Claims
- 1. An authorization process, comprising
receiving requests at an application at run-time from users seeking access to protected resources, in response to a given request from a given user, collecting information about the user's currently defined role and privileges associated with that role, and dynamically deciding whether the user is authorized to access a given protected resource based on the current variable role-based information, rather than the user's identity, collected at run-time.
- 2. The authorization process of claim 1, wherein the collecting information step is accomplished by querying a central data repository external to the application.
- 3. The authorization process of claim 2, further comprising
storing in said central repository dynamically variable role data defining generic roles that can be associated with multiple users, assigning users to said generic roles, more than one user being assignable to a given role, altering said role data from time to time to change a definition of a given role independently of user associations, and associating privileges with said roles based on their current respective definitions, the information collected from said repository by the application including the current variable value of the privilege status with respect to the protected resource associated with the currently defined role assigned to the user requesting access.
- 4. The authorization process of claim 3, wherein the altering of role data has the capability of causing the privileges associated with a given role to change.
- 5. The authorization process of claim 3, wherein the step of altering said role data for a given generic role is carried out independently of the responsibilities of users associated with a given generic role.
- 6. The authorization process of claim 3, further comprising
storing in said central repository dynamically variable responsibility data defining generic responsibilities that can be associated with multiple users, assigning users to said generic responsibilities, more than one user being assignable to a given responsibility, altering said responsibility data from time to time to change a definition of a given generic responsibility independently of user associations, and associating privileges with said responsibilities based on their current respective definitions, the information collected from said repository by the application including the current variable value of the privilege status with respect to the protected resource associated with a combination of the currently defined generic role or roles and responsibilities assigned to the user requesting access.
- 7. The authorization process of claim 6, wherein the step of altering said responsibility data for a given responsibility is carried out independently of the roles of users associated with the given generic responsibility.
- 8. The authorization process of claim 6, wherein the steps of assigning users to roles and responsibilities are carried out by decomposing a given user's positional functions and responsibilities into basic actions and objects to which the actions are applied,
mapping the actions and objects onto respective generic roles and responsibilities stored in said repository, and assigning the respective roles and responsibilities to the user.
- 9. A multiple application authorization process, comprising
receiving requests for authorization at a plurality of applications at run-time from users seeking access to protected resources, the applications independently collecting respective authorization information at run-time from a central repository containing user information, the user information including non-static roles whose definitions and corresponding privileges are variable, independently of the users associated with said roles, the applications basing access to protected resources on the current authorization information collected at run time in response to a given request.
- 10. The multiple application authorization process of claim 9, wherein the step of basing access is accomplished by dynamically deciding whether the user is authorized to access a given protected resource based on the current variable role-based information, rather than the user's identity, collected at run-time from the central repository.
- 11. The multiple application authorization process of claim 10, wherein the collecting information step is accomplished by querying a central data repository external to the application from which the user requests authorization.
- 12. The multiple application authorization process of claim 11, further comprising
storing in said central repository dynamically variable role data defining generic roles that can be associated with multiple users, assigning users to said generic roles, more than one user being assignable to a given role, altering said role data from time to time to change a definition of a given role independently of user associations, and associating privileges with said roles based on their current respective definitions, the information collected from said repository by the application including the current variable value of the privilege status with respect to the protected resource associated with the currently defined role assigned to the user requesting access.
- 13. The multiple application authorization process of claim 12, wherein the altering of role data has the capability of causing the privileges associated with a given role to change.
- 14. The multiple application authorization process of claim 12, wherein the step of altering said role data for a given generic role is carried out independently of the responsibilities of users associated with a given generic role.
- 15. The multiple application authorization process of claim 12, further comprising
storing in said central repository dynamically variable responsibility data defining generic responsibilities that can be associated with multiple users, assigning users to said generic responsibilities, more than one user being assignable to a given responsibility, altering said responsibility data from time to time to change a definition of a given generic responsibility independently of user associations, and associating privileges with said responsibilities based on their current respective definitions, the information collected from said repository by the application including the current variable value of the privilege status with respect to the protected resource associated with a combination of the currently defined generic role or roles and responsibilities assigned to the user requesting access.
- 16. The authorization process of claim 15, wherein the step of altering said responsibility data for a given responsibility is carried out independently of the roles of users associated with the given generic responsibility.
- 17. The authorization process of claim 15, wherein the steps of assigning users to roles and responsibilities are carried out by decomposing a given user's positional functions and responsibilities into basic actions and objects to which the actions are applied,
mapping the actions and objects onto respective generic roles and responsibilities stored in said repository, and assigning the respective roles and responsibilities to the user.
- 18. An authorization information management process, comprising
storing in a central repository dynamically variable role data defining generic roles that can be associated with multiple users, assigning users to said generic roles, more than one user being assignable to a given role, altering said role data from time to time to change a definition of a given role independently of user associations, and associating privileges with said roles based on their current respective definitions, making the current variable value of the privilege status, with respect to a given protected resource, associated with the currently defined role assigned to a user, available at run-time to an external application requesting access authorization for a user who seeks access to said protected resource via said application.
- 19. The authorization information management process of claim 18, wherein the altering of role data has the capability of causing the privileges associated with a given role to change.
- 20. The authorization information management process of claim 18, wherein the step of altering said role data for a given generic role is carried out independently of the responsibilities of users associated with a given generic role.
- 21. The authorization information management process of claim 18, further comprising
storing in said central repository dynamically variable responsibility data defining generic responsibilities that can be associated with multiple users, assigning users to said generic responsibilities, more than one user being assignable to a given responsibility, altering said responsibility data from time to time to change a definition of a given generic responsibility independently of user associations, and associating privileges with said responsibilities based on their current respective definitions, and making the current variable value of the privilege status with respect to the protected resource associated with a combination of the currently defined generic role or roles and responsibilities assigned to the user requesting access available at run-time to the external application requesting access authorization for a user who seeks access to said protected resource at said application.
- 22. The authorization information management process of 21, wherein the step of altering said responsibility data for a given responsibility is carried out independently of the roles of users associated with the given generic responsibility.
- 23. The authorization information management process of claim 21, wherein the steps of assigning users to roles and responsibilities are carried out by decomposing a given user's positional functions and responsibilities into basic actions and objects to which the actions are applied,
mapping the actions and objects onto respective generic roles and responsibilities stored in said repository, and assigning the respective roles and responsibilities to the user.
- 24. The authorization information management process of claim 18, wherein the central repository runs on the same system that hosts the human resources, customer relationship management or project planning system.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] The present application is related to an application entitled “An Authorization Mechanism,” filed in the U.S. Patent & Trademark Office by Cristina Buchholz on Feb. 21, 2003, Ser. No. 10/372,030, which application in its entirety is incorporated by reference herein.