Access control for event data stored in cloud-based data stores based on inherited roles
First Claim
Patent Images
1. A method, comprising:
- receiving, by a cloud-based access control server, a request from a first user to access a set of time stamped, searchable events, the set of time stamped, searchable events among a plurality of sets of time stamped, searchable events stored in a plurality of cloud-based data stores, each of the time stamped, searchable events is parsed from raw data collected from one or more data sources, the raw data reflects activity in an information technology system and is produced by a component of the information technology system;
determining, by the cloud-based access control server, that the first user has an inherited role from a second user for the set of time stamped, searchable events;
determining, by the cloud-based access control server, whether the first user has permission to access the set of time stamped, searchable events based on the inherited role determined for the first user;
allowing, by the cloud-based access control server, the first user to access the set of time stamped, searchable events to perform operations on the set of time stamped, searchable events when the inherited role indicates that the first user has permission to access the set of time stamped, searchable events;
wherein the method is performed by one or more computing devices.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments are directed towards a system and method for a cloud-based front end that may abstract and enable access to the underlying cloud-hosted elements and objects that may be part of a multi-tenant application, such as a search application. Search objects may be employed to access indexed objects. An amount of indexed data accessible to a user may be based on an index storage limit selected by the user, such that data that exceeds the index storage limit may continue to be indexed. Also, one or more projects can be elastically scaled for a user to provide resources that may meet the specific needs of each project.
-
Citations
18 Claims
-
1. A method, comprising:
-
receiving, by a cloud-based access control server, a request from a first user to access a set of time stamped, searchable events, the set of time stamped, searchable events among a plurality of sets of time stamped, searchable events stored in a plurality of cloud-based data stores, each of the time stamped, searchable events is parsed from raw data collected from one or more data sources, the raw data reflects activity in an information technology system and is produced by a component of the information technology system; determining, by the cloud-based access control server, that the first user has an inherited role from a second user for the set of time stamped, searchable events; determining, by the cloud-based access control server, whether the first user has permission to access the set of time stamped, searchable events based on the inherited role determined for the first user; allowing, by the cloud-based access control server, the first user to access the set of time stamped, searchable events to perform operations on the set of time stamped, searchable events when the inherited role indicates that the first user has permission to access the set of time stamped, searchable events; wherein the method is performed by one or more computing devices. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. One or more non-transitory computer-readable storage media, storing one or more sequences of instructions, which when executed by one or more processors cause performance of:
-
receiving, by a cloud-based access control server, a request from a first user to access a set of time stamped, searchable events, the set of time stamped, searchable events among a plurality of sets of time stamped, searchable events stored in a plurality of cloud-based data stores, each of the time stamped, searchable events is parsed from raw data collected from one or more data sources, the raw data reflects activity in an information technology system and is produced by a component of the information technology system; determining, by the cloud-based access control server, that the first user has an inherited role from a second user for the set of time stamped, searchable events; determining, by the cloud-based access control server, whether the first user has permission to access the set of time stamped, searchable events based on the inherited role determined for the first user; allowing, by the cloud-based access control server, the first user to access the set of time stamped, searchable events to perform operations on the set of time stamped, searchable events when the inherited role indicates that the first user has permission to access the set of time stamped, searchable events. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. An apparatus, comprising:
-
a user input receiver, at a cloud-based access control server, implemented at least partially in hardware, that receives a request from a first user to access a set of time stamped, searchable events, the set of time stamped, searchable events among a plurality of sets of time stamped, searchable events stored in a plurality of cloud-based data stores, each of the time stamped, searchable events is parsed from raw data collected from one or more data sources, the raw data reflects activity in an information technology system and is produced by a component of the information technology system; a role processor, at the cloud-based access control server, implemented at least partially in hardware, that determines that the first user has an inherited role from a second user for the set of time stamped, searchable events; wherein the role processor determines whether the first user has permission to access the set of time stamped, searchable events based on the inherited role determined for the first user; wherein the role processor allows the first user to access the set of time stamped, searchable events to perform operations on the set of time stamped, searchable events when the inherited role indicates that the first user has permission to access the set of time stamped, searchable events. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification