ACCESSING CLOUD DATA PROVIDERS WITH USER-IMPERSONATION

    公开(公告)号:US20230164131A1

    公开(公告)日:2023-05-25

    申请号:US17533315

    申请日:2021-11-23

    申请人: SAP SE

    IPC分类号: H04L9/40

    摘要: Disclosed herein are system, method, and computer-readable medium embodiments for securely accessing cloud data providers with user-impersonation. An embodiment operates by receiving an initial logon request for a cloud data provider. The embodiment authenticates the request using a cluster unique identifier (CUID) of the cloud data provider. The embodiment then authorizes the request by exchanging an authorization code for an identifier token and a refresh token issued by the cloud data provider. The embodiment then validates the tokens, and stores the refresh token for subsequent user-impersonation logons. Subsequently, the embodiment receives a user-impersonation logon request for the cloud data provider. The embodiment exchanges the refresh token for an access token issued by the cloud data provider, and uses the access token to gain access to the cloud data provider without a user directly having to complete authentication and authorization processes.

    Accessing cloud data providers with user-impersonation

    公开(公告)号:US12107843B2

    公开(公告)日:2024-10-01

    申请号:US17533315

    申请日:2021-11-23

    申请人: SAP SE

    IPC分类号: H04L9/40

    摘要: Disclosed herein are system, method, and computer-readable medium embodiments for securely accessing cloud data providers with user-impersonation. An embodiment operates by receiving an initial logon request for a cloud data provider. The embodiment authenticates the request using a cluster unique identifier (CUID) of the cloud data provider. The embodiment then authorizes the request by exchanging an authorization code for an identifier token and a refresh token issued by the cloud data provider. The embodiment then validates the tokens, and stores the refresh token for subsequent user-impersonation logons. Subsequently, the embodiment receives a user-impersonation logon request for the cloud data provider. The embodiment exchanges the refresh token for an access token issued by the cloud data provider, and uses the access token to gain access to the cloud data provider without a user directly having to complete authentication and authorization processes.

    Document Instance Protection Framework
    5.
    发明公开

    公开(公告)号:US20240135037A1

    公开(公告)日:2024-04-25

    申请号:US17970898

    申请日:2022-10-20

    申请人: SAP SE

    IPC分类号: G06F21/62 G06F21/60

    CPC分类号: G06F21/6272 G06F21/602

    摘要: Embodiments integrate with an authorization service (e.g., OAUTH) to implement document protection. In response to a document scheduling request, a protection engine reads a protection policy including a sensitivity label, from the authorization service. The protection engine encrypts content of the document, and stores the document including the encrypted content and a header, in a non-transitory computer readable storage medium (e.g., a database). At a conclusion of the document scheduling phase, the protection engine may send a status (e.g., successful; failed) of the document scheduling. Next, in response to receiving a subsequent document view request, the protection engine references the header to communicate with the authorization service. The protection engine decrypts the content based upon information received from the authorization service, and provides the document including decrypted content for viewing.

    EXCEPTION MANAGEMENT IN HETEROGENOUS COMPUTING ENVIRONMENT

    公开(公告)号:US20220350692A1

    公开(公告)日:2022-11-03

    申请号:US17244689

    申请日:2021-04-29

    申请人: SAP SE

    IPC分类号: G06F11/07 G06F11/30

    摘要: A computer-implemented method includes feeding exception log entries from a plurality of exception logs associated with respective heterogenous computing components into an aggregated exception log comprising aggregated exception log entries, mapping an aggregated exception log entry in the aggregated exception log to a corresponding exception identifier, identifying a descriptor describing an exception condition based on the exception identifier, determining one or more destinations corresponding to the aggregated exception log entry, and routing a notification comprising the descriptor to the one or more destinations.

    Multiple vendor authorization
    7.
    发明授权

    公开(公告)号:US12126621B2

    公开(公告)日:2024-10-22

    申请号:US17589776

    申请日:2022-01-31

    申请人: SAP SE

    IPC分类号: H04L9/40

    CPC分类号: H04L63/10 H04L63/0815

    摘要: Systems and processes for managing authorizations for multiple vendors at an enterprise service are provided. Responsive to a request to onboard an authorization for access to data resources of a targeted vendor, a central management server may receive, from an authorization server for the targeted vendor, authorization information. The authorization information may be received indirectly, via a security token service. An authorization reference object may be generated to store the authorization information, and the authorization reference object may be stored in a database. Subsequent requests for access to the data resources of the targeted vendor may be serviced using the authorization reference object stored in the database.

    Document Instance Protection Framework
    8.
    发明公开

    公开(公告)号:US20240232435A9

    公开(公告)日:2024-07-11

    申请号:US17970898

    申请日:2022-10-21

    申请人: SAP SE

    IPC分类号: G06F21/62 G06F21/60

    CPC分类号: G06F21/6272 G06F21/602

    摘要: Embodiments integrate with an authorization service (e.g., OAUTH) to implement document protection. In response to a document scheduling request, a protection engine reads a protection policy including a sensitivity label, from the authorization service. The protection engine encrypts content of the document, and stores the document including the encrypted content and a header, in a non-transitory computer readable storage medium (e.g., a database). At a conclusion of the document scheduling phase, the protection engine may send a status (e.g., successful; failed) of the document scheduling. Next, in response to receiving a subsequent document view request, the protection engine references the header to communicate with the authorization service. The protection engine decrypts the content based upon information received from the authorization service, and provides the document including decrypted content for viewing.

    REPORT REEXECUTION FRAMEWORK
    9.
    发明公开

    公开(公告)号:US20240202023A1

    公开(公告)日:2024-06-20

    申请号:US18082447

    申请日:2022-12-15

    申请人: SAP SE

    IPC分类号: G06F9/48 G06F11/30

    摘要: The present disclosure provides techniques and solutions for analyzing failed computing tasks (or “jobs”) for resubmission. Computing jobs can include requests to generate recurring reports according to a schedule. Information regarding failed jobs can be submitted to a job resubmission framework. Various parameters can be extracted from the failed job information and used to determine whether a job should be submitted for reexecution. Jobs that are to be submitted for reexecution can be placed in a queue or released according to a schedule. Determining whether a job should be submitted for reexecution can include determining a relative priority of reexecuting a particular job compared with other jobs to be reexecuted. Disclosed techniques can help ensure that more important jobs are executed before lower priority jobs, as well as helping to avoid overloading a computing system with job reexecution processes.

    UNIFIED MULTI-VIEW DATA VISUALIZATION

    公开(公告)号:US20220076464A1

    公开(公告)日:2022-03-10

    申请号:US17016100

    申请日:2020-09-09

    申请人: SAP SE

    摘要: Systems, methods, and computer media for visualizing data are provided herein. The described examples allow multiple data visualizations generated using multiple visualization tools to be displayed in response to a single data visualization request generated using a single visualization tool. A data visualization request can specify data for inclusion in a data visualization and properties for the visualization. Features can be extracted from the request and converted to corresponding features for other visualization tools. Both the visualization tool through which the request was generated and the other visualization tools can generate data visualizations for display.