QUORUM-BASED AUTHORIZATION TECHNIQUES

    公开(公告)号:US20250141873A1

    公开(公告)日:2025-05-01

    申请号:US18385275

    申请日:2023-10-30

    Applicant: Rubrik, Inc.

    Abstract: A data management system (DMS) may receive an indication of a configuration for a quorum-based authorization (QAuth) policy that controls interactions between two or more users and a security cloud service of the DMS. The configuration may include a policy scope for the QAuth policy, protected actions that trigger the QAuth policy, and compute objects to which the QAuth policy is assigned. The DMS may receive an instruction to assign a set of role-based access control (RBAC) permissions associated with the QAuth policy to a first user. The DMS may receive a request to perform a protected action on at least one compute object to which the QAuth policy is assigned. In response to the request, the DMS may trigger a two-person rule (TPR) enforcement mechanism of the QAuth policy by requesting approval from the first user with the set of RBAC permissions.

    TWO PERSON RULE ENFORCEMENT FOR BACKUP AND RECOVERY SYSTEMS

    公开(公告)号:US20250103754A1

    公开(公告)日:2025-03-27

    申请号:US18977619

    申请日:2024-12-11

    Applicant: Rubrik, Inc.

    Abstract: A method for updating configuration settings of a backup database supported by a data management system is described. The method may include receiving, from a first user in a first user group, a request to update configuration settings of the backup database. The method may further include determining that the first user is authorized to update the configuration settings of the backup database based on a set of permissions associated with the first user. The method may further include identifying a second user in a second user group that is authorized to approve the request from the first user. The method may further include transmitting an indication of the request to the second user and receiving a notification that the second user has approved the request from the first user. The method may further include updating the configuration settings of the backup database in response to the notification.

    Two person rule enforcement for backup and recovery systems

    公开(公告)号:US12197624B2

    公开(公告)日:2025-01-14

    申请号:US17839057

    申请日:2022-06-13

    Applicant: Rubrik, Inc.

    Abstract: A method for updating configuration settings of a backup database supported by a data management system is described. The method may include receiving, from a first user in a first user group, a request to update configuration settings of the backup database. The method may further include determining that the first user is authorized to update the configuration settings of the backup database based on a set of permissions associated with the first user. The method may further include identifying a second user in a second user group that is authorized to approve the request from the first user. The method may further include transmitting an indication of the request to the second user and receiving a notification that the second user has approved the request from the first user. The method may further include updating the configuration settings of the backup database in response to the notification.

    TWO PERSON RULE ENFORCEMENT FOR BACKUP AND RECOVERY SYSTEMS

    公开(公告)号:US20230401337A1

    公开(公告)日:2023-12-14

    申请号:US17839057

    申请日:2022-06-13

    Applicant: Rubrik, Inc.

    CPC classification number: G06F21/629 G06F11/1458 G06F2201/80

    Abstract: A method for updating configuration settings of a backup database supported by a data management system is described. The method may include receiving, from a first user in a first user group, a request to update configuration settings of the backup database. The method may further include determining that the first user is authorized to update the configuration settings of the backup database based on a set of permissions associated with the first user. The method may further include identifying a second user in a second user group that is authorized to approve the request from the first user. The method may further include transmitting an indication of the request to the second user and receiving a notification that the second user has approved the request from the first user. The method may further include updating the configuration settings of the backup database in response to the notification.

Patent Agency Ranking