摘要:
The automatic selection of an identity provider to be used to authenticate users when requesting to access network resources for a tenant. The authentication is initiated by checking the username against the directory of the tenant. If that check results in finding an entry for the username in that directory, the entry is checked for an identity provider. If that check results in finding an identity provider, the user is directed to that found identity provider for authentication. Thus, in many, most, or all cases, an identity provider is found and selected for authentication of the user without the user having to manually select the identity provider. The username may be an internal user of an entity. The selection of the identity provider works in either case since there would still be an entry for that user in the directory of the tenant.
摘要:
The present invention relates to a method and an apparatus for allocating resources in a communication system using an asset delivery characteristics (ADC) message so as to improve efficiency in network resource usage. A method for allocating network resources in a transmission unit of a communication system according to the present invention comprises the steps of: generating an ADC message that includes a parameter value representing a transmission characteristic of a single asset; and transmitting the generated ADC message, wherein the generated ADC message is updated periodically or aperiodically with respect to the asset.
摘要:
Systems and methods are disclosed for reducing bandwidth during the transmission of data between first and second devices over a network. One method includes: receiving a first data request from the first device; generating a first request identifier associated with the first data request; transmitting to the first device a response to the first data request and the first request identifier associated with the first data request; receiving, from the first device, a partial second data request, the partial second data request including the first request identifier associated with the first data request, and a differential between the first data request and the second data request; and constructing, at the second device, a full second data request, based on a comparison between the first data request, fetched using the first request identifier, and the received differential between the first data request and the second data request.
摘要:
Centrally managed time sensitive fog networks are disclosed herein. An example fog network includes a plurality of dynamic end points, a plurality of service specific nodes offering one or more services selected from compute, storage, network, security, and business critical applications and functions, one or more fog nodes providing distributed resource management for plurality of services, and one or more system managers that provide centralized control of the one or more services to the plurality of dynamic end points.
摘要:
System and method for correlating fabric-level group membership with subnet-level partition membership in a high performance computing environment. An exemplary embodiment can provide an admin partition in a subnet of a network environment, associated with a resource domain at the fabric level of the network environment. The admin partition can be defined by a P_Key that is stored in a fabric-level database. Each fabric resource is identified by an identifier that is stored in the fabric-level database. When fabric resources are added as members to the resource domain, a relationship is created between the P_Key and the identifier of the fabric resource, where the relationship defines the resource as a member of the admin partition. Access rights can be granted based on the relationship.
摘要:
Examples relate to providing selective access to resources. In one example, a computing device may: receive, from a client application, a request to access a first resource server, the request including a client access token; identify a first set of permissions specified by a client topology, the client topology specifying: the first resource server; the first set of permissions for accessing, by the client application, the first resource server; a second resource server; and a second set of permissions for accessing, by the first resource server, the second resource server; provide the client application with a first access token specifying the first set of permissions and the first resource server; receive, from the first resource server, a request to access the second resource server, the request including the first access token; and provide the first resource server with a second access token specifying the second set of permissions.