ROLE-BASED ACCESS CONTROL FOR HIERARCHICAL RESOURCES OF A DATA MANAGEMENT SYSTEM

    公开(公告)号:US20240259386A1

    公开(公告)日:2024-08-01

    申请号:US18124553

    申请日:2023-03-21

    Applicant: Rubrik, Inc

    CPC classification number: H04L63/105

    Abstract: Methods, systems, and devices for data management are described. A data management system (DMS) may implement multi-tenancy role based access control (RBAC). In accordance with the multi-tenancy based RBAC, tenant organizations of a DMS may be assigned permissions (i.e., privileges) for a given data management cluster and/or computing objects within a data management cluster. Customized user roles (RBAC roles) may also be created for a given tenant. For example, a role may be defined based on a corresponding set of permissions (e.g., permissions associated with computing objects, data management clusters, or data sources associated with the tenant). A user within a tenant may be assigned a user role, which may be a customized role, and the effective permissions for the user may be based on which permissions of the user's assigned role are also within the scope of the tenant's permissions.

    ACCESS AUTHORIZATION FOR AUDIT INFORMATION IN A MULTI-TENANCY DATA MANAGEMENT SYSTEM

    公开(公告)号:US20240256518A1

    公开(公告)日:2024-08-01

    申请号:US18102326

    申请日:2023-01-27

    Applicant: Rubrik, Inc.

    CPC classification number: G06F16/2358 G06F16/288

    Abstract: Methods, systems, and devices for data management are described. A data management system (DMS) may provide backup services for multiple tenants. The DMS may receive a request to provide a first user of the DMS with audit information associated with an entity of the DMS. The DMS may identify context information for a log-in session associated with the request. The context information may include an identifier (ID) of a tenant associated with the request. The DMS may identify, based on the ID of the tenant, authorization information associated with the tenant. The authorization information may indicate that the tenant has access to a set of entities within a hierarchy associated with the DMS. The DMS may determine whether to output the requested audit information to the first user based on a hierarchical relationship, within the hierarchy, between the tenant and the entity.

    TECHNIQUES FOR DATA RETRIEVAL USING CRYPTOGRAPHIC SIGNATURES

    公开(公告)号:US20240187248A1

    公开(公告)日:2024-06-06

    申请号:US18415548

    申请日:2024-01-17

    Applicant: Rubrik, Inc.

    Abstract: A second data source may retrieve metadata for one or more versions of a set of versions of a file stored at the first data source. In some examples, the metadata for the one or more versions of the file may include at least an identifier of the file, a timestamp, and a cryptographic signature. In some examples, generation of the cryptographic signature may be based on the identifier of the file, the timestamp, and a cryptographic key. The second data source may identify a set of versions of the file that were uploaded from a trusted data source to the first data source based on a comparison of the cryptographic signature to a computed cryptographic signature. The second data source may then determine a targeted version of the file and retrieve the targeted version of the file from the first data source.

    Techniques for data retrieval using cryptographic signatures

    公开(公告)号:US11902452B2

    公开(公告)日:2024-02-13

    申请号:US17521661

    申请日:2021-11-08

    Applicant: Rubrik, Inc.

    Abstract: A second data source may retrieve metadata for one or more versions of a set of versions of a file stored at the first data source. In some examples, the metadata for the one or more versions of the file may include at least an identifier of the file, a timestamp, and a cryptographic signature. In some examples, generation of the cryptographic signature may be based on the identifier of the file, the timestamp, and a cryptographic key. The second data source may identify a set of versions of the file that were uploaded from a trusted data source to the first data source based on a comparison of the cryptographic signature to a computed cryptographic signature. The second data source may then determine a targeted version of the file and retrieve the targeted version of the file from the first data source.

    Federated login with centralized control

    公开(公告)号:US11722475B2

    公开(公告)日:2023-08-08

    申请号:US17387083

    申请日:2021-07-28

    Applicant: Rubrik, Inc.

    CPC classification number: H04L63/0815 H04L63/083 H04L63/101 H04L63/104

    Abstract: In some examples, a centralized management system comprises a central management console including a federated login system embedded in the centralized management system. The federated login system includes at least one processor configured to perform operations in a method of federated login and authorization allowing a user of the centralized management system to manage connected clusters or products without performing an individual cluster or product login.

    ACCESS AUTHORIZATION FOR REPORT DATA IN A MULTI-TENANCY DATA MANAGEMENT SYSTEM

    公开(公告)号:US20240256575A1

    公开(公告)日:2024-08-01

    申请号:US18102315

    申请日:2023-01-27

    Applicant: Rubrik, Inc.

    CPC classification number: G06F16/287 G06F16/282

    Abstract: Methods, systems, and devices for data management are described. A multi-tenancy data management system (DMS) may include multiple computing objects organized as a hierarchy of computing objects. The DMS may receive a request for report data associated with a first set of computing objects of the DMS. The DMS may identify context information for a log-in session associated with the request. The context information may include a tenant identifier (ID) for a tenant associated with the request. The DMS may apply a filter to the first set of computing objects. The filter may be based on a second set of computing objects to which the tenant has access within the hierarchy of computing objects. The DMS may output the report data for at least one computing object of the first set based on the at least one computing object being included in the second set of computing objects.

Patent Agency Ranking