Claims
- 1. A method for adaptively managing entitlements, comprising the steps of:
providing for the association of a role with a first resource; and providing for the association of a policy with a second resource, wherein the policy is based at least partially on the role; and providing for hierarchically relating the role and the policy; and wherein the role is hierarchically equal or superior to the policy.
- 2. The method of claim 1 wherein:
the step of providing for the association of the policy with the second resource is initiated by an authenticated user, group or process.
- 3. The method of claim 1 including the step of:
providing for mapping the role to a principal in order to specify whether or not the principal can access the second resource.
- 4. The method of claim 1 including the step of:
providing for evaluating the role to true or false for a principal in a context.
- 5. The method of claim 1 wherein:
the role is a Boolean expression that can include at least one of (1) another Boolean expression and (2) a predicate.
- 6. The method of claim 5 wherein:
the predicate is one of user, group, time and segment.
- 7. The method of claim 5 wherein:
the predicate can be evaluated against a principal and a context.
- 8. The method of claim 5 wherein:
the predicate is a segment that can be specified in plain language.
- 9. The method of claim 1 wherein:
the policy is an association between the second resource and a set of roles.
- 10. The method of claim 1 wherein:
the first resource and the second resource are part of an enterprise application.
- 11. A method for adaptively managing entitlements in an enterprise application, comprising the steps of:
providing for the association of a role with a first enterprise application resource; providing for the association of a policy with a second enterprise application resource, wherein the policy is based at least partially on the role; providing for mapping the role to a principal in order to specify whether or not the principal can access the second resource; providing for hierarchically relating the role and the policy; and wherein the role is hierarchically equal or superior to the policy.
- 12. The method of claim 11 wherein:
the step of providing for the association of the policy with the second resource is initiated by an authenticated user, group or process.
- 13. The method of claim 11 wherein:
the role can supercede a second role associated with a parent of the first resource; and wherein the first policy can supercede a second policy associated with a parent of the second resource.
- 14. The method of claim 11 including the step of:
providing for evaluating the role to true or false for a principal in a context.
- 15. The method of claim 11 wherein:
the role is a Boolean expression that can include at least one of (1) another Boolean expression and (2) a predicate.
- 16. The method of claim 15 wherein:
the predicate is one of user, group, time and segment.
- 17. The method of claim 15 wherein:
the predicate can be evaluated against a principal and a context.
- 18. The method of claim 15 wherein:
the predicate is a segment that can be specified in plain language.
- 19. The method of claim 11 wherein:
the policy is an association between the second resource and a set of roles.
- 20. A method adapted for managing entitlements, comprising the steps of:
providing for the association of a first role with a first resource in a hierarchy of resources; providing for the association of a first policy with a second resource in the hierarchy of resources, wherein the first policy is based at least partially on the first role; and wherein the first role can supercede a second role associated with a parent of the first resource if the first role and the second role have the same identity; and wherein the first policy can supercede a second policy associated with a parent of the second resource if the first policy and the second policy have the same identity.
- 21. The method of claim 20 wherein:
the step of providing for the association of the first policy with the second resource is initiated by an authenticated user, group or process.
- 22. The method of claim 20 including the step of:
providing for mapping the first role to a principal in order to specify whether or not the principal can access the second resource.
- 23. The method of claim 20 including the step of:
providing for evaluating the first role to true or false for a principal in a context.
- 24. The method of claim 20 wherein:
the first role is a Boolean expression that can include at least one of (1) another Boolean expression and (2) a predicate.
- 25. The method of claim 24 wherein:
the predicate is one of user, group, time and segment.
- 26. The method of claim 24 wherein:
the predicate can be evaluated against a principal and a context.
- 27. The method of claim 24 wherein:
the predicate is a segment that can be specified in plain language.
- 28. The method of claim 20 wherein:
the first policy is an association between the second resource and a set of roles.
- 29. The method of claim 20 wherein:
the first resource and the second resource are part of an enterprise application.
- 30. A method adapted for managing entitlements, comprising the steps of:
providing for the association of a role with a first resource in a hierarchy of resources; providing for the association of a policy with a second resource in the hierarchy of resources, wherein the policy is based at least partially on the role; and wherein the role blocks a less local role; and wherein the policy blocks a less local policy.
- 31. The method of claim 30 wherein:
the step of providing for the association of the policy with the second resource is initiated by an authenticated user, group or process.
- 32. The method of claim 30 including the step of:
providing for mapping the role to a principal in order to specify whether or not the principal can access the second resource.
- 33. The method of claim 30 including the step of:
providing for evaluating the role to true or false for a principal in a context.
- 34. The method of claim 30 wherein:
the role is a Boolean expression that can include at least one of (1) another Boolean expression and (2) a predicate.
- 35. The method of claim 34 wherein:
the predicate is one of user, group, time and segment.
- 36. The method of claim 34 wherein:
the predicate can be evaluated against a principal and a context.
- 37. The method of claim 34 wherein:
the predicate is a segment that can be specified in plain language.
- 38. The method of claim 30 wherein:
the policy is an association between the second resource and a set of roles.
- 39. The method of claim 30 wherein:
the first resource and the second resource are part of an enterprise application.
- 40. A method adapted for managing entitlements, comprising the steps of:
providing for the association of a role with a first resource in a hierarchy of resources; providing for the association of a policy with a second resource in the hierarchy of resources, wherein the policy is based at least partially on the role; and wherein the role blocks a less local role.
- 41. The method of claim 40 wherein:
the policy blocks a less local policy.
- 42. The method of claim 40 wherein:
the step of providing for the association of the policy with the second resource is initiated by an authenticated user, group or process.
- 43. The method of claim 40 including the step of:
providing for mapping the role to a principal in order to specify whether or not the principal can access the second resource.
- 44. The method of claim 40 including the step of:
providing for evaluating the role to true or false for a principal in a context.
- 45. The method of claim 40 wherein:
the role is a Boolean expression that can include at least one of (1) another Boolean expression and (2) a predicate.
- 46. The method of claim 45 wherein:
the predicate is one of user, group, time and segment.
- 47. The method of claim 45 wherein:
the predicate can be evaluated against a principal and a context.
- 48. The method of claim 45 wherein:
the predicate is a segment that can be specified in plain language.
- 49. The method of claim 40 wherein:
the policy is an association between the second resource and a set of roles.
- 50. The method of claim 40 wherein:
the first resource and the second resource are part of an enterprise application.
- 51. A computer data signal embodied in a transmission medium, comprising:
a code segment including instructions for:
associating a role with a first resource; and associating a policy with a second resource, wherein the policy is based partially on the role; and hierarchically relating the role and the policy; and wherein the role is hierarchically equal or superior to the policy.
- 52. The computer data signal of claim 51 wherein:
the step of providing for the association of the policy with the second resource is initiated by an authenticated user, group or process.
- 53. The computer data signal of claim 51 including the step of:
providing for mapping the role to a principal in order to specify whether or not the principal can access the second resource.
- 54. The computer data signal of claim 51 including the step of:
providing for evaluating the role to true or false for a principal in a context.
- 55. The computer data signal of claim 51 wherein:
the role is a Boolean expression that can include at least one of (1) another Boolean expression and (2) a predicate.
- 56. The computer data signal of claim 55 wherein:
the predicate is one of user, group, time and segment.
- 57. The computer data signal of claim 55 wherein:
the predicate can be evaluated against a principal and a context.
- 58. The computer data signal of claim 55 wherein:
the predicate is a segment that can be specified in plain language.
- 59. The computer data signal of claim 51 wherein:
the policy is an association between the second resource and a set of roles.
- 60. The computer data signal of claim 51 wherein:
the first resource and the second resource are part of an enterprise application.
- 61. A memory for storing data to be accessed by an application program being executed on a data processing system, comprising:
a data structure stored in the memory, the data structure including:
an object adapted for representing at least one resource and adapted to be connected to at least one other like object to represent a hierarchy of resources; and wherein the object and the at least one other like object can be associated with at least one of (a) a security policy and (b) a role such that a hierarchy of security policies and roles is established.
- 62. The memory of claim 61 wherein:
a hierarchically inferior security policy supercedes a hierarchically superior security policy.
- 63. The memory of claim 61 wherein:
a hierarchically inferior role supercedes a hierarchically superior role.
- 64. The memory of claim 61 wherein:
the at least one role evaluates to true or false for a principal in a context.
- 65. The memory of claim 61 wherein:
the at least one role is a Boolean expression that can include at least one of (1) another Boolean expression and a (2) predicate.
- 66. The memory of claim 65 wherein:
the predicate is one of user, group, time and segment.
- 67. The memory of claim 65 wherein:
the predicate can be evaluated against a principal and a context.
- 68. The memory of claim 65 wherein:
the predicate is a segment that can be specified in plain language.
- 69. The memory of claim 61 wherein:
a security policy is an association between an object and a set of roles.
- 70. A machine readable medium having instructions stored thereon that when executed by a processor cause a system to:
provide for the association of a role with a first resource; and provide for the association of a policy with a second resource, wherein the policy is based at least partially on the role; and provide for hierarchically relating the role and the policy; and wherein the role is hierarchically equal or superior to the policy.
- 71. The machine readable medium of claim 70 wherein:
providing for the association of the policy with the second resource is initiated by an authenticated user, group or process.
- 72. The machine readable medium of claim 70 including instructions which when executed by a processor cause the system to:
provide for mapping the role to a principal in order to specify whether or not the principal can access the second resource.
- 73. The machine readable medium of claim 70 including instructions which when executed by a processor cause the system to:
provide for evaluating the role to true or false for a principal in a context.
- 74. The machine readable medium of claim 70 wherein:
the role is a Boolean expression that can include at least one of (1) another Boolean expression and (2) a predicate.
- 75. The machine readable medium of claim 74 wherein:
the predicate is one of user, group, time and segment.
- 76. The machine readable medium of claim 74 wherein:
the predicate can be evaluated against a principal and a context.
- 77. The machine readable medium of claim 74 wherein:
the predicate is a segment that can be specified in plain language.
- 78. The machine readable medium of claim 70 wherein:
the policy is an association between the second resource and a set of roles.
- 79. The machine readable medium of claim 70 wherein:
the first resource and the second resource are part of an enterprise application.
CROSS REFERENCES
[0001] This application is related to the following co-pending applications which are hereby incorporated by reference in their entirety: SYSTEM AND METHOD FOR HIERARCHICAL ROLE-BASED ENTITLEMENTS, U.S. Application Serial No. ______, Inventors: Philip B. Griffin, et al., filed on ______; METHOD FOR DELEGATED ADMINISTRATION, U.S. Application Serial No. ______, Inventors: Philip B. Griffin, et al., filed on ______; and METHOD FOR ROLE AND RESOURCE POLICY MANAGEMENT OPTIMIZATION, U.S. Application Serial No. ______, Inventor: Philip B. Griffin, filed on ______.