SYSTEM AND METHOD FOR STORAGE OPERATION ACCESS SECURITY
First Claim
Patent Images
1. A method of creating users in a data management system, the method comprising:
- identifying at least one preexisting user created in a security system external to the data management system, wherein the identified at least one preexisting user has certain access rights defined by the security system;
creating a group within the data management system that associates one or more users with at least one access right for performing data management operations;
adding the identified at least one preexisting user to the created group within the data management system; and
querying the security system to determine the certain access rights of the identified at least one preexisting user.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and system for controlling access to stored data is provided. The storage access control system leverages a preexisting security infrastructure of a system to inform the proper access control that should be applied to data stored outside of its original location, such as a data backup. The storage access control system may place similar access control restrictions on the backup files that existed on the original files. In this way, the backed up data is given similar protection as that of the original data.
296 Citations
20 Claims
-
1. A method of creating users in a data management system, the method comprising:
-
identifying at least one preexisting user created in a security system external to the data management system, wherein the identified at least one preexisting user has certain access rights defined by the security system; creating a group within the data management system that associates one or more users with at least one access right for performing data management operations; adding the identified at least one preexisting user to the created group within the data management system; and querying the security system to determine the certain access rights of the identified at least one preexisting user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-readable medium containing instructions for controlling a computer system to migrate users from a preexisting security system to a data management system, by a method comprising:
-
receiving a request to create a new security entity in the data management system, wherein the new security entity associates at least one privilege for performing a storage management operation with the security entity; providing a list of one or more preexisting security entities defined by a security infrastructure external to the data management system; receiving a selection of at least one preexisting security entity defined by the external security infrastructure; and migrating the at least one selected preexisting security entity defined by the external security infrastructure to the new security entity in the storage management application. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A system for securing storage operations in a storage management system, wherein the storage management system interfaces with an external security component configured to store one or more external users and one or more access rights associated with the one or more external users, the system comprising:
-
a storage management application configured to store one or more storage management users and to perform storage operations on behalf of the one or more storage management users; a privileges migration component configured to interface with the external security component and with the storage management application, wherein the privileges migration component is further configured to determine the one or more privileges associated with selected external users stored by the external security component, create storage management users based on the selected external users, and apply at least one of the one or more permissions associated with the selected external users to the created storage management users. - View Dependent Claims (18, 19, 20)
-
Specification