摘要:
Described are embodiments directed to use of workflows for developing management agents that connect operations of a data source to a procedural API of an application. The management agents include a workflow that corresponds to an operation of a data source. The workflow includes a number of activities that make calls to the procedural API in order to perform the operation of the data source with respect to an object of the application. The use of workflows makes the development of management agents easier and more efficient.
摘要:
Requests for access to Web service resources are evaluated based on the type of request that is received. Requests are not granted unless sufficient proof of authentication is provided to grant that request. An authentication service evaluates one or more factors to determine whether or not to authenticate the client. After being authenticated by the authentication service, proof of authentication is provided to the Web service, which grants access to the Web service resource.
摘要:
Requests for access to Web service resources are evaluated based on the type of request that is received. Requests are not granted unless sufficient proof of authentication is provided to grant that request. An authentication service evaluates one or more factors to determine whether or not to authenticate the client. After being authenticated by the authentication service, proof of authentication is provided to the Web service, which grants access to the Web service resource.
摘要:
Defining a unified access management policy expression that unifies access control policy with events or workflows. Unified management policy information is stored. The unified management policy information defines permissions for access to resources together with events or workflows. A request is received to execute the one or more operations on one or more objects. The requested operation is verified against the unified management rules. Verifying includes performing a single retrieval, retrieving both the access control information and the events or workflows and calculating the applicability of the rule to the conditions represented by the request. Matching rules are applied, access control decisions performed and associated workflows are executed.
摘要:
Resources are partitioned via a virtual partitioning system to distribute the resources over a plurality of resource servers. A virtual partition table can be kept at each of a set of resource managers handling requests for resources in tandem. When a resource is requested, a virtual partition value is calculated algorithmically, and the value is mapped to a resource component via the virtual partition table. The resource component encapsulates information indicating on which of the resource servers the resource resides and can provide a component for performing operations on the resource even though the requester does not have information about where the resource resides. The resources can be repartitioned by modifying the virtual partition table, thus allowing the addition of additional resource servers to the system while the resources remain available. Additional resource types can be added without reengineering the system.
摘要:
The embodiments described herein generally relate to a method and system of injecting automated repeatable processes, or workflows, into software configuration management sequences. The benefits of such a system include the ability to delegate configurability change abilities to an IT administrator while still maintaining efficiency and management control over such changes. A request made by a system administrator to process configuration data may be subject to multiple phases of processing, such as, authentication, authorization, and action. A declarative mapping associates workflows, or meaningful repeatable processes, with the configuration process request criteria and processing phase. The mapping may be created by, or at the direction of, management through the application of the processing concept in API or UI. Upon a triggering event, e.g., receiving a configuration processing request, a stored mapping based on the attributes of the principal and request type may be consulted to determine the workflows which may then execute.
摘要:
A messaging data structure for accessing data in an identity-centric manner. An identity may be a user, a group of users, or an organization. Instead of data being maintained on an application-by-application basis, the data associated with a particular identity is stored by one or more data services accessible by many applications. The data is stored in accordance with a schema that is recognized by a number of different applications and the data service. The messaging data structure includes fields that identify the target data object to be operated upon using an identity field, a schema field, and an instance identifier field. In addition, the desired operation is specified. Thus, the target data object is operated on in an identity-centric manner.
摘要:
Enforcing access control based on resource state. A method includes receiving a request for an operation on one or more objects stored on computer readable media. One or more pre-operation states of the one or more objects are determined. One or more post-operation states of the one or more objects are determined. One or more access control rules are referenced. The access control rules control access to resources based on pre-operation state and post operation state. It can then be determined that the one or more access control rules allow the operation to succeed based on the one or more pre-operation states and the one or more post operation states. Based on determining that the one or more access control rules allow the operation to succeed, the operation is allowed to succeed.
摘要:
Several embodiments disclosed herein are directed to methods, computer program products, and systems configured to track operation dependencies. For example, in one embodiment, at a first entity, a first identifier corresponding to a first operation is accessed. For a second operation occurring as a result of the first operation, a second identifier is generated. A directed event including the first and second identifiers is emitted. The directed event is logged. The second identifier is sent to a second entity. An operation call for the second operation is also sent to the second entity. The second identifier is made available at the second entity for use in creating directed events for subsequent operations occurring as a result of the second operation.
摘要:
Resources are partitioned via a virtual partitioning system to distribute the resources over a plurality of resource servers. A virtual partition table can be kept at each of a set of resource managers handling requests for resources in tandem. When a resource is requested, a virtual partition value is calculated algorithmically, and the value is mapped to a resource component via the virtual partition table. The resource component encapsulates information indicating on which of the resource servers the resource resides and can provide a component for performing operations on the resource even though the requester does not have information about where the resource resides. The resources can be repartitioned by modifying the virtual partition table, thus allowing the addition of additional resource servers to the system while the resources remain available. Additional resource types can be added without reengineering the system.