RENEWAL OF USER IDENTIFICATION INFORMATION
    11.
    发明申请
    RENEWAL OF USER IDENTIFICATION INFORMATION 有权
    更新用户识别信息

    公开(公告)号:US20130007856A1

    公开(公告)日:2013-01-03

    申请号:US13172699

    申请日:2011-06-29

    IPC分类号: G06F17/00

    CPC分类号: G06F21/33

    摘要: A method, data processing system, and computer program product for managing user identification information. A determination is made whether an instance of security information in use on the first application server and referenced by a token that has expired was generated by an application server compatible with a first application server in response to receiving the token. A determination is made whether the instance of the security information is managed by a set of rules for a group of users of the first application server. A determination is made whether a user identifier from the token is authorized to access the first application server. The token is renewed in response to determining that the user identifier is authorized to access the first application server.

    摘要翻译: 一种用于管理用户识别信息的方法,数据处理系统和计算机程序产品。 确定在与第一应用服务器兼容的应用服务器响应于接收到令牌而生成了在第一应用服务器上使用并被具有过期的令牌引用的安全信息的实例是否由与第一应用服务器兼容的应用服务器生成。 确定安全信息的实例是否由第一应用服务器的用户组的一组规则管理。 确定来自令牌的用户标识符是否被授权访问第一应用服务器。 响应于确定用户标识符被授权访问第一应用服务器而更新令牌。

    System and method for merging security constraints when using security annotations
    12.
    发明申请
    System and method for merging security constraints when using security annotations 有权
    使用安全注解时合并安全约束的系统和方法

    公开(公告)号:US20120324528A1

    公开(公告)日:2012-12-20

    申请号:US13162744

    申请日:2011-06-17

    IPC分类号: G06F17/00

    摘要: A method is described for merging security constraints associated with an application when using security annotations. The application comprises one or more servlets, such as a Java servlet. During application deployment, a list of role names is generated by merging static security constraints, for example, identified in a deployment descriptor, and in a static security annotation that defines a list containing the names of authorized roles for a servlet. Later, during application runtime in an application server, security constraints are retrieved from a plurality of sources, including both dynamic and static security annotations. Using the list of role names and the security constraints retrieved, a set of merged security constraints having a defined and proper order of precedence is generated. In particular, preferably one or more dynamic security annotations are first merged with one or more static security annotations to generate a set of runtime constraints. The security constraints from the deployment descriptor are then merged with the set of runtime constraints and the list of roles to generate the set of merged security constraints. These merged security constraints are then applied to process a request being handled by the application server.

    摘要翻译: 描述了一种用于在使用安全注释时合并与应用程序相关联的安全约束的方法。 应用程序包含一个或多个servlet,例如Java servlet。 在应用程序部署期间,通过合并静态安全约束(例如在部署描述符中标识的静态安全约束)和定义包含servlet授权角色名称的静态安全注释来生成角色名称列表。 之后,在应用程序服务器的应用程序运行期间,从多个源(包括动态和静态安全注释)检索安全约束。 使用角色名称列表和检索到的安全约束,生成一组具有定义和正确优先顺序的合并安全约束。 特别地,优选地,首先将一个或多个动态安全注释与一个或多个静态安全注释合并以生成一组运行时约束。 然后,部署描述符的安全约束与运行时约束集合和角色列表合并,以生成一组合并的安全约束。 然后将这些合并的安全约束应用于处理由应用程序服务器处理的请求。

    Security Role Testing Using an Embeddable Container and Properties Object
    13.
    发明申请
    Security Role Testing Using an Embeddable Container and Properties Object 有权
    使用可嵌入容器和属性对象的安全角色测试

    公开(公告)号:US20120222015A1

    公开(公告)日:2012-08-30

    申请号:US13034907

    申请日:2011-02-25

    IPC分类号: G06F9/44

    CPC分类号: G06F11/3688 G06F21/6218

    摘要: Mechanisms are provided for performing security role definition testing. An application is received in a container of a runtime environment of the data processing system. The application has methods and security role definitions associated with the methods. A properties object, which specifies a user identifier to security role mapping, is received in the container. A test application is executed, in the container, by the processor, on an execution of the methods of the application based on the user identifier to security role mapping and the security role definitions. The test application tests an operation of the application with regard to the security role definitions. A result of the execution of the test application on the execution of the methods of the application is then output.

    摘要翻译: 提供了执行安全角色定义测试的机制。 在数据处理系统的运行时环境的容器中接收应用程序。 该应用程序具有与方法相关联的方法和安全角色定义。 在容器中收到一个属性对象,它指定安全角色映射的用户标识符。 测试应用程序在容器中由处理器根据用户标识符对安全角色映射和安全角色定义执行应用程序的方法。 测试应用程序测试应用程序对安全角色定义的操作。 然后输出在执行应用程序的方法时执行测试应用程序的结果。

    FLEXIBLY ASSIGNING SECURITY CONFIGURATIONS TO APPLICATIONS
    14.
    发明申请
    FLEXIBLY ASSIGNING SECURITY CONFIGURATIONS TO APPLICATIONS 有权
    灵活地将安全配置分配给应用程序

    公开(公告)号:US20120198515A1

    公开(公告)日:2012-08-02

    申请号:US13413631

    申请日:2012-03-06

    IPC分类号: G06F21/00

    CPC分类号: H04L63/104 G06F21/335

    摘要: A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.

    摘要翻译: 在说明性实施例中提供了用于将安全配置灵活地分配给应用的方法,系统和计算机可用程序产品。 实施例确定形成第一确定,识别应用的第一标识符是否映射到安全配置。 该实施例通过确定标识组的第二标识符是否映射到安全配置来确定应用程序是否参与组,确定第二确定。 如果第一和第二确定中的任一个为真,则该实施例将安全配置分配给应用程序。 如果第一和第二确定是假的,则该实施例使用第一策略的确定来将安全配置分配给应用。

    Flexibly assigning security configurations to applications
    15.
    发明授权
    Flexibly assigning security configurations to applications 有权
    灵活地将安全配置分配给应用程序

    公开(公告)号:US08230478B2

    公开(公告)日:2012-07-24

    申请号:US12548767

    申请日:2009-08-27

    IPC分类号: H04L9/00 H04L9/32

    CPC分类号: H04L63/104 G06F21/335

    摘要: A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.

    摘要翻译: 在说明性实施例中提供了用于将安全配置灵活地分配给应用的方法,系统和计算机可用程序产品。 实施例确定形成第一确定,识别应用的第一标识符是否映射到安全配置。 该实施例通过确定标识组的第二标识符是否映射到安全配置来确定应用程序是否参与组,确定第二确定。 如果第一和第二确定中的任一个为真,则该实施例将安全配置分配给应用程序。 如果第一和第二确定是假的,则该实施例使用第一策略的确定来将安全配置分配给应用。

    FLEXIBLY ASSIGNING SECURITY CONFIGURATIONS TO APPLICATIONS
    16.
    发明申请
    FLEXIBLY ASSIGNING SECURITY CONFIGURATIONS TO APPLICATIONS 有权
    灵活地将安全配置分配给应用程序

    公开(公告)号:US20110055926A1

    公开(公告)日:2011-03-03

    申请号:US12548767

    申请日:2009-08-27

    IPC分类号: G06F21/00

    CPC分类号: H04L63/104 G06F21/335

    摘要: A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.

    摘要翻译: 在说明性实施例中提供了用于将安全配置灵活地分配给应用的方法,系统和计算机可用程序产品。 实施例确定形成第一确定,识别应用的第一标识符是否映射到安全配置。 该实施例通过确定标识组的第二标识符是否映射到安全配置来确定应用程序是否参与组,确定第二确定。 如果第一和第二确定中的任一个为真,则该实施例将安全配置分配给应用程序。 如果第一和第二确定是假的,则该实施例使用第一策略的确定来将安全配置分配给应用。