Invention Grant
US08572694B2 Integrated security roles 有权
集成安全角色

Integrated security roles
Abstract:
An approach to handling integrated security roles is presented. An upstream application includes one or more role-mapping requirements that correspond to an upstream security role and a downstream security role. The upstream security role is expanded by adding an upstream security role identifier in a downstream application's role-mapping table or by adding upstream user-to-role mappings to a downstream application's role-mapping table. When an upstream security role is expanded, a user assigned to the upstream security role automatically has access to role-mapped downstream applications.
Public/Granted literature
Information query
Patent Agency Ranking
0/0