application to create a new permission set including one or more permissions for accessing one or more computing resources of a multi-tenant database environment implemented using a database system, the multi-tenant database environment having a plurality of tenant organizations, the new permission set having one or more permissions for accessing resources associated with the third party application, the third party application being one of a plurality of applications being implemented in the multi-tenant database environment; creating the new permission set; storing the new permission set in a database of the database system; receiving, at one or more servers, a second request to assign the new permission set to a first user associated with a first one of the plurality of tenant organizations, the first user being associated with a first user constraint defined by a first one of a plurality of user licenses available to users associated with the first tenant organization, the first user constraint defining a first group of permissions permitted to be assigned to the first user, the first user constraint being applied to other users associated with other tenant organizations of the plurality of tenant organizations; responsive to receiving the second request, automatically determining that the one or more permissions in the new permission set do not violate the first user constraint by determining that each of the one or more permissions of the new permission set exists in the first group of permissions defined by the first user constraint; and responsive to determining that the one or more permissions in the new permission set do not violate the first user constraint, automatically assigning the new permission set to the first user.
-
-
16. A method comprising:
-
receiving, at one or more servers, a first request from an authorized administrator associated with a third party application to assign a permission set to a first user associated with a first one of a plurality of tenant organizations of a multi-tenant database environment implemented using a database system, the permission set including one or more permissions for accessing one or more computing resources of the multi-tenant database environment, the new permission set having one or more permissions for accessing resources associated with the third party application, the third party application being one of a plurality of applications being implemented in the multi-tenant database environment, the first user being associated with a first user constraint defined by a first one of a plurality of user licenses available to users associated with the first tenant organization, the first user constraint defining a first group of permissions permitted to be assigned to the first user, the first user constraint being applied to other users associated with other tenant organizations of the plurality of tenant organizations; responsive to receiving the first request, automatically determining that the one or more permissions in the permission set do not violate the first user constraint by determining that each of the one or more permissions of the new permission set exists in the first group of permissions defined by the first user constraint; and responsive to determining that the one or more permissions in the permission set do not violate the first user constraint, automatically assigning the permission set to the first user. - View Dependent Claims (17)
-
Specification