摘要:
A method and apparatus for providing an extensible grouping mechanism for security applications for use in a computer system. Groups may be established and maintained by non-system administrators and used to control actions that are taken with respect to objects, such as files and other resources. The groups and associated security functions may be implemented across a plurality of different software products and optionally integrated into an existing security mechanism maintained by system administrators. Software products used in the system may be arranged to request authorization to perform requested actions with respect to objects access to which is not controlled by a systems administrator, and/or provide information specifying an object or object type and actions that are performable with respect to the object or object type by the respective software product.
摘要:
A method and apparatus for providing an extensible grouping mechanism for security applications for use in a computer system. Groups may be established and maintained by non-system administrators and used to control actions that are taken with respect to objects, such as files and other resources. The groups and associated security functions may be implemented across a plurality of different software products and optionally integrated into an existing security mechanism maintained by system administrators. Software products used in the system may be arranged to request authorization to perform requested actions with respect to objects access to which is not controlled by a systems administrator. Permission information used to determine the authorization for a user to perform a requested action may be stored for a plurality of software products in a common location.
摘要:
A method and apparatus for providing an extensible grouping mechanism for security applications for use in a computer system. Groups may be established and maintained by non-system administrators and used to control actions that are taken with respect to objects, such as files and other resources. The groups and associated security functions may be implemented across a plurality of different software products and optionally integrated into an existing security mechanism maintained by system administrators. Software products used in the system may be arranged to request authorization to perform requested actions with respect to objects access to which is not controlled by a systems administrator.
摘要:
Architecture that facilitates interfacing non-integrated applications. The disclosed architecture comprises a set of APIs and conventions used to enable integration between tools that were not previously architected to be integrated. This provides the basis for server-based partner integration and client integration of tools, and can facilitate the foundation for building a third-party ecosystem. In support thereof, an artifact provider API exposes artifacts of a first application, and an artifact consumer API exposes a reference of a second application, which reference is associated with a link to one at least one of the artifacts of the artifact provider.
摘要:
The present invention provides a system and method for unrelated tools to categorized elements they control according to a common centrally managed classification scheme. The invention also provides a mechanism for storing, retrieving, and modifying classifying information. Users of unrelated tools that employ the subject invention see a single and consisted user interface.
摘要:
An integrated source code control and work item tracking tool is capable of establishing a relationship between work definition and work implementation. Once established, a more holistic view of the development process can be attained, and specific tasks can be easily accomplished. Tasks that be may accomplished using an integrated source code control and work item tracking tool include: automated generation of a list of work items that are completed in a new build of the system; automated updates of work items that are included in a build so that the work item details reflect the build in which it became available; automated transitioning of work items through a workflow when their implementation is complete and when their implementation is available in a new build; validation that source code changes represent the implementation of work items that have been approved; and managing change in the source code system with a focus on what work items it represents rather than a focus on what files are affected.
摘要:
A scalable graphical user interface that may be used to map two or more schemas is provided. Elements of a dominant schema are displayed in a first column. Elements of a subordinate schema are displayed in a second column. A user may drag elements of the subordinate schema to a third mapping column and position those elements next to mapped dominant schema elements. A user can quickly and conveniently determine a relationship between mapped elements by selecting an element from the dominant schema and identifying one or more elements in the mapping column that are located next to that element.