The present invention relates to a method for configuring an interactive platform for monitoring the performance and quality of a computer network. This platform allows a set of monitoring data to be communicated to users. These data are displayed on a dynamic page of web page type in the form of graphic components termed “displets”. The computer platform can be considered as a web portal.
Generally, this computer platform is a service level management (SLM) tool, the role of which is to supervise a computer network and an information system. The computer platform measures the quality level of the information system and the elements of the computer network to which it is connected by detecting and diagnosing the problems. It then generates alerts by e-mail or in the form of activity reports. These reports can be presented to users in the form of graphic components or “displets”. In fact, the computer platform comprises a database server which is accessible by communication of the client-server type. The network elements can comprise machines and/or applications.
More specifically, a portal comprising a set of pages containing the displets is designed for a user or a group of users. The displet can be presented in the form of a graphic window displaying the items of information such as reports, navigation icons (“navigation widgets”), graphs, etc. The displets can interact, enabling interactive applications to be realized in web pages, in order to browse from general views towards more specific data.
A computer platform of the prior art offers criteria mechanisms in which the data presented as a function of the end user (internal maintenance operations, business or external client management) are filtered: these filters act like “masks” applied when a data retrieval request is sent from the database. For example, a criterion relating to a property is often defined such that the client “ACME” sees only the data which concern him or her.
The role of the filtering criteria is therefore to render certain data, i.e. certain displets, accessible to predetermined users.
However, the mechanisms of the prior art, consisting of directly configuring each displet so as to define the filtering criteria which are applicable to them, comprise significant limitations.
The first limitation is the lack of security. The criteria mechanisms of the prior art are mainly used during the design of the initial views. During navigation in the display window, by synchronization and zoom (“drilldown”) displets, new filtering criteria are defined and used in URLs which are submitted via a web browser to the server of the interactive platform in order to obtain the desired view. Such a URL can be easily retrieved by an end user. Then, by manually modifying the filter parameters in the URL, this user can obtain access to the data for other machines or elements of the system, thus bypassing the existing criteria mechanisms.
The second limitation is the lack of factorization. The filtering criteria must be defined for each displet of the portal. This limitation increases the time required to design the pages of the portal and often leads to errors, in particular if the designer forgets to define the appropriate filtering criteria on all the displets.
A purpose of the present invention is a novel configuration method which is simple to implement and to use and has an increased level of security.
At least one of the purposes is achieved by a method for configuring an interactive platform monitoring the performance and the quality of a computer network. This platform comprises a client-server database. The platform can display the monitoring data in the form of graphic components termed “displets” on a dynamic page of web page type. According to the invention, the interactive platform comprises a configuration interface in which are defined, for at least one given user, filtering criteria for displaying displets, said criteria being defined in the form of parameters for configuring the rights of said at least one user.
According to an advantageous characteristic of the invention, said criteria are systematically activated by the interactive platform in order to ensure secured access to the data.
With the method according to the invention, the filtering criteria are not defined at the level of each displet as in the prior art, but directly at the level of the users' parameters. The users, and not directly the displets, are parameterized. Such filtering criteria are called shared criteria. This provides numerous advantages including guaranteed security. In fact:
Advantageously, the shared criteria can be applied either to the set of displets for different pages or to a given group of displets. In other words, the user parameters are defined, but these parameters concern a group or all the displets.
Moreover, the present invention is in particular remarkable for the fact that the shared criteria can be applied to a group of users or to each user of the group by inheritance.
According to the invention, each group can be organized according to a multi-level directory structure. The specific criteria for a given level of the tree structure can then be defined. These specific criteria can be combined with the criteria defined at the group level and received by inheritance, or these specific criteria can replace, for said given level, the criteria defined at the group level.
With the present invention, the design work for restricting the data presented to the end user is greatly simplified by factorizing the definitions of the shared criteria at the user/group levels. When a pre-designed portal definition is deployed in a client environment, filtering criteria can be applied to the higher levels of the group hierarchy enabling the data presented to be refined without changing the initial design of the portal (and thus ensuring new designs are updated smoothly).
The ability to replace the shared criteria at the displet level allows specific cases to be implemented where common filtering criteria cannot be employed.
According to the invention, the rights of a given user are restricted to the definition and visibility of criteria. This thus allows an end user access to the configuration of a displet, while guaranteeing, by means of the shared criteria, that he or she can only access authorized data.
By limiting the rights on the definition and the visibility of the criteria, new personalization possibilities can be offered to the user, with the guarantee that only the permitted data will always be visible.
Other advantages and characteristics of the invention will become apparent upon examination of the detailed description of an embodiment which is in no way limitative, and the attached drawings, in which:
A computer network 1 of a business is seen in
In order that user1 may not access unauthorized displets, his or her access rights are defined in server 3 by an administrator via a configuration window such as is seen in
When the system is to be implemented in a platform already managing displet criteria according to the prior art, the complete user/group inheritance hierarchy can be reviewed in order to establish an exhaustive list of shared criteria which can be combined with the existing displet criteria. This list is then applied to the SQL requests transmitted to the database such that only the appropriate data is returned to the interactive platform.
The present invention therefore defines a shared-criteria mechanism providing numerous advantages:
Of course, the invention is not limited to the examples which have just been described and numerous adjustments can be made to these examples without exceeding the scope of the invention.
Number | Date | Country | Kind |
---|---|---|---|
06 02848 | Mar 2006 | FR | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/FR2007/000492 | 3/23/2007 | WO | 00 | 9/29/2008 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2007/118956 | 10/25/2007 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
6076166 | Moshfeghi et al. | Jun 2000 | A |
6449643 | Hyndman et al. | Sep 2002 | B1 |
7222078 | Abelow | May 2007 | B2 |
7318066 | Kaufman et al. | Jan 2008 | B2 |
7376898 | Yehuda et al. | May 2008 | B1 |
7519702 | Allan | Apr 2009 | B1 |
7730134 | Blagsvedt et al. | Jun 2010 | B2 |
7739605 | Plotkin et al. | Jun 2010 | B2 |
7840902 | Graves et al. | Nov 2010 | B2 |
7841011 | Manson et al. | Nov 2010 | B2 |
8271588 | Bruno et al. | Sep 2012 | B1 |
20020186238 | Sylor et al. | Dec 2002 | A1 |
20030046390 | Ball et al. | Mar 2003 | A1 |
20030184580 | Kodosky et al. | Oct 2003 | A1 |
20040046785 | Keller | Mar 2004 | A1 |
20040172397 | Asherman | Sep 2004 | A1 |
20050168891 | Nilman-Johansson et al. | Aug 2005 | A1 |
20050209874 | Rossini | Sep 2005 | A1 |
20070011146 | Holbrook | Jan 2007 | A1 |
20070233530 | Blaszka et al. | Oct 2007 | A1 |
20100229096 | Maiocco et al. | Sep 2010 | A1 |
Entry |
---|
Park et al. “Role-Based Access Control on the Web”, ACM Transactions on Information and System Security, vol. 4, No. 1, Feb. 2001, pp. 37-71. |
McPherson, Role-Based Access Control for Multi-tier Applications Using Authorization Manager, URL:http://technet2.microsoft.com/WindowsS063276cd0b61033.mspx?pf=true, Feb. 5, 2007. |
Number | Date | Country | |
---|---|---|---|
20090307596 A1 | Dec 2009 | US |