ACCESSING CLOUD DATA PROVIDERS WITH USER-IMPERSONATION

    公开(公告)号:US20230164131A1

    公开(公告)日:2023-05-25

    申请号:US17533315

    申请日:2021-11-23

    Applicant: SAP SE

    Abstract: Disclosed herein are system, method, and computer-readable medium embodiments for securely accessing cloud data providers with user-impersonation. An embodiment operates by receiving an initial logon request for a cloud data provider. The embodiment authenticates the request using a cluster unique identifier (CUID) of the cloud data provider. The embodiment then authorizes the request by exchanging an authorization code for an identifier token and a refresh token issued by the cloud data provider. The embodiment then validates the tokens, and stores the refresh token for subsequent user-impersonation logons. Subsequently, the embodiment receives a user-impersonation logon request for the cloud data provider. The embodiment exchanges the refresh token for an access token issued by the cloud data provider, and uses the access token to gain access to the cloud data provider without a user directly having to complete authentication and authorization processes.

    Accessing cloud data providers with user-impersonation

    公开(公告)号:US12107843B2

    公开(公告)日:2024-10-01

    申请号:US17533315

    申请日:2021-11-23

    Applicant: SAP SE

    Abstract: Disclosed herein are system, method, and computer-readable medium embodiments for securely accessing cloud data providers with user-impersonation. An embodiment operates by receiving an initial logon request for a cloud data provider. The embodiment authenticates the request using a cluster unique identifier (CUID) of the cloud data provider. The embodiment then authorizes the request by exchanging an authorization code for an identifier token and a refresh token issued by the cloud data provider. The embodiment then validates the tokens, and stores the refresh token for subsequent user-impersonation logons. Subsequently, the embodiment receives a user-impersonation logon request for the cloud data provider. The embodiment exchanges the refresh token for an access token issued by the cloud data provider, and uses the access token to gain access to the cloud data provider without a user directly having to complete authentication and authorization processes.

    Document Instance Protection Framework
    6.
    发明公开

    公开(公告)号:US20240135037A1

    公开(公告)日:2024-04-25

    申请号:US17970898

    申请日:2022-10-20

    Applicant: SAP SE

    CPC classification number: G06F21/6272 G06F21/602

    Abstract: Embodiments integrate with an authorization service (e.g., OAUTH) to implement document protection. In response to a document scheduling request, a protection engine reads a protection policy including a sensitivity label, from the authorization service. The protection engine encrypts content of the document, and stores the document including the encrypted content and a header, in a non-transitory computer readable storage medium (e.g., a database). At a conclusion of the document scheduling phase, the protection engine may send a status (e.g., successful; failed) of the document scheduling. Next, in response to receiving a subsequent document view request, the protection engine references the header to communicate with the authorization service. The protection engine decrypts the content based upon information received from the authorization service, and provides the document including decrypted content for viewing.

    EXCEPTION MANAGEMENT IN HETEROGENOUS COMPUTING ENVIRONMENT

    公开(公告)号:US20220350692A1

    公开(公告)日:2022-11-03

    申请号:US17244689

    申请日:2021-04-29

    Applicant: SAP SE

    Abstract: A computer-implemented method includes feeding exception log entries from a plurality of exception logs associated with respective heterogenous computing components into an aggregated exception log comprising aggregated exception log entries, mapping an aggregated exception log entry in the aggregated exception log to a corresponding exception identifier, identifying a descriptor describing an exception condition based on the exception identifier, determining one or more destinations corresponding to the aggregated exception log entry, and routing a notification comprising the descriptor to the one or more destinations.

    SERVICE-COMPATIBLE FAULT TOLERANCE AND ACCLIMATION

    公开(公告)号:US20230401129A1

    公开(公告)日:2023-12-14

    申请号:US17836334

    申请日:2022-06-09

    Applicant: SAP SE

    CPC classification number: G06F11/2025 G06F2201/85

    Abstract: In an example embodiment, a solution is provided to build a generic service failover framework that can be packaged as a library and implemented by many different microservices, whether on-premises or in the cloud. Each application can implement/add/hook this service to obtain the benefits of handling failover gracefully, as well as coming with some customizable options to provide a complete failover framework.

    MULTIPLE VENDOR AUTHORIZATION
    9.
    发明公开

    公开(公告)号:US20230179599A1

    公开(公告)日:2023-06-08

    申请号:US17589776

    申请日:2022-01-31

    Applicant: SAP SE

    CPC classification number: H04L63/10 H04L63/0815

    Abstract: Systems and processes for managing authorizations for multiple vendors at an enterprise service are provided. Responsive to a request to onboard an authorization for access to data resources of a targeted vendor, a central management server may receive, from an authorization server for the targeted vendor, authorization information. The authorization information may be received indirectly, via a security token service. An authorization reference object may be generated to store the authorization information, and the authorization reference object may be stored in a database. Subsequent requests for access to the data resources of the targeted vendor may be serviced using the authorization reference object stored in the database.

    Exception management in heterogenous computing environment

    公开(公告)号:US11645137B2

    公开(公告)日:2023-05-09

    申请号:US17244689

    申请日:2021-04-29

    Applicant: SAP SE

    CPC classification number: G06F11/0772 G06F11/0784 G06F11/0787 G06F11/3082

    Abstract: A computer-implemented method includes feeding exception log entries from a plurality of exception logs associated with respective heterogenous computing components into an aggregated exception log comprising aggregated exception log entries, mapping an aggregated exception log entry in the aggregated exception log to a corresponding exception identifier, identifying a descriptor describing an exception condition based on the exception identifier, determining one or more destinations corresponding to the aggregated exception log entry, and routing a notification comprising the descriptor to the one or more destinations.

Patent Agency Ranking