×

Security migration in a business intelligence environment

  • US 9,660,973 B2
  • Filed: 07/25/2016
  • Issued: 05/23/2017
  • Est. Priority Date: 03/15/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method comprising:

  • receiving a request from a first user for access, as a second user, to a business intelligence environment, wherein the first user provides first user identification information associated with the first user and second user identification information associated with the second user;

    determining whether to allow the first user to access the business intelligence environment as the second user based at least on an access listing, wherein the access listing includes;

    user identification information for one or more authorized users authorized to access the business intelligence environment as another user; and

    at least one of user identities, user identification information, roles, or groups of users on which one or more of the authorized users is authorized to request access;

    determining a local identifier of the second user if the determination is made to allow the first user access as the second user; and

    allowing the first user access to the business intelligence environment as the second user if the determination is made to allow the access, wherein the access in the business intelligence environment is enabled based on the determined local identifier of the second user.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×