×

Role-based access control to computing resources in an inter-organizational community

  • US 9,769,177 B2
  • Filed: 06/11/2008
  • Issued: 09/19/2017
  • Est. Priority Date: 06/12/2007
  • Status: Active Grant
First Claim
Patent Images

1. A method for controlling access to a plurality of computing resources in a distributed computing environment, the distributed computing environment including an application role server and a plurality of organizations, each organization including at least one access control node and at least one computing resource, the method comprising:

  • responsive to receiving a certificate request from a computing resource requester belonging to a first organization of the plurality of organizations, the application role server conditionally, upon successfully authenticating the computing resource requester by querying an authentication server, issuing a digital certificate to the computing resource requester, wherein the digital certificate comprises computing resource requester identity information and role assignment information, to provide proof of identity and role assignment information for the computing resource to each organization represented in the plurality of computing resources in the distributed computing environment, wherein the at least one access control node of each organization separately authenticates the identity and role assignment information of the computing resource with the digital certificate before providing access to the at least one computing resource of the organization;

    responsive to a first access control node belonging to the first organization receiving a resource access request from the computing resource requester, wherein the resource access request comprises the digital certificate, the resource access request requesting access to a computing resource belonging to a second organization, the first access control node forwarding the resource access request to a second access control node belonging the to the second organization, wherein the computing resource belonging to the second organization does not belong to the first organization, and wherein the second access control node identifies one or more computing resources belonging to the second organization that the computing resource requester is allowed to access, based upon ascertaining access privileges of the computing resource requester, wherein the ascertaining access privileges includes querying a permission role assignment table, the permission role assignment table including at least one permission role assignment record specifying an access level corresponding to a combination of a resource identifier and a role;

    responsive to the second access control node identifying the one or more computing resources belonging to the second organization, providing, to the computing resource requester belonging to the first organization of the plurality of organizations, a prompt to choose a computing resource of the one or more resources belonging to the second organization, based on a resource description and parameters selected from the group consisting of;

    a service level, a resource usage price, and a resource access policy; and

    based on obtaining the computing resource chosen, granting to the computing resource requester access to the computing resource chosen of the one or more resources belonging to the second organization.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×