SYSTEM AND METHOD FOR IMPLEMENTING DATA MIGRATION WHILE PRESERVING SECURITY POLICIES OF A SOURCE FILER
First Claim
Patent Images
1. A method for implementing a data migration, the method being implemented by one or more processors and comprising:
- implementing a data migration in which data is migrated from a source file system to a destination file system;
identifying individual clients who direct communications to the source file system while the data migration is in progress;
determining a set of credentials for each identified client;
issuing, on behalf of each identified client and from a location that is external to the source file system, a request to the source file system to access a reference file system object, the reference file system object being associated with a known permission level;
determining a permission level of each client based on a response from the source file system;
implementing a security policy of the source file system for each client when, during the data migration, data from the destination file system is used to provide a response to a file system operation originating from any of the plurality of clients.
1 Assignment
0 Petitions
Accused Products
Abstract
A data migration system in which security policies of a source file system are preserved, in an environment in which clients actively issue communications for the source filer while data is migrated to a destination file system.
31 Citations
20 Claims
-
1. A method for implementing a data migration, the method being implemented by one or more processors and comprising:
-
implementing a data migration in which data is migrated from a source file system to a destination file system; identifying individual clients who direct communications to the source file system while the data migration is in progress; determining a set of credentials for each identified client; issuing, on behalf of each identified client and from a location that is external to the source file system, a request to the source file system to access a reference file system object, the reference file system object being associated with a known permission level; determining a permission level of each client based on a response from the source file system; implementing a security policy of the source file system for each client when, during the data migration, data from the destination file system is used to provide a response to a file system operation originating from any of the plurality of clients. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A data migration system comprising:
-
a memory that stores a set of instructions; one or more processors that use the instructions to; migrate data from a source file system to a destination file system; identify individual clients who direct communications to the source file system while migrating the data; determine a set of credentials for each identified client; issue, on behalf of each identified client and from a location that is external to the source file system, a request to the source file system to access a reference file system object, the reference file system object being associated with a known permission level; determine a permission level of each client based on a response from the source file system; implement a security policy of the source file system for each client when, during the data migration, data from the destination file system is used to provide a response to a file system operation originating from any of the plurality of clients. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer-readable medium for implementing a data migration, the computer-readable medium storing instructions that, when executed by one or more processors, cause the one or more processors to perform operations that include:
-
implementing a data migration in which data is migrated from a source file system to a destination file system; identifying individual clients who direct communications to the source file system while the data migration is in progress; determining a set of credentials for each identified client; issuing, on behalf of each identified client and from a location that is external to the source file system, a request to the source file system to access a reference file system object, the reference file system object being associated with a known permission level; determining a permission level of each client based on a response from the source file system; implementing a security policy of the source file system for each client when, during the data migration, data from the destination file system is used to provide a response to a file system operation originating from any of the plurality of clients. - View Dependent Claims (18, 19, 20)
-
Specification