DYNAMICALLY CONFIGURING EXTENSIBLE ROLE BASED MANAGEABLE RESOURCES
First Claim
10. A computer program product for dynamically configuring software, the computer program product comprising a computer useable medium including a computer readable program, wherein the computer readable program upon being executed on a computer causes the computer to:
- detect a request to perform an action using an existing configuration of the software;
retrieve a security role for a user account associated with the request, said security role defining an extent of access to the existing configuration;
determine that the security role with the existing configuration is insufficient to perform the action; and
indicate additional software for potentially adding to the existing configuration, said additional software being capable of performing the action.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems are provided for dynamically altering the capabilities of a software application in response to a request from a user to perform an action in the application. Based on the user'"'"'s security role, the software application is reconfigured by either granting access to the user to an existing component of the application, or if no suitable component is available, adding an external vendor component to the software application which is suitable for performing the requested action.
130 Citations
19 Claims
-
10. A computer program product for dynamically configuring software, the computer program product comprising a computer useable medium including a computer readable program, wherein the computer readable program upon being executed on a computer causes the computer to:
-
detect a request to perform an action using an existing configuration of the software; retrieve a security role for a user account associated with the request, said security role defining an extent of access to the existing configuration; determine that the security role with the existing configuration is insufficient to perform the action; and indicate additional software for potentially adding to the existing configuration, said additional software being capable of performing the action. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A system for dynamically configuring software, the system comprising:
-
a memory configured to store an existing configuration of the software; logic for detecting a request to perform an action using the existing configuration; logic for retrieving a security role for a user account associated with the request, said security role defining an extent of access to the existing configuration; logic for determining that the security role with the existing configuration is insufficient to perform the action; and logic for indicating additional software for potentially adding to the existing configuration, said additional software being capable of performing the action. - View Dependent Claims (1, 2, 3, 4, 5, 6, 7, 8, 9, 18, 19)
-
-
18-1. The system of claim 17, wherein the logic for determining comprises means for connecting to a vendor website via the Internet.
Specification