摘要:
A client is impersonalized to a plurality of servers using a middle-tier server. A common nonce associated with each of the plurality of servers is obtained and the common nonce is provided to the client. The common nonce signed by the client is received at the middle-tier server and provided as a signature for transactions from the client to the plurality of servers so as to authenticate the client to the plurality of servers.
摘要:
A client is impersonalized to a plurality of servers using a middle-tier server. A common nonce associated with each of the plurality of servers is obtained and the common nonce is provided to the client. The common nonce signed by the client is received at the middle-tier server and provided as a signature for transactions from the client to the plurality of servers so as to authenticate the client to the plurality of servers.
摘要:
A client is impersonalized to a plurality of servers using a middle-tier server. A common nonce associated with each of the plurality of servers is obtained and the common nonce is provided to the client. The common nonce signed by the client is received at the middle-tier server and provided as a signature for transactions from the client to the plurality of servers so as to authenticate the client to the plurality of servers.
摘要:
A client is impersonalized to a plurality of servers using a middle-tier server. A common nonce associated with each of the plurality of servers is obtained and the common nonce is provided to the client. The common nonce signed by the client is received at the middle-tier server and provided as a signature for transactions from the client to the plurality of servers so as to authenticate the client to the plurality of servers.
摘要:
A client is impersonated to a plurality of servers using a middle-tier server. A common nonce associated with each of the plurality of servers is obtained and the common nonce is provided to the client. The common nonce signed by the client is received at the middle-tier server and provided as a signature for transactions from the client to the plurality of servers so as to authenticate the client to the plurality of servers.
摘要:
Changed information is provided to multiple masters of a multi-master environment. In order to facilitate the providing of the changed information to the various masters, at least one replication data structure is used. This data structure is managed in such a way that conflicts are avoided in updating the data structure, and thus, in communicating the changed information to the masters.
摘要:
A data set typically does not stagnate and remain the same size over time. The capabilities of hardware (e.g., servers and storage devices) also do not stagnate and remain the same. A date set is often repartitioned to accommodate changes in size of the data set and/or changes in hardware capability. Hundreds or thousands of writes may be performed on the data set (e.g., database, directory, etc.) every second. So, even a few seconds of downtime are unacceptable. Instead of taking the data set offline, the data set can be repartitioned while still allowing access to the data set (“repartitioning live data”). Live data can be repartitioned by establishing update or replication queues for the new partitions while servicing write requests and read requests with the old partitions. After the data has been migrated, the update queues are drained to ensure data integrity.
摘要:
Methods, systems and computer program products are provided for authenticating a message from a client using a first authentication protocol and a resource manager using a second authentication protocol different from the first authentication protocol by generating a second message from the message from the client. The second message may include information from the client which has been authenticated using the first authentication protocol. The second message is authenticated using the second authentication protocol and the authenticated second message is provided to the resource manager.
摘要:
A data set typically does not stagnate and remain the same size over time. The capabilities of hardware (e.g., servers and storage devices) also do not stagnate and remain the same. A date set is often repartitioned to accommodate changes in size of the data set and/or changes in hardware capability. Hundreds or thousands of writes may be performed on the data set (e.g., database, directory, etc.) every second. So, even a few seconds of downtime are unacceptable. Instead of taking the data set offline, the data set can be repartitioned while still allowing access to the data set (“repartitiong live data”). Live data can be repartitioned by establishing update or replication queues for the new partitions while servicing write requests and read requests with the old partitions. After the data has been migrated, the update queues are drained to ensure data integrity.
摘要:
A method of data storage and retrieval using a relational database can include defining a first table in a relational database including a plurality of entries having a first value for a first field. A second table in the relational database including a plurality of entries can be defined. Each of the plurality of entries in the second table can specify an additional value for the first field of a corresponding entry in the first table. Responsive to a query, a data item selected from at least one of the plurality of entries in the first table can be presented.