摘要:
Provided are methods and systems for integrating the access controls of computer resources into a namespace or domain. For a remote user, a computer network or system is a namespace represented by a URL. In order to enforce the access controls of the computer network being accesses, a remote user is impersonated by a server of the computer system such that access requests to the resources of a system are made by the server in the security context of the remote user. By impersonating the remote user, the actual rights of the remote user are being presented to the access controls rather than the rights of the server. In this manner, the access control of the system can be enforced directly on the remote user and the access control is effectively extended to the namespace.
摘要:
The present invention provides systems and methods for detecting and resolving resource conflicts. A resource conflict exists when a client version of a resource differs from a server version of the same resource. A resource conflict primarily arises when a client attempts to upload an altered resource to a server where the server version of the resource is no longer equivalent to the version that the client originally downloaded. The conflict is detected by the server and conflict resolution is initiated. The server is the first level of conflict resolution. The server can compare the conflicting versions of the resource to determine if the changes are not actually conflicting. If the server can resolve the conflict, it does and returns a resource tag to the client. The second level of conflict resolution is at the client. The client typically has knowledge of a schema related to the resource which may enable the client to resolve conflicts that the server could not. If the neither the server of the client can resolve the conflict, an end user is needed to resolve the conflict. After the conflict is resolved, it is uploaded to the server and the client receives a new resource tag.
摘要:
Systems and methods for synchronizing multiple copies of data in a network environment that includes servers and clients so that incremental changes made to one copy of the data can be identified, transferred, and incorporated into all other copies of the data. The synchronization can be accomplished regardless of whether modifications to the data have been made by a client while the client is in an on-line or off-line mode of operation. The clients cache data locally as data are modified and downloaded. The caching enables the clients to access the data and allows the synchronization to be performed without transmitting a particular version more than once between a client and a server. Such elimination of redundant data transmission results in an efficient use of time and network bandwidth.
摘要:
Embodiments provide application and/or resource access control features of an online computing environment, but are not so limited. In an embodiment, a computer-implemented method provides access control features for an online application environment based in part on the use of a number of directory service instances isolated from direct customer access and deployed in a defined datacenter architecture. In one embodiment, a computing environment uses web-based access control features and a number of directory service instances having organizational units and corresponding mappings to maintain a support infrastructure as part of providing features of online application services to customers. Other embodiments are included and available.
摘要:
Systems and methods for synchronizing multiple copies of data in a network environment that includes servers and clients so that incremental changes made to one copy of the data can be identified, transferred, and incorporated into all other copies of the data. The synchronization can be accomplished regardless of whether modifications to the data have been made by a client while the client is in an on-line or off-line mode of operation. The clients cache data locally as data are modified and downloaded. The caching enables the clients to access the data and allows the synchronization to be performed without transmitting a particular version more than once between a client and a server. Such elimination of redundant data transmission results in an efficient use of time and network bandwidth.
摘要:
Described is a system and method for controlling user interface (UI) properties with data. An application is separated into independent parts, a logic portion and a UI portion. The logic portion manipulates data values within the application. The UI portion is responsible for displaying UI properties. A binding specification describes a relationship between the UI property and the data value. The binding specification is used by system level code to determine the manner in which it is notified when the data value undergoes a change and the manner in which it directs the UI portion to reflect the change in the UI property. The binding specification identifies a source data item, a path to the data value in the source data item, a target UI element, and the UI property on the target UI element. The binding may be specified using code or markup language.
摘要:
Embodiments provide application and/or resource access control features of an online computing environment, but are not so limited. In an embodiment, a computer-implemented method provides access control features for an online application environment based in part on the use of a number of directory service instances isolated from direct customer access and deployed in a defined datacenter architecture. In one embodiment, a computing environment uses web-based access control features and a number of directory service instances having organizational units and corresponding mappings to maintain a support infrastructure as part of providing features of online application services to customers. Other embodiments are included and available.
摘要:
Systems and methods for synchronizing multiple copies of data in a network environment that includes servers and clients so that incremental changes made to one copy of the data can be identified, transferred, and incorporated into all other copies of the data. The synchronization can be accomplished regardless of whether modifications to the data have been made by a client while the client is in an on-line or off-line mode of operation. The clients cache data locally as data are modified and downloaded. The caching enables the clients to access the data and allows the synchronization to be performed without transmitting a particular version more than once between a client and a server. Such elimination of redundant data transmission results in an efficient use of time and network bandwidth.
摘要:
Systems and methods for synchronizing multiple copies of data in a network environment that includes servers and clients so that incremental changes made to one copy of the data can be identified, transferred, and incorporated into all other copies of the data. The synchronization can be accomplished regardless of whether modifications to the data have been made by a client while the client is in an on-line or off-line mode of operation. The clients cache data locally as data are modified and downloaded. The caching enables the clients to access the data and allows the synchronization to be performed without transmitting a particular version more than once between a client and a server. Such elimination of redundant data transmission results in an efficient use of time and network bandwidth.
摘要:
Provided is a method for locking computer resources and for accessing locked computer resources. Resources being used by remote users can be locked such that other remote users and local users have restricted access to those resources. The remote user provides the resource to be locked, the type of lock to place on the resource and the duration of the lock. If the resource is available and the user has the proper credentials and the proper access permissions, the resource is locked and a lock token is provided to the remote user. A resource handle is also provided to the remote user. Once a resource has been locked, the lock token must be provided and verified before access to the resource is granted. Because the locks can be discovered, a security token of the owner of the lock is associated with the lock token. The security token of the remote user must also match the security token associated with the stored lock token before access to the resource is granted. The locks can either expire or be refreshed. If a lock expires, it is removed from memory and the resource handle is released. Also, particular user agents are given a fixed lock token in order to access system resources. These particular agents view the resource as locked, but the non-unique fixed lock token indicates to the system that the resource is not in fact locked. Other particular agents are given an extended timeout period to account for real time latencies of the computer system.