Tenant grouping for secure transport of content

    公开(公告)号:US11570183B2

    公开(公告)日:2023-01-31

    申请号:US16895988

    申请日:2020-06-08

    Applicant: SAP SE

    Abstract: A distribution network communicates content to tenant groups in a secure manner. An engine of the distribution network receives content created utilizing an application having different customers and partners. The engine also receives: a first identifier indicating a customer of the application with which a tenant is associated, and a second identifier indicating a partner of the application with which the tenant is associated. The engine references a stored database table to correlate the first identifier and the second identifier. Based upon the first identifier and the second identifier, the engine evaluates whether the tenant is to be provided access to the content. The engine may provide the tenant with the content according to an access right determined from the first identifier and the second identifier. Certain embodiments may find particular use disseminating content to new tenants of a customer, based upon prior distribution to other tenants of that customer.

    Assigning access control for flat data structure

    公开(公告)号:US11226943B2

    公开(公告)日:2022-01-18

    申请号:US16867304

    申请日:2020-05-05

    Applicant: SAP SE

    Abstract: A distribution network may efficiently communicate items/item details in a private manner, with different access rights tailored to various tenants residing within a same or different customer landscape. A first input comprising a flat file with items/item details, is received. A second input comprising permissions entries for per-user, per-item direct access rights (e.g., view, read, write, delete) is also received. The first and second inputs are recursively processed to find nearest ancestors having the direct access rights, with a hash maintained including the nearest ancestors. An effective permitted structure (e.g., tree comprising root and leaf nodes) is generated by recursively adding descendant items having inherited access rights, to the nearest ancestors. Ultimately, descendant item(s) are privately distributed to a user with an access right according to the effective permitted structure. Embodiments may be particularly suited to the private distribution of analytics content (e.g., dimensions, stories, views) to various tenants.

    CROSS LoB BLENDING HANDLING ALONG WITH PERMISSIONS

    公开(公告)号:US20230064676A1

    公开(公告)日:2023-03-02

    申请号:US17463117

    申请日:2021-08-31

    Applicant: SAP SE

    Abstract: A method for accessing data stored in a database may include receiving a query to generate, based on blended data, a visualization. The blended data may include a first set of data from a first data source and a second set of data from a second data source. The query may also include a payload. The method may also include accessing the first set of data by injecting, into the payload, the first permission, and transmitting, to the first data source, the payload including the first permission. The method may also include accessing the second set of data by injecting, into the payload, the second permission, and transmitting, to the second data source, the payload including the first permission, the first set of data, and the second permission. The method may also include causing, using the blended data, presentation of the visualization. Related systems and articles of manufacture are provided.

    Assigning Access Control for Flat Data Structure

    公开(公告)号:US20210349870A1

    公开(公告)日:2021-11-11

    申请号:US16867304

    申请日:2020-05-05

    Applicant: SAP SE

    Abstract: A distribution network may efficiently communicate items/item details in a private manner, with different access rights tailored to various tenants residing within a same or different customer landscape. A first input comprising a flat file with items/item details, is received. A second input comprising permissions entries for per-user, per-item direct access rights (e.g., view, read, write, delete) is also received. The first and second inputs are recursively processed to find nearest ancestors having the direct access rights, with a hash maintained including the nearest ancestors. An effective permitted structure (e.g., tree comprising root and leaf nodes) is generated by recursively adding descendant items having inherited access rights, to the nearest ancestors. Ultimately, descendant item(s) are privately distributed to a user with an access right according to the effective permitted structure. Embodiments may be particularly suited to the private distribution of analytics content (e.g., dimensions, stories, views) to various tenants.

    Tenant Grouping For Secure Transport of Content

    公开(公告)号:US20210328998A1

    公开(公告)日:2021-10-21

    申请号:US16895988

    申请日:2020-06-08

    Applicant: SAP SE

    Abstract: A distribution network communicates content to tenant groups in a secure manner. An engine of the distribution network receives content created utilizing an application having different customers and partners. The engine also receives: a first identifier indicating a customer of the application with which a tenant is associated, and a second identifier indicating a partner of the application with which the tenant is associated. The engine references a stored database table to correlate the first identifier and the second identifier. Based upon the first identifier and the second identifier, the engine evaluates whether the tenant is to be provided access to the content. The engine may provide the tenant with the content according to an access right determined from the first identifier and the second identifier. Certain embodiments may find particular use disseminating content to new tenants of a customer, based upon prior distribution to other tenants of that customer.

    DATASOURCE CREATION USING EMBEDDED APPLICATION METADATA

    公开(公告)号:US20240143616A1

    公开(公告)日:2024-05-02

    申请号:US18050427

    申请日:2022-10-27

    Applicant: SAP SE

    CPC classification number: G06F16/254 G06F16/245

    Abstract: An application embedded within a cloud application may load a data object which accesses information from a database to generate visualizations of data. When the data object is transported from a development system to a production system, the database may not have table entries and views as expected and loading the data object might fail. In such cases, the datasource may be created from metadata. A first metadata call is sent to the database using the application metadata and an indication that a datasource was not found is received from the database. Query metadata is extracted from the application metadata of the data object and a datasource creation call is sent to the database using the extracted query metadata, thereby initiating creation of a datasource artifact in the database. Then, query results are obtained based on the datasource artifact and query results are provided in the cloud application.

Patent Agency Ranking