Method and system for providing permissions management
First Claim
1. A method for managing permissions comprising:
- identifying, using a first computing system, one or more roles available to be associated, using a reference architecture pattern, with an individual or entity taking part in the development, and/or deployment, and/or operation of two or more computing system applications;
generating, using the first computing system, role data representing the identified roles;
identifying, using the first computing system, a plurality of reference tiers used to create, and/or deploy, and/or operate a computing system application using the reference architecture pattern, wherein the identified reference tiers include at least a development tier and a production tier;
generating, using the first computing system, reference tier data representing the identified reference tiers;
for each role represented by the role data, associating, using the first computing system, at least one permission with each reference tier represented in the reference tier data;
assigning, to an individual or entity of the first computing system, at least one of the roles represented by the role data;
receiving a task request associated with the individual or entity, the task request including a request to perform a computing task;
determining a risk level associated with a potential performance of the requested computing task, the determined risk level being at least partly based on operating characteristics associated with the requested computing task;
adjusting a baseline permission associated with the requested computing task based on the determined risk level;
determining whether the individual or entity is associated, through a role assigned to the individual or entity, with a permission meeting or exceeding the adjusted baseline permission;
performing, if the individual or entity is associated, through a role assigned to the individual or entity, with the permission meeting or exceeding the adjusted baseline permission, the requested computing task in accordance with the request;
denying the request, if the individual or entity is not associated, through a role assigned to the individual or entity, with the permission meeting or exceeding the adjusted baseline permission.
0 Assignments
0 Petitions
Accused Products
Abstract
Reference architecture pattern role data representing reference architecture pattern roles to be associated with entities taking part in the development, and/or deployment, and/or operation of an application is generated. Reference architecture pattern tier data representing reference architecture pattern tiers used to create, and/or deploy, and/or operate an application using the reference architecture pattern is generated. For each reference architecture pattern role at least one access and/or operational permission is associated with each reference architecture pattern tier. An entity is assigned one of the reference architecture pattern roles and for each reference architecture pattern tier, the entity is automatically provided the at least one access and/or operational permission associated with the reference architecture pattern role assigned to the entity. When a computing task is requested, permissions associated with the computing task are adjusted based on a risk level associated with performance of the requested computing task.
249 Citations
40 Claims
-
1. A method for managing permissions comprising:
-
identifying, using a first computing system, one or more roles available to be associated, using a reference architecture pattern, with an individual or entity taking part in the development, and/or deployment, and/or operation of two or more computing system applications; generating, using the first computing system, role data representing the identified roles; identifying, using the first computing system, a plurality of reference tiers used to create, and/or deploy, and/or operate a computing system application using the reference architecture pattern, wherein the identified reference tiers include at least a development tier and a production tier; generating, using the first computing system, reference tier data representing the identified reference tiers; for each role represented by the role data, associating, using the first computing system, at least one permission with each reference tier represented in the reference tier data; assigning, to an individual or entity of the first computing system, at least one of the roles represented by the role data; receiving a task request associated with the individual or entity, the task request including a request to perform a computing task; determining a risk level associated with a potential performance of the requested computing task, the determined risk level being at least partly based on operating characteristics associated with the requested computing task; adjusting a baseline permission associated with the requested computing task based on the determined risk level; determining whether the individual or entity is associated, through a role assigned to the individual or entity, with a permission meeting or exceeding the adjusted baseline permission; performing, if the individual or entity is associated, through a role assigned to the individual or entity, with the permission meeting or exceeding the adjusted baseline permission, the requested computing task in accordance with the request; denying the request, if the individual or entity is not associated, through a role assigned to the individual or entity, with the permission meeting or exceeding the adjusted baseline permission. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for managing permissions comprising:
-
identifying, using a first computing system, one or more roles available to be associated, using a reference architecture pattern, with an individual taking part in the development, and/or deployment, and/or operation of two or more computing system applications; generating, using the first computing system, role data representing the identified roles; identifying, using the first computing system, a plurality of reference tiers used to create, and/or deploy, and/or operate a computing system application using the reference architecture pattern, wherein the identified reference tiers include at least a development tier and a production tier; generating, using the first computing system, reference tier data representing the identified reference tiers; for each role represented by the role data, associating, using the first computing system, at least one permission with each reference tier represented in the reference tier data; assigning, to an individual of the first computing system, at least one of the roles represented by the role data; receiving a task request associated with the individual, the task request including a request to perform a computing task; determining a risk level associated with a potential performance of the requested computing task, the determined risk level being at least partly based on operating characteristics associated with the requested computing task; adjusting a permission associated with the individual based on the determined risk level; determining whether the adjusted permission of the individual meets or exceeds a required permission associated with the requested computing task; performing, if the adjusted permission of the individual meets or exceeds the required permission associated with the requested computing task, the requested computing task in accordance with the request; denying the request, if the adjusted permission of the individual fails to meet or exceed the required permission associated with the requested computing task. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A system for providing permissions management comprising:
-
an individual access system associated with an individual; two or more computing system applications to be created, and/or deployed, and/or operated by the individual; a reference architecture pattern associated with the computing system applications to be created, and/or deployed, and/or operated, the reference architecture pattern including; role data representing one or more roles to be assigned to individuals taking part in the development, and/or deployment, and/or operation of the computing system applications using the reference architecture pattern; reference tier data representing reference tiers used to create, and/or deploy, and/or operate the computing system applications using the reference architecture pattern; and permissions data representing at least one permission assigned to each role represented by the role data for each reference tier represented in the reference tier data; at least one processor; and at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by the at least one processor, perform a process for providing permissions management including; assigning, using the individual access system, the individual one of the reference architecture pattern roles represented by the role data; receiving a task request associated with the individual, the task request including a request to perform a computing task; determining a risk level associated with a potential performance of the requested computing task, the determined risk level being at least partly based on operating characteristics associated with the requested computing task; adjusting a permission associated with the individual based on the determined risk level; determining whether the adjusted permission of the individual meets or exceeds a required permission associated with the requested computing task; performing, if the adjusted permission of the individual meets or exceeds the required permission associated with the requested computing task, the requested computing task in accordance with the request; denying the request, if the adjusted permission of the individual fails to meet or exceed the required permission associated with the requested computing task. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
Specification