Information
-
Patent Application
-
20040025050
-
Publication Number
20040025050
-
Date Filed
July 31, 200222 years ago
-
Date Published
February 05, 200421 years ago
-
Inventors
-
Original Assignees
-
CPC
-
US Classifications
-
International Classifications
Abstract
A unified network address database for recording network addresses for both internally accessible (e.g. intranet) and externally accessible (e.g. Internet) sites, servers and resources, including ownership information and authorization policies. A system for accessing the address database is provided to allow a user access to the contents according to the user's defined privileges.
Description
BACKGROUND OF THE INVENTION
[0001] 1. Field of the Invention
[0002] This invention relates to technologies of network address servers and maintenance for Internet and intranet addresses, and especially for the security provisions of maintaining a unified repository of server Internet Protocol (“IP”) addresses which are externally and internally accessible.
[0003] 2. Background of the Invention
[0004] Many corporations operate two sets of web servers for their businesses purposes, one set which is externally accessible by users which are not employees or staff of the company, and a second set which is only internally accessible by authorized staff. The externally accessible servers are often available through public Internet addresses such as Universal Resource Locators (“URL”) and Internet Protocol (“IP”) addresses. These externally accessible web sites and services may include facilities for the company who owns and runs the servers, such as online catalog services, news and investor information, order tracking, etc. They also, though, may be services and web sites for other companies which are hosted by the owner/operator company. For example, International Business Machines operates an extensive website located at the URL “ibm.com”, from where information for products can be obtained, training classes can be accessed, products can be purchased, and investor information can be found. IBM also “hosts” a number of websites for other companies, too, which is not apparent to the casual “visitor” of the sites, but which are physically stored and served from IBM servers.
[0005] The internally accessible servers are typically accessible to corporate employees and other authorized personnel (e.g. consultants, contractors, auditors, etc.) via a corporate “intranet”. These servers may include departmental servers, such as Human Resources servers, accounting servers, sales and marketing servers, and the like. They may also be focussed on special interest groups and technology centers within a large corporation, such as a server for use by engineers and scientists working on a specific subject or group of products. Each of these “internal” servers has an “owner” who is responsible to some degree for the maintenance and security of the content on the server. A “firewall” typically protects some or all of the internal servers from external, unauthorized access.
[0006] In a large corporation with a large intranet, there may be substantial subdivisions of the intranet and sets of internal servers based upon corporate organization structure, geographic distribution, cultural and regulatory issues. For example, within the IBM corporation, there may be a division of the corporate intranet between three regions of the world—IBM-North America, IBM-Europe, and IBM-Asia Pacific Africa. The North American network administrators may develop and follow a set of policies and procedures which meet with the business objectives of that portion of the corporation, and which comply with any applicable, regional and local regulations. The same may be true of the European and Asia-Pacific-African networks, although their policies and procedures may be different from each other and the North American policies.
[0007] For this reason, many large corporations, and especially multinational corporations, develop high-level security and network policies that express corporate standards and requirements which can be globally implemented without substantial variation from one intranet to another. Each subdivision of the network may have additional standards and policies which further define and refine the global corporate policies for actual implementation and execution.
[0008] This type of structure of policies often leads to the creation of and maintenance of a large number of system resources which serve similar purposes in the network, but whose implementations are significantly different from each other, partly due to required differences in content in function, and partly due to their being developed and maintained by different parties (e.g. different Information Technology or “IT” groups). One example of such a resource is a network address database which is used to not only determine which addresses are “internal” or “external” for servers, but also who is the “owner” of each server, and what are the security provisions for each server. It is common to find many different databases serving these purposes within what is viewed as a single corporate network. Often, databases for “internal” addresses are quite different in content and design than databases for “external” addresses. This disparity in system resource design, implementation, content and functionality can lead to considerable inefficiencies in the operation and use of the corporate network.
[0009] For example, within the IBM IT organization, there are “scan teams” who are tasked with evaluating the security and vulnerability of servers throughout the IBM-owned internal and external servers. These teams constantly review the content and functionality of servers, be they internally accessible or externally accessible, for compliance with corporate security policies, and for other vulnerabilities. In order to perform their duties, they must consult a wide variety of address databases, including external address databases as well as internal address databases. The inconsistencies between these databases results in confusion, inefficient work processes, and sometimes incomplete or less-than-effective execution of the security scan.
[0010] Therefore, there is a need in the art for a system and method which can relieve network and personnel inefficiencies from use of such disparate system resources by unifying their points of access and interface, providing for common content and functionality, and allowing consistent and understandable administration policies (e.g. who is authorized to access and/or change these resources). Further, there is a need in the art for this system to allow for growth or “scalability” of the system resources without significant redesign or restructuring, and to provide for automated access by other processes to the system resource such that certain manual processes (e.g. security scanning and penetration testing) may be assisted by automated methods.
BRIEF DESCRIPTION OF THE DRAWINGS
[0011] The following detailed description when taken in conjunction with the figures presented herein provide a complete disclosure of the invention.
[0012]
FIG. 1 shows the high-level architecture of the Mixed Address Database tool according to the present invention.
[0013]
FIG. 2 depicts details of an example implementation of the invention.
[0014]
FIG. 3 shows the high level structure of the MAD database.
[0015]
FIG. 4 illustrates the MAD database and user privileges associated with different record types.
SUMMARY OF THE INVENTION
[0016] Mixed Address Database (“MAD”) is a relational database with an Internet front-end that incorporates the registration-specific information which is normally tracked in multiple, disparate databases for corporate internally accessible and externally accessible web server addresses. Conventionally, these databases have been used for server registration required for corporate-wide security compliance, where a first database contains registration information for Internet Servers & Gateways, and a second database is used to register intranet connected servers (i.e. from Vital Business Process, Inter-Enterprise Systems, Global Web Arch., and Global Notes Arch.)
DETAILED DESCRIPTION OF THE INVENTION
[0017] In an exemplary use, the Mixed Address Database (“MAD”) registration data can be used for vulnerability scanning and compliance checking of servers which are accessible either externally (e.g. Internet servers) or internally (e.g. intranet). Typically, two separate databases are used for this type of operation, one for the externally accessible servers and a second for the internally accessible servers. As such, MAD provides a scalable, end-to-end address database solution, with the front end of the solution being a Web Based Graphical User Interface (“GUI”) and the back end being a DB2 Universal Database (“UDB”), preferrably implemented on an IBM RS/6000 computer system with the IBM AIX operating system. Preferably, it also includes a utility with which data may be imported from the existing External and Internal address databases.
[0018] As such, the invention provides one central repository for all of a company's server security information. It provides storage as well as a maintenance mechanism for server/machine information vital to IBM's business. According to our preferred embodiment, the processes of the invention are realized using the well-known IBM WebSphere web server product, Java, and a standard DB2 Universal Database.
[0019] Additionally, an authentication mechanism is incorporated into the system to identify a user prior to granting access to data in the system, preferrably the IBM Intranet ID (“IIP”) and Commercial Web Authorization (“CWA”) products are employed for this purpose.
[0020] There are multiple levels of users identified in the system, such as MAD Administrators, Connection Administrators, Regional Administrators, different types of device/server owners as well as authorized users and additional users. This design gives access to authorized users, who are identified by logging in with their Intranet ID and password, to specified data. The use of a relational database easily allows the application to provide reports by specified search criteria in different presentation manners to a company's Chief Information Officer (“CIO”) office as needed. The application is preferrably an intranet application available only inside the corporate firewall.
[0021] To realize the invention, approximately 8 existing address databases for a client company (in this case IBM), for registering and maintaining IBM server IP/hostname information, which were implemented in Lotus Notes Databases, were replaced with one, central application available to IBM administrators and security scan teams world-wide. As IBM is a global company and their internal network requirements and challenges are representative of the issues faced by other large, multinational corporations, this environment was appropriate for developing a product which could be used by other corporations.
[0022] At the time the invention was made, IBM internally supported two Lotus Notes database designs: Intranet Network Address Database (“INAD”) (e.g. internal address database), and Network Address Database (“NAD”) (e.g. external address database). For the purposes of this disclosure, we will refer to them as InNAD and ExNAD, respectively, as other corporations likely used different names or acronyms for their existing databases which perform the same function within their networks.
[0023] Each geography has its own copy of the InNAD, so in this particular instance, there were approximately seven separate installations of this database worldwide. Since each installation was a separate Lotus Notes database, they were isolated and the data could not be easily consolidated into one data source. It was recognized that one central repository and application interface would make administration of this data, as well as activities such as running reports, etc., much easier and maintainable over time.
[0024] Also, it was desirable that the central data source and application to access would give end-users just one central place to go to manage all corporate server data for all areas/geographics with ties into security information. In order to do so, the application interface implements a unique authority structure to give access to the differing levels of users.
[0025] The preferred embodiment of the MAD high level architecture is depicted in FIG. 1. The design is intended to be fully distributed for scalability and ease of deployment. This means that all the functional blocks shown could run on one AIX server or on several machines. MAD is preferrably deployed using IBM's Global Web Architecture (“GWA”) infrastructure. In this figure, the components outside the dotted-line box (10) are existing systems and components which are interfaced to the MAD system. Existing database contents (14, 15) are migrated into MAD such that a security scan team may periodically extract a list of servers and its attributes from MAD, and they may use this list as input to a scanning tool to test these servers for vulnerabilities.
[0026] The Common Web Authentication (“CWA”) (12) is a plugged-in module to the WebSphere application server (102) to perform authentication using IBM Intranet ID (“IIP”) and Password. The CWA system issues standard Lightweight Directory Adapter Protocol (“LDAP”) to a personnel database (13) such as the IBM internal “BluePages” database to achieve this authentication. In alternate uses and embodiments, any suitable personnel database may be employed in this role, as well as alternative authentication servers or services.
[0027] MAD Administrators and end users (11) access MAD (10) through an ordinary web browser (100) provided with a Graphical User Interface (“GUI”). Depending on their role, different MAD users have different privileges in terms of creating, editing, viewing and producing reports of various kinds of records within the MAD database (107). The privileges of these users are determined by built-in tables that can be created/modified by the MAD Administrator. Some of these privileges can also be granted to certain people by specifying their names in certain MAD records when they are created.
[0028] Environment
[0029] Table 1 summarizes the system components utilized in the preferred embodiment. It will be recognized by those skilled in the art that many alternative components may be employed without departure from the scope of the invention.
1TABLE 1
|
|
System Components of the Preferred Embodiment
Minimum
ComponentModel and SourceVersion
|
Operating SystemIBM AIX4.3.3
DatabaseIBM DB2 Enterprise7.2 for AIX
Edition
Web Application ServerIBM WebSphere3.5.5 for AIX
HTTP ServerIBM HTTP Server1.3.12.2 for AIX
Java Developers KitIBM Java SDK1.2.2 for AIX
Mail messagingSendmail (provided with
AIX 4.3.3)
Personnel Database I/FIBM BluePages1.2.1
Java Toolkit
CWA Authentication I/FIBM BluePages1.2.1
Java Toolkit
Web BrowserNetscape Navigator6.2
or Microsoft Internet
Explorer5.5
|
[0030] The MAD GUI (100) allows access to the application via a conventional web browser such as Navigator or Internet Explorer. The GUI pages are served using the IBM HTTP Server with IBM WebSphere Application Server. The Cascading Style Sheets (CSS) feature is used to define the style and format of web pages. This way, the style of all MAD web pages can be changed instantly by changing its style sheet.
[0031] All users (Admin and end users) must initially authenticate themselves to the system. Any corporate employee or intranet user with an intranet user ID and password can log into the MAD system. An authenticated user, however, does not necessarily have rights to records of the MAD database, as different levels of privileges are assigned to different users via internal tables within MAD, which are created and maintained by authority of the MAD system administrator. Depending on a user's privilege level, each user may be provided different menu options on these web pages.
[0032] Java Server Pages and Java Beans (103) provide the necessary business logic for the MAD system. The Java Server Pages process user input, and produce the HTML pages to be displayed by the IBM HTTP Server. The Java Beans handle all business logic for MAD (10), such as processing requests and transactions from the GUI, creates database queries, and submits queries to the DB2 Server (106) at the system back end.
[0033] The MAD database (107) contents are periodically (e.g., on a daily or nightly basis) replicated in another DB2 database (108), which serves as the database from which users such as the security scan teams can read and export data. This reduces the locking of records in the main MAD database (107) and increases performance of the system.
[0034] Because the invention provides a replacement for the ExNAD (14) and InNAD (15), an Importer (105) is provided to facilitate the migration of the data from these older databases to the MAD database (107). The Importer (105) extracts the data from disparate databases, converts it into an appropriate, uniform and comprehensive format, and then uses structured query language (“SQL”) to write the data into the MAD database (107). Error checking on the data content is preferrably performed where possible, with detected error conditions being output to the system's standard output and to a log file for ease of debugging and/or correction.
[0035] One considerable deficiency with the older databases in many cases is that the information contained within them for the registered devices can be out of date or incorrect. The Removal/Updating System (104) of MAD (10) is eliminates this deficiency. These agents are basically automatic scripts that are scheduled to perform validation and updates of certain data fields in MAD records using the internal personnel database as a reference.
[0036] Personnel requiring access to the data in the MAD database such as the scan teams (109) may be assigned read-only access to the database tables, which enables them to pull out any MAD data from the database tables in any format, as needed.
[0037] The web-based front end interface (100) is intended for use by all MAD users, and it preferrably incorporates usability features to present a pleasant and productive interface. The validation of fields in the MAD Graphical User Interface preferrably include the following requested types of parameter checks:
[0038] (a) Syntax checking performed on those free text input fields where the syntax format is known beforehand;
[0039] (b) range checking applied where applicable; and
[0040] (c) enforcement of valid user choices and selections, where applicable.
[0041] Turning now to FIG. 2, more details of an actual deployment of the invention are shown, wherein details of other deployments may vary from this figure. The authentication server (26) operates to authenticate users who wish to access the system, as previously described. The updater (28) performs the importing of data from the older databases as well as incorporation of new data into the MAD database (29) when new files of addresses are made available by administrators and/or users, preferably using a timed function such as AIX CRON. The updater is also preferrably continually scanning the personnel database to determine if any data in the MAD database (29) is stale or incorrect, and that all indicated record owners are actually still with the company. If an incorrect or inconsistent record is found, a notification mail can be sent to an administrator for further action. All of this equipment is preferrably deployed within the corporate intranet, such as IBM's GWA. Data can be replicated outside this intranet (e.g. the “dpropr” connection shown), as well.
[0042] The web browser (100) can be used to access the system using a URL (21) via a network, and network dispatchers (21, 24) with a Web Traffic Express (“WTE”) proxy cluster is used to interface to the application server (25).
[0043] MAD Database Records Hierarchy
[0044]
FIGS. 3 and 4 depict the relationship between different types of records of the Mixed Address Database. The main record types of the system are:
[0045] a. connections (31);
[0046] b. accounts (32) (Intranet or Internet);
[0047] c. all accounts contain Account Authorized Users (42) and Additional Account Owners (Additional Owners include the record creator);
[0048] d. sub-accounts (33) (Intranet or Internet) which contain Device Authorized Users (43) and Additional Owners (Additional Owners include the record creator);
[0049] e. devices (34, 36); and
[0050] f. all devices contain Additional Device Owners (Additional Owners include the record creator).
[0051] Connections (31) are primarily created and managed by the Connection Administrators. The purpose of a Connection record is to specify the IP address ranges associated with such a connection.
[0052] Accounts (32) are the top level of the MAD data arrangement, and are primarily created by Regional Administrators. Each account is identified as being an Intranet or Internet Account. Before an Internet Account is created, the related Connections must have been previously created by the Connection Administrators. Internet Accounts contain one or many connections.
[0053] Once the Account has been created, Sub-Accounts (33, 35) can be created under them by the MAD Administrator, Regional Administrator, Account Primary or Secondary Owners, or Account Authorized Users. Only Intranet-Sub-Accounts can be created under Accounts identified as type Intranet. And only Internet Sub-Accounts can be created under Accounts identified as type Internet.
[0054] Devices (34, 36) can then be created under these Sub-Accounts. Preferably, authorized users who can create devices are a MAD Administrator, Regional Administrator, Account Primary and Secondary Owners, or Account Authorized Users, Sub-Account Primary and Secondary Owners and Device Authorized Users.
[0055] Users and Authority
[0056] The initial set of administrators is preferably identified at the time the database schema is created. Tables 2 and 3 show the identified MAD users who are given specific authority levels in the MAD system, in which their hierarchy is identified in parenthesis before the role note. Actions which can be taken by the MAD users identified below are:
[0057] a. create;
[0058] b. update;
[0059] c. pseudo-delete;
[0060] d. delete; and
[0061] e. view.
[0062] The pseudo-delete action only marks a record for deletion, but does not actually delete the marked record. The marked records then can only be viewed and managed (i.e., actually deleted or un-deleted) by the MAD Administrator. The MAD Administrator must also, preferably, first perform a pseudo-delete of all records before he or she can actually delete those records, for safety purposes.
2TABLE 2
|
|
MAD Roles and Privileges
RolesPrivileges
|
MADFull authority to entire DB
Administrator
RegionalFull authority to Account records
Administrator
ConnectionFull authority to Connection records
Administrator
ConnectionUpdate/Delete Authority for Connection records he
Ownersowns
Account OwnersUpdate/Delete for owned Accounts.
Full authority to Sub-accounts
MAD AccountCreate Sub-accounts for authorized Accounts. Full
Authorized Usersauthority for Devices under these Sub-accounts.
Sub-AccountUpdate/Delete owned Sub-accounts. Full authority for
OwnersDevices under these Sub-accounts.
MAD DeviceCreate Devices for authorized Sub-accounts.
Update/Delete
Authorized UsersDevices for owned Sub-accounts.
Device OwnersUpdate/Delete owned Device records
General UsersCorporate employee or staff member with Intranet
ID & PW. View only of all records.
|
[0063]
3
TABLE 3
|
|
|
MAD Roles and Privileges
|
Roles
Privileges
|
|
MAD Administrator
The highest authority
|
This user has the authority to change any record in any
|
MAD table via access from the screens.
|
Controls contents of all base tables (i.e., Business Unit,
|
Site, Geo, and Device Type Tables) that are used for
|
pull-down information on the screens.
|
The MAD Administrator has actual delete ability to all
|
records and tables.
|
Query authority on al MAD tables.
|
MAD Connection Administrators
Create and query authority for all Connection records.
|
(stand-alone; rights do not flow down)
|
Update and Pseudo Delete authority to Connection
|
Records.
|
Grants update authority to MAD Connections
|
indirectly by specifying MAD Connection Record
|
Primary and Secondary Owners.
|
Can specify MAD Connection Record Primary and
|
Secondary Owners. The Connection Primary and
|
Secondary Owners automatically become MAD
|
Regional Administrators.
|
Controls content of Connections Pull Down Menu on
|
Account Records indirectly by adding and removing
|
Connection Records
|
Query authority on all external MAD tables. External
|
MAD Tables refer to those tables which hold
|
information intended for end users (i.e., Connections,
|
Accounts, Sub-Accounts, Devices and the Authorized
|
Users). Internal tables would refer to the MAD
|
Administrator managed data and such as ISPs, Sites,
|
Geos, Business Units, Device Types, Administrator
|
information, etc.
|
Connection Primary and Secondary
Update and pseudo delete authority for all Connection
|
Owners (these users also automatically
records in which he is identified as the owner.
|
become Regional Administrators
|
Query authority on all external MAD tables.
|
MAD Regional Administrators
Create and Query authority for all Account records.
|
Query authority on all external MAD tables.
|
Account Primary and Secondary Owners
Update and pseudo delete authority for all account
|
Additional Account Owners
records in which he is identified as the owner.
|
Create, update, and pseudo delete for all sub-account
|
(i.e., Intranet and Internet Account records) and
|
devices under the accounts which they own.
|
Query authority on all external MAD tables.
|
MAD Account Authorized Users
Can create sub-accounts (i.e., Intranet and Internet
|
Sub-account) records under any account which he is
|
identified as an authorized user.
|
Create, update and pseudo delete for devices under
|
those sub-accounts which he owns.
|
Query authority on all external MAD tables.
|
Internet Sub-Account Primary Secondary
Update and pseudo delete for all Internet sub-accounts
|
Owners
which he owns.
|
Additional Sub-Account Owners
Create, update and pseudo delete for devices under
|
those sub-accounts which he owns.
|
Query authority on all external MAD tables.
|
MAD Device Authorized Users
Create devices under any sub-account which he is
|
identified as an authorized user.
|
Update and pseudo delete for all devices under those
|
sub-accounts which he owns.
|
Query authority on all external MAD tables.
|
Device Business and Technical Owners
Update and pseudo delete for all devices which he
|
Additional Device Owners
owns.
|
Query authority on all external MAD tables.
|
General End User (i.e., users not
Query authority only to “all” external MAD data (i.e.,
|
identified in any of the above roles.
via the View option).
|
No create, edit or delete authority.
|
|
[0064] Authentication
[0065] Users are authenticated before they are given access to MAD. As mentioned before, an authenticated user does not necessarily have any privileges to the MAD database. Once the user has been authenticated, the user is identified by serial number and country code, preferably, and his level of authority in the system is determined from the system's authorization tables. The user's serial number and country code are used to uniquely identify a corporate employee, and personnel database is used to gather all employee information.
[0066] Main Screen
[0067] The navigator options are displayed based on a user's role. The primary MAD “screen” or page provides all available options. The MAD Administrator has access to all navigator options in the screen navigator bar. For the other user types, the main screen is dynamically built with only the options that he or she can perform depending on his or her MAD authority.
[0068] Predefined lists (e.g. drop-down options for end users) are created and maintained by the MAD Administrator. These lists are accessed in the Navigator bar and listed as navigator options, preferrably including:
[0069] a. Sites;
[0070] b. Internet Service Providers (“ISPs”);
[0071] c. Geographic regions (“Geos”);
[0072] d. Device Types; and
[0073] e. Business units.
[0074] Navigator options preferrably include Add, Update, Delete or List in the Navigator bar, for a Connection. These same features, Add, Update Delete and List, are also available under each other major category:
[0075] a. Accounts;
[0076] b. Internet Sub-Accounts;
[0077] c. Intranet Sub-Accounts; and
[0078] d. Devices.
[0079] By design, the navigator options in the navigator bar are also located in the primary view for each category:
[0080] a. Accounts;
[0081] b. Internet Sub-Accounts;
[0082] c. Intranet Sub-Accounts; and
[0083] d. Devices.
[0084] The “Add” navigator option is available for each major category including Accounts, Internet Accounts, Intranet Accounts and Devices. The Connection Record contains the following information:
[0085] 1. Connection Name, Site (user chooses from a predefined list; this list is provided by the Site table which is managed by the MAD Administrator), IP Ranges (if multiple are needed, the user will press an additional IP Range button, not shown above, which will present a field for the additional IP value(s)), ISPs (possible multiples which can be selected from a drop-down list), and the Primary and Secondary Owners.
[0086] 2. When a Connection is added, the identified Primary and Secondary Owners on the record automatically become Regional Administrators. Subsequently, if the user is removed from being an owner of a connection record (and he owns no other connection records or has not been specifically marked as a Regional Administrator by the MAD Administrator), his Regional Administrator authority is removed.
[0087] 3. Although Serial Number and Country Code are the keys to identify an employee through the program logic and database storage, the web presentation and request of the employee information on the screen (i.e., Primary Owner field and Secondary Owner field) are by other means since the user may not know the serial number. The screens both request and show the employee's Mail name. For a screen that is requesting the user to identify an employee via the Notes Mail name, the MAD application may use that name in a lookup to the personnel database to find his Serial Number and Country Code and other related information.
[0088] The “Update” navigator option is also available for each major category including Connections, Accounts, Internet Sub-Accounts, Intranet Sub-Accounts and Devices. To update a record, the user must first enter search criteria to locate the record(s) he or she wishes to update.
[0089] System Logical Processes
[0090] The logical processes are preferrably implemented as Java Beans and Server Pages, as previously mentioned, but may alternately be implemented in any other suitable programming language or paradigm. The following descriptions provide details on the preferred functionality of the logical processes.
[0091] Authenticating A User
[0092] First, the user logs in to MAD with his corporate intranet ID and password. If successful, then user access type is determined by the MAD application through checking the MAD_Users table to determine which “type” of user this person is. Depending on the user's type, the appropriate screen is presented to the user. Certain users have more privileges than others, therefore the screens presented to the end user will differ depending on their type.
[0093] Creating a MAD Connection Record
[0094] This function is available to MAD Administrators and Connection Administrators. From the main view, the Connections-Add option is selected. The Add selection will bring up a screen asking for a Connection name. Once the connection name is submitted, the database is accessed to verify whether or not this connection name is already used.
[0095] If the connection name is already in use, the user will be prompted with a screen explaining this and asking for a different connection name. If the connection name is not present in the database, then the user will be presented with a refreshed screen with fields displaying the selected connection name, site selection, IP range input, ISP (Internet Service Provider) selection, and text fields for Primary and Secondary owners. Preferably, a site location may be selected from a pull down list, in which only one item can be selected. Additionally, an IP range is created, followed by operating a user control to add the IP range to the possible list of IP ranges available or permitted for one connection record. Preferably, the IP range is validated with the database to make sure that the range is not taken by another connection record, as well as checking the IP range for consistency with IP standards.
[0096] Next, an ISP is selected, preferably from the pull down list with the possibility of making multiple sections. And, a primary and secondary owner are defined using a format such as an email or user name format.
[0097] The user can then invoke a verification process to check the record and to write it to the database if it passes verification. The primary and secondary owner fields are preferably validated to verify their presence in the MAD database. If one or more names are not present in the MAD database, the personnel database may be checked to see if they exist there. If an owner's name is not found in either database, then the page is refreshed with the current information and an error message for the owner name that is invalid. After all fields are successfully validated, the screen is updated to state a successful submission of a connection record.
[0098] Updating a MAD Connection Record
[0099] This function is available to the user types of MAD Administrator, Connection Administrator, and Connection Owner (only for the records that they own). Initially, on the main screen, a connection update option is selected, which causes the screen to be refreshed to include a search box and a “list all” button. To obtain a list of connections, predefined choices from the connection view are provided to the user. The “list all” button shows all connections the user can access. Each record provides a link (one click) to obtain the edit mode for each connection record to update.
[0100] The screen then refreshes with the same fields as the Add connection screen (previously described), but the fields are filled out with the information listed for that record. All IP Ranges are listed in their own field sets.
[0101] In this option, the Connection record owner cannot edit the connection name, while MAD Administrators and Connection Administrators still have full edit capability to all other editable fields on the record. When changes are made, a “submit” button may be selected, and the data will be validated and screen will be refreshed explaining errors if any are present. If the Connection name field is changed, then it is verified that the name is not already placed in the database. If an IP range has been changed, then the range is verified with the database to make sure the range is available, meaning the range is not already taken by another Connection Record. Finally, the owners' names are verified that they are either in database already, or are in the corporate personnel database, in order to be saved to the MAD database.
[0102] Deleting MAD Connection Records
[0103] This function is available to the user types of MAD Administrator, Connection Administrator, and Connection Owner, the last two of which only have pseudo-delete permissions.
[0104] From the main screen, a connections-delete option is selected, which causes the page to be refreshed to include a search and “list all” button. The use can then choose from a list of predefined queries to obtain a list of records which the user is allowed to delete. The “list all” button causes all connections the user can access to be shown, with check boxes to the left of each connection record, so that the user can select the connection(s) he or she wants to delete.
[0105] If the indicated Connection record is found, the user is prompted with a message asking “Are you sure you want to delete this Connection”. If the Connection record is not found, then the screen is refreshed stating that the record could not be found.
[0106] If the record(s) selected for deletion has other records dependent on it, the user is presented with this information and is informed that he must first delete all references before this record can be removed.
[0107] If the deletion is performed by the Connection Administrator, the record's delete flag is marked (e.g. pseudo-deletion), and the record no longer shows up in the Connection Administrator's list of connections. Furthermore, that connection is no longer shown to the user as a connection choice.
[0108] Creating an Account Record
[0109] This function is available to the user types of MAD administrator, Regional Administrator. On the main screen or page, an account-add option is selected, which causes the page to be refreshed with several fields and a “submit” button, including whether or not this account is for Internet or intranet devices, and an account name input field.
[0110] After the “submit” option is selected, the account name will be verified. If it is already in the database, the user is prompted to select another account name, else the page is refreshed with selections from above and additional input boxes.
[0111] If “Internet” type account was selected, then a connection list box is provided as the next choice. The connection list box is then filled with connection record names pulled from the database. Multiple connection records can be selected to be associated with the account record. Intranet records, however, do not have the connection field. Next, primary and secondary owners are specified. In the final set of fields, Account Authorized Names may be specified.
[0112] By selecting the “submit” option or button, the record is verified, and if it passes, it is written to the MAD database. The primary owner, secondary owner, and Authorized names are validated by checking the database to see if they are present as previously described in other options and functions.
[0113] Creating an Internet Sub-Account Record
[0114] This function is available to the user types of MAD Administrator, Account Primary Owner, Account Secondary Owner, Additional Account Owner, and Account Authorized Users. A series of options and pages are presented to the user upon selecting this option in which the user chooses the Internet account under which to create a new sub-account record, being presented only with Internet accounts to which the user is authorized to add sub-accounts. The user may identify other authorized users who can create and manage devices under this sub-account. Upon submission of the information, a specified IP range is verified that it is within IP range specified in the account's connection record(s) range, and not in a range taken by a related internet sub-account. Also, the Owners and Device Authorized names are verified with the MAD database and personnel databases, as previously described. If all verification is completed successfully, the new sub-account record is created.
[0115] Updating an Internet Sub-Account Record
[0116] This function is available to the user types of MAD Administrator, Account Primary Owner, Account Secondary Owner, Additional Account Owners, Account Authorized users, Sub-Account Primary Owners, Sub-Account Secondary Owners, and Additional Sub-Account Owners, and functions similarly with screens, prompts, and validation processes as previously described for other functions.
[0117] Deleting Internet Sub-Account Records
[0118] This function is available to the user types of MAD Administrator, Account Primary Owner, Account Secondary Owner, Additional Account Owners, Account Authorized Users, Sub-Account Primary Owners, Sub-Account Secondary Owners, and Additional Sub-Account Owners. Pseudo-delete restriction is preferrably applied to all of these user types except the MAD administrator. This function follows the same processing conventions as the other, previously described functions.
[0119] Creating an Intranet Sub-Account Record
[0120] This function is available to the user types of MAD Administrator, Account Primary Owner, Account Secondary Owner, Additional Account Owners, and Account Authorized Users. During this process, the user is presented with screens or pages in which the account under which to create a new sub-account is specified (preferably from a pull-down list of accounts under which the user is permitted to create sub-accounts), and other authorized users who can create and manage devices under this sub-account are specified. As with the other processes previously described, all necessary information including IP range, user names, subaccount name, and device are verified prior to creating the record.
[0121] Updating an Internet Sub-Account Record
[0122] This function is available to the user types of MAD Administrator, Account Primary Owner, Account Secondary Owner, Additional Account Owners, Account Authorized Users, Sub-Account Primary Owners, Sub-Account Secondary Owners and Additional Sub-Account Owners. Thus process is similar to the previously-described process for adding Internet Sub-Accounts, and for Updating Connections'.
[0123] Deleting Internet Sub-Account Records
[0124] This function is available to the user types of MAD Administrator, Account Primary Owner, Account Secondary Owner, Additional Account Owners, Account Authorized Users, Sub-Account Primary Owners, Sub-Account Secondary Owners, and Additional Sub-Account Owners. This process operates similarly to the process for Deleting Connections, preferably with the pseudo-delete restrictions as well.
[0125] Creating a Device Record
[0126] This function is available to the user types of MAD Administrators, Regional Administrators, Account Primary Owner, Account Secondary Owner, Additional Account Owners, Account Authorized Users, Sub-Account Primary Owners, Sub-Account Secondary Owners, Additional Sub-Account Owners and Device Authorized Users. From the main page or screen, an add-device option is selected, and the new device is specified to be an Internet (external) or intranet (internal) device. Also, the sub-account to which this device is attached is specified by the user, and a Device Category (Server, Network Infrastructure or Network Infrastructure (Restricted)) is selected by the user. Preferably, only MAD Administrators and Connection Administrators are able to see the Network Infrastructure (Restricted) choice. Also, the user must choose a Machine Type (IP or SNA), and then provide the Business and Technical Owner information. Prior to adding the device to the MAD database, the provided information will be verified as previously described.
[0127] Other Processes
[0128] Other processes for:
[0129] a. Updating and deleting Device Records;
[0130] b. Bulk (Global) Update of Record Owners;
[0131] c. Finalizing and undeleting pseudo-deleted records;
[0132] d. Defining, deleting and updating MAD Administrators;
[0133] e. Defining, deleting, and updating Regional Administrators;
[0134] f. Creating, deleting and updating Connection Administrators;
[0135] g. Adding, updating and deleting External MAD Users;
[0136] h. Adding, updating and deleting Sites;
[0137] i. Defining, updating and deleting Geographic Regions (Geos); and
[0138] j. Adding, updating and deleting device types, business units, and ISP's;
[0139] are preferrably provided, with similar user-specific authorities and verification of information prior to record modification in the MAD database.
[0140] MAD Database Design
[0141] A MAD_USERS table, exemplified in Tables 3 and 4, holds a sub-set of employees who exist in the corporate personnel database. with select information from BluePages. The only employees who are placed in this table are those who have some type of authority in the MAD system, i.e, they have at least one (or more) entry in the USER_AUTH table for their MAD_USERS entry.
[0142] This table stores all active MAD users in the MAD system. An active MAD user is any employee who has special authority to either create, update or delete any of the MAD information. These employees are stored in this table and program logic is used to update the role values (users authority) as the employees names in the actual table changes (i.e., Account Primary Owner, etc . . . ).
[0143] Logic is used to read this table to determine the authority the user has in the MAD system once he has successfully authenticated himself. Once his authority level is determined, the screen can be presented with the actions he can perform in the MAD application, i.e., a MAD Administrator has more authority than a Device Owner, so the MAD Administrator's screens would have more options that the Device Owner's. Preferably, the MAD-USERS table is managed by the MAD Administrator only.
4TABLE 3
|
|
MAD-USERS Table Privileges
Del-Pseudo
CreateEditeteDeleteQueryImportExport
|
MADYYYYYYY
Admin
RegionalY
Admin
Connec-Y
tion
Admin
Connec-
tion
Owners
Account
Owners
(Primary
and
Second)
AccountY
Author-
ized User
Internet
Owners
(Primary
and
Second)
Intranet
Owners
(Primary
and
Second)
DeviceY
Author-
ized User
DeviceY
Owners
Business
& Tech)
GeneralY
Mad User
|
[0144]
5
TABLE 4
|
|
|
MAD-USERS Table Schema
|
Key
Accept
|
Column Name
Description
Type
Nulls?
Type
Length
|
|
MAD_ID
Unique Identifier
Primary
No
Integer
|
Key
|
BUSINESS—
Business Unit.
Foreign
No
Integer
|
UNIT_ID
Foreign
|
key to the
|
BUSINESS—
|
UNIT table.
|
SERIAL—
Employee's Serial
No
No
Charac-
15
|
NUMBER_CC
Number and
ter
|
Country Code
|
from Blue Pages
|
NOTES—
Employee's Notes
No
No
Varchar
128
|
MAIL
Mail
|
Address from
|
Blue Pages
|
EMAIL
Employee's
No
No
Varchar
128
|
e-mail Address
|
from Blue Pages
|
STATUS
Employee Status:
No
No
Charac-
1
|
‘A’ Active or
ter
|
‘G’ Gone from
|
Blue Pages
|
STATUS—
Status Change
No
No
Time-
|
CHNG_TS
Timestamp.
stamp
|
Stamped with
|
current time/date
|
whenever the
|
status field
|
changes (from A
|
to G; or G to A).
|
SCAN—
Date of scan
No
Yes
DATE
|
NOTIFY—
notification
|
DATE
if applicable.
|
|
[0145] Authority Table
[0146] The authority table, depicted in Table 5, represents the types of users with their authority level in the MAD system. The authority table is for internal logic only, used between the MAD-USERS table and USER-AUTH table to indicate a MAD Users authority(s). A MAD User can play multiple roles by having multiple authorities.
6TABLE 5
|
|
Authority Table
ColumnKeyAccept
NameDescriptionTypeNulls?TypeLength
|
AUTH—Unique Identifier KeyPrimaryNoInteger
ID
DESCRDescriptionNoNoVarchar128
|
[0147] USER-AUTH TABLE
[0148] The USER-AUTH table, illustrated in Table 6, holds the MAD-USERS authority levels that they possess in the MAD system. Each MAD-USERS will have at least one (or more) entries in the USER-AUTH table. The USER-AUTH is for internal logic only, and is used to determine a user's authority level in the MAD system. Upon logging in to the MAD system, this table is checked and the user's authority is determined at this time. This dictates which buttons he will be able to see on his MAD web screens and which functions he can perform in MAD. A MAD_USER can play multiple roles by having multiple authorities.
7TABLE 6
|
|
USER-AUTH Table
ColumnKeyAccept
NameDescriptionTypeNulls?TypeLength
|
MAD_IDUnique Identifier KeyPri-NoInteger
mary
AUTH—Authority ID (referencePri-NoInteger
IDthe AUTHORITY table).mary
Each MAD_ID has allFor-
authorities listed in theeign
table. The authorities are
set by the AUTH_FLG
below.
AUTH—Indicates whether or notNoNoSmallint
FLGthis auth is set.
PRI-Is this user a PrimaryNoNoSmallint
MARYAdministrator of the
ADMINAUTH-ID listed? Only
one user per Auth Type
(AUTH-ID) can be
marked as a primary
administrator
ADDED—Was this user added byNoNoSmallint
BY-the MAD Admin through
ADMINthe Administrator
screens? See notes below
|
[0149] NEXT-ID NUM Table
[0150] This table, illustrated by Table 7, provides a counter which holds the numbers used in each table as the Primary Key ID. The NEXT_ID_NUM table is for internal logic only.
8TABLE 7
|
|
NEXT_ID_NUM Table
ColumnKeyAccept
NameDescriptionTypeNulls?TypeLength
|
TABLEUnique Identifier KeyPrimaryNoChar128
NAME
ID_NUMNext Number for theNoNoInteger
table primary key
|
[0151] IP TABLE
[0152] This table, shown in Table 8, contains valid IP addresses. Storing them in this table ensures their uniqueness. The Device table uses the information in the IP table. The IP table is for internal logic only.
9TABLE 8
|
|
IP Table
ColumnKeyAccept
NameDescriptionTypeNulls?TypeLength
|
IP_ADDRUnique IP AddressPrimaryNoInteger
IP_STRUnique IP AddressNoNoCharac-16
Stringter
|
[0153] HOSTNAME Table
[0154] This table, shown in Table 9, contains valid host names. Storing them in this table ensures their uniqueness. The device record use the information in the HOSTNAME table. The HOSTNAME table is for internal logic only.
10TABLE 9
|
|
HOSTNAME Table
KeyAccept
Column NameDescriptionTypeNulls?TypeLength
|
HOST_IDUnique IdentifierPrimaryNoInteger
Key
HOSTNAMEUnique HostnameNoNoCharac-128
ter
|
[0155] VALIDATION_LEVEL Table
[0156] This table, as exemplified in Table 10, holds information controlling the validation process, both through the batch job with directing the sending of mail at specified intervals (days) and determining views from the web screens. The VALIDATION_LEVEL table is for internal logic only.
11TABLE 10
|
|
VALIDATION_LEVEL Table
ColumnKeyAccept
NameDescriptionTypeNulls?TypeLength
|
VAL—Unique Identifier KeyPrimaryNoInteger
LEVEL
VAL—Validation number ofNoNoSmallint
DAYSdays between levels
identified
DESCRValidation levelNoYesVarchar256
description
|
[0157] NAV_LINKS Table
[0158] The NAV_LINKS table holds navigation bar information to be used in the creation of buttons and links on the web screens. Table 11 shows an example of such a table. The NAV_LINKS table is for internal logic only.
12TABLE 11
|
|
NAV_LINKS Tables
ColumnKeyAccept
NameDescriptionTypeNulls?TypeLength
|
NAV—Unique Identifier KeyPrimaryNoInteger
LINK_ID
ORDER—Machine Type NameNoNoInteger
NUM
LEVELNavigation ButtonNoNoInteger
Level
NAMENavigation ButtonNoNoVarchar46
Name
LINKNavigation ButtonNoNoVarchar512
Link
DESCRMachine TypeNoYesVarchar2,048
Description
|
[0159] NAV_AUTH Table
[0160] The NAV_AUTH Table, shown in Table 12, holds navigation bar information as it applies to each user type. The NAV_AUTH Table is for internal logic
13TABLE 12
|
|
NAV_AUTH Table
ColumnKeyAccept
NameDescriptionTypeNulls?TypeLength
|
AUTH—Foreign key to thePrimaryNoInteger
IDAUTHORITY tableForeign
NAV—Foreign key to theNoNoInteger
LINKS_IDNAV_LINKS table
|
[0161] URL_LINK Table
[0162] The URL_LINK Table, shown in Table 13, holds URL information to be used in the creation of buttons and links on the web screens. The URL_LINK table is for internal logic only.
14TABLE 13
|
|
URL-LINK Table
ColumnKeyAccept
NameDescriptionTypeNulls?TypeLength
|
URLUnique Identifier KeyNoNoChar254
LINKNavigation Button LinkNoNoVarchar512
|
[0163] The MAD Administrator preferably is the only user to see the screen options to manage the following tables. These tables hold the information that is supplied to the corresponding fields in other records., i.e., the information supplied by the MAD Administrator in the Site table is the list which is presented to the user in the Site pull-down field.
[0164] EXTERNAL_USERS Table
[0165] A MAD External User, shown in Tables 14 and 15, represents a person identified and added by the MAD Administrator into this table. These MAD External Users are not listed in the corporate personnel database, but only in this table. These users can be identified only as Device Owners but will not log into the system since they do not have a corporate Intranet ID and Password to access the MAD system. The EXTERNAL_USERS table is managed by the MAD Administrator only.
15TABLE 14
|
|
EXTERNAL_USERS Table Privileges
Pseudo
PrivilegesCreateEditDeleteDeleteQuery
|
MAD AdminYYYY
Regional Admin
Connection Admin
Connection Owners
Account Owners (Primary
and Second
Account Authorized User
Internet Owners (Primary
and Second)
Intranet Owners (Primary
and Second
Device Authorized User
Device Owners (Business
& Tech)
General mad user
|
[0166]
16
TABLE 15
|
|
|
EXTERNAL_USERS Table Schema
|
Column
Key
Accept
|
Name
Description
Type
Nulls?
Type
Length
|
|
EXTERNAL—
Unique
Primary
No
Integer
|
USERS_ID
Identifier Key
|
NAME
Employee
No
No
Character
128
|
Name
|
EMAIL
Employee's
No
No
Varchar
128
|
Email Address
|
Company
Company
No
Yes
Varchar
128
|
Name
|
|
[0167] SETTINGS Table
[0168] The SETTINGS Table (Tables 16 and 17) holds configuration values/parameter information to drive the MAD background programs such as:
[0169] A. MAD_USER removal
[0170] B. Revalidation
[0171] C. Device Data import (i.e., Migration, simple import)
[0172] D. Removal of pseudo deleted recs
[0173] This is provided for ease of setting for the MAD Administrator. The SETTINGS table is managed by the MAD Administrator.
17TABLE 16
|
|
SETTINGS Table Privileges
Pseudo
PrivilegesCreateEditDeleteDeleteQuery
|
MAD AdminYY
Regional Admin
Connection Admin
Connection Owners
Account Owners (Primary
and Second
Account Authorized User
Internet Owners (Primary
and Second)
Intranet Owners (Primary
and Second
Device Authorized User
Device Owners (Business
& Tech)
General mad user
|
[0174]
18
TABLE 17
|
|
|
SETTINGS Table Schema
|
Column
Key
Accept
|
Name
Description
Type
Nulls?
Type
Length
|
|
NAME
Unique Identifier Key,
Primary
No
Varchar
56
|
Parameter Name
|
APP
Unique Identifier, Key,
Primary
No
Varchar
128
|
Program/App Name
|
VALUE
Parameter Value
No
No
Varchar
256
|
DESC
Additional Description
No
Yes
Varchar
128
|
|
[0175] BUSINESS_UNIT Table
[0176] The BUSINESS UNIT Table, shown in Tables 18 and 19, holds Business Unit Information. This table is managed (add, update, and delete) by the MAD Administrator. The BUSINESS_UNIT table is managed by the MAD Administrator.
19TABLE 18
|
|
BUSINESS_UNIT Table Privileges
Pseudo
PrivilegesCreateEditDeleteDeleteQuery
|
MAD AdminYYYY
Regional Admin
Connection Admin
Connection Owners
Account Owners (Primary
and Second
Account Authorized User
Internet Owners (Primary
and Second)
Intranet Owners (Primary
and Second
Device Authorized User
Device Owners (Business
& Tech)
General mad user
|
[0177]
20
TABLE 19
|
|
|
BUSINESS_UNIT Table Schema
|
Column
Key
Accept
|
Name
Description
Type
Nulls?
Type
Length
|
|
BUSINESS
Unique Identifier
Primary
No
Integer
|
UNIT_ID
Key
|
NAME
Business
No
No
Character
46
|
Unit Name
|
DESCR
Business
No
Yes
Varchar
256
|
Unit Description
|
|
[0178] REGION Table
[0179] This table, which is shown in Tables 20 and 21, contains all identified Geographies, and is managed by the MAD Administrator only.
21TABLE 20
|
|
REGION Table Privileges
Pseudo
PrivilegesCreateEditDeleteDeleteQuery
|
MAD AdminYYYY
Regional Admin
Connection Admin
Connection Owners
Account Owners (Primary
and Second
Account Authorized User
Internet Owners (Primary
and Second)
Intranet Owners (Primary
and Second
Device Authorized User
Device Owners (Business
& Tech)
General mad user
|
[0180]
22
TABLE 21
|
|
|
REGION Table Schema
|
Key
Accept
|
Column Name
Description
Type
Nulls?
Type
Length
|
|
REGION_ID
Unique
Primary
No
Integer
|
Identifier Key
|
NAME
Region Name
No
No
Character
46
|
DESCR
Region
No
Yes
Varchar
256
|
Description
|
|
[0181] SITE TABLE
[0182] This tables, which is set forth in Tables 22 and 23, contains all identified Sites. Each site identifies which Region to which it belongs. The SITE Table is preferably managed by the MAD Administrator only.
23TABLE 22
|
|
SITE Table Privileges
Pseudo
PrivilegesCreateEditDeleteDeleteQuery
|
MAD AdminYYYY
Regional Admin
Connection Admin
Connection Owners
Account Owners (Primary
and Second
Account Authorized User
Internet Owners (Primary
and Second)
Intranet Owners (Primary
and Second
Device Authorized User
Device Owners (Business
& Tech)
General mad user
|
[0183]
24
TABLE 23
|
|
|
SITE Table Schema
|
Column
Key
Accept
|
Name
Description
Type
Nulls?
Type
Length
|
|
SITE_ID
Unique Identifier
Primary
No
Integer
|
Key
|
REGION
Unique Identifier
No
No
Integer
6
|
ID
Key
|
NAME
Site Name
No
No
Character
256
|
DESC
Site Description
No
Yes
Varchar
256
|
|
[0184] ISP Table
[0185] The ISP Table, shown in Tables 24 and 25, holds Internet Service Provider information to be used in the creation of Connection Records. This table is managed (add, update, and delete) by the MAD Administrator.
25TABLE 24
|
|
ISP Table Privileges
Pseudo
PrivilegesCreateEditDeleteDeleteQuery
|
MAD AdminYYYY
Regional Admin
Connection Admin
Connection Owners
Account Owners (Primary
and Second
Account Authorized User
Internet Owners (Primary
and Second)
Intranet Owners (Primary
and Second
Device Authorized User
Device Owners (
Business & Tech)
General mad user
|
[0186]
26
TABLE 25
|
|
|
ISP Table Schema
|
Column
Key
Accept
|
Name
Description
Type
Nulls?
Type
Length
|
|
ISP_ID
Unique Identifier
Primary
No
Integer
|
Key
|
NAME
ISP Name
No
No
Character
46
|
DESC
ISP
No
Yes
Varchar
256
|
Description
|
|
[0187] DEVICE_CATEGORY Table
[0188] This table holds Device Category information to be used in the creation of Connection Records, and is used for internal logic only. Table 26 provides an example of this table.
27TABLE 26
|
|
DEVICE_CATEGORY Table Schema
ColumnAccept
NameDescriptionKey TypeNulls?TypeLength
|
DEVICE—UniquePrimaryNoInteger
CATEGORY—Identifier
IDKey
NAMENameNoNoCharacter 46
DESCRDescriptionNoYesCharacter256
|
[0189] DEVICE TYPE Table
[0190] This table, illustrated in Tables 27 and 28, holds Device Type information to be used in the creation of Connection Records, and is managed by the MAD administrator only.
28TABLE 27
|
|
DEVICE_TYPE Table Privileges
Pseudo
PrivilegesCreateEditDeleteDeleteQuery
|
MAD AdminYYYY
Regional Admin
Connection Admin
Connection Owners
Account Owners (Primary
and Second
Account Authorized User
Internet Owners (Primary
and Second)
Intranet Owners (Primary
and Second
Device Authorized User
Device Owners
(Business & Tech)
General mad user
|
[0191]
29
TABLE 28
|
|
|
SITE Table Schema
|
Accept
|
Column Name
Description
Key Type
Nulls?
Type
Length
|
|
DEVICE_TYPE—
Unique Identifier Key
Primary
No
Integer
|
ID
|
DEVICE—
Foreign key to the
Foreign
No
Integer
|
CATEGORY—
DEVICE-CATEGORY
|
ID
table.
|
NAME
Device Type Name
No
No
Character
46
|
DESCR
Device Type Description
No
Yes
Varchar
256
|
|
[0192] MACHINE TYPE Table
[0193] The MACH_TYPE Table holds Machine Type information to be used in the creation of Device Records, and is used for internal logic only. See Table 29 for an example.
30TABLE 29
|
|
SITE Table Schema
ColumnAccept
NameDescriptionKey TypeNulls?TypeLength
|
MACH-UniquePrimaryNoInteger
TYPE-IDIdentifier
Key
MACH—MachineNoNoVarchar 16
TYPE—Type
NAMEName
DESCRMachineNoYesVarchar256
Type
Description
|
[0194] SETTINGS Table
[0195] This table holds external program configuration values which are editable only by the MAD Administrator. The programs which will use these values are MAD_USER removal, revalidation, bulk import, etc. The SETTINGS table is used for internal logic only. Table 30 provides and example of this table.
31TABLE 30
|
|
SETTINGS Table Schema
Column NameDescriptionKey TypeAccept Nulls?TypeLength
|
APPApplication/Program NamePrimaryNoVarchar128
NAMEParameter NamePrimaryNoVarchar56
VALUEParameter ValueNoYesVarchar256
DESCRDescriptionNoYesVarchar1,024
DATA_TYPEData type for error controlNoNoSmallint
|
[0196] CONNECTION Table
[0197] This table describes a MAD Connection Record. The MAD Connection Record is created by the MAD Connection Administrator and subsequently updated (if necessary) by the MAD Connection Owner. Tables 31 and 32 show the implementation of the preferred embodiment for this database table.
32TABLE 31
|
|
CONNECTION Table Privileges
Pseudo
PrivilegesCreateEditDeleteDeleteQuery
|
MAD AdminYYYY
Regional AdminY 3
Connection AdminYYYY 3
Connection OwnersY 2Y 2Y 3
Account OwnersY 3
(Primary and Second
Account Authorized UserY 3
Internet OwnersY 3
(Primary and Second)
Intranet OwnersY 3
(Primary and Second
Device Authorized UserY 3
Device OwnersY 3
(Business & Tech)
General mad userY
|
[0198]
33
TABLE 32
|
|
|
CONNECTION Table Schema
|
Accept
|
Column Name
Description
Key Type
Nulls?
Type
Length
|
|
CONNECTION—
Unique Identifier Key
Primary
No
Integer
|
ID
|
NAME
Unique Connection Name
No
No
Character
46
|
PRIMARY_OWNER—
Foreign key pointer to the
Foreign
No
Integer
|
ID
MAD-USERS identified as
|
this records Primary
|
Owner
|
BACKUP—
Foreign key pointer to the
Foreign
No
Integer
1,024
|
OWNER_ID
MAD-USERS identified as
|
this records Backup
|
Owner.
|
SITE-ID
Foreign key pointer to the
Foreign
No
Integer
|
SITE table to identify the
|
site for this record
|
DELTE_FLG
Record marked for
No
No
Smallint
|
deletion?
|
DELTE_FLG_SET
Date this record was
No
Yes
DATE
|
marked as “deleted”. This
|
field will only contain data
|
if the record is in the
|
“pseudo” deleted state.
|
LAST_VAL_DATE
Date this record was last
No
No
DATE
|
revalidated. Upon
|
creation, the create date is
|
entered into this field
|
VAL_SENT_TO
Date this record was last
No
Yes
Varchar
128
|
revalidated. Upon
|
creation, the create date is
|
entered into this field.
|
VAL_SENT_ON
Date on which the
No
Yes
DATE
|
revalidation notice record
|
was sent. This field
|
remains blank until the
|
first revalidation notice is
|
sent.
|
VAL_LEVEL
Foreign key pointer to the
Foreign
No
Integer
|
Validation table to identify
|
the current
|
validation_level for this
|
record.
|
UPDATED_BY
Logged on user who saved
No
Yes
Varchar
128
|
this record.
|
COMMENTS
Optional Comments.
No
Yes
Varchar
1,024
|
|
[0199] CONNECTION IP RANGE Table
[0200] This table defines a relationship for IP Ranges (one or many) to a specific connection record. The CONN_IP_RANGE table is a sub-set of the CONNECTION record and is viewed on the Connection web screen. Table 33 provides an example.
34TABLE 33
|
|
CONN_IP_RANGE Table Schema
KeyAccept
Column NameDescriptionTypeNulls?TypeLength
|
CONNECTION—UniquePrimaryNoInteger
IDIdentifier KeyForeign
IP_MINMinimumPrimaryNoInteger
IP Address
IP_MIN_STRMinimumNoNoVarchar16
IP Address
(string format)
IP-MAXMaximumNoNoInteger
IP Address
IP_MAX_STRMaximumNoNoVarchar16
IP Address
(string format)
|
[0201] CONNECTED TO ISP Table
[0202] This table defines a relationship for one or multiple ISPs to a specific connection record. The CONN_TO_ISPS table is a sub-set of the CONNECTION record and is viewed on the Connection web screen. See Table 34 for an example.
35TABLE 34
|
|
CONN_TO_ISPS Table Schema
KeyAccept
Column NameDescriptionTypeNulls?TypeLength
|
CONNECTION—UniquePrimaryNoInteger
IDIdentifier Key.Foreign
Foreign keyed
back to the
CONNEC-
TION table.
ISP_IDForeign keyPrimaryNoInteger
for theForeign
Internet Service
Provider ID
back to the
ISP table.
|
[0203] ADDITIONAL_CONNECTION_USERS Table
[0204] The ADDL_CONN_USERS table creates a relationship for giving MAD_USES authority to a specific connection record. Once added to this table, these MAD_USERS have the same rights as the Connection Owners. The ADDL_CONN_USERS table is available to the MAD Administrator only. He has the ability to add and remove users from this table (i.e., adding and removing this authority). The creator (logged on MAD User) of the Connection record automatically becomes an additional user in this table. See Table 35 for the layout of this table.
36TABLE 35
|
|
ADDL_CONN_USERS Table Schema
KeyAccept
Column NameDescriptionTypeNulls?TypeLength
|
CONNECTION—UniquePrimaryNoInteger
IDIdentifier Key.Foreign
Foreign keyed
back to the
CONNEC-
TION table.
MAD_IDForeign keysPrimaryNoInteger
to a specificForeign
MAD-USERS.
|
[0205] ACCOUNT Table
[0206] The ACCOUNT table, shown in Tables 36 and 37, describes a MAD Account Record. A MAD account contains information relevant to an “account” which will contain devices under it. Accounts can be of type=Intranet and type=Internet, and can be updated by it's Account Owner. At least one Sub-Account Record must be created under the account before devices can be registered for the account.
37TABLE 36
|
|
ACCOUNT Table Privileges
De-Pseudo
PrivilegesCreateEditleteDeleteQuery
|
MAD AdminYYYY
Regional AdminY 3
Connection AdminYYYY 3
Connection OwnersY 2Y 2Y 3
Account Owners (Primary andY 3
Second
Account Authorized UserY 3
Internet Owners (Primary andY 3
Second)
Intranet Owners (Primary andY 3
Second
Device Authorized UserY 3
Device Owners (Business &Y 3
Tech)
General mad userY
|
[0207]
38
TABLE 37
|
|
|
ACCOUNT Table Schema
|
Accept
|
Column Name
Description
Key Type
Nulls?
Type
Length
|
|
ACCOUNT_ID
Unique Identifier Key
Primary
No
Integer
|
NAME
Unique Account Name
No
No
Character
128
|
ACCT_TYPE
Account Type. 0 = Internet,
No
No
Smallint
|
1 = Intranet
|
PRIMARY—
Foreign key pointer to the
Foreign
No
Integer
|
OWNER_ID
MAD-USERS identified as
|
this records Primary
|
Owner
|
BACKUP—
Foreign key pointer to the
Foreign
No
Integer
|
OWNER_ID
MAD-USERS identified as
|
this records Backup
|
Owner.
|
DELTE_FLG
Record marked for
No
No
Smallint
|
deletion?
|
DELTE_FLG_SET
Date this record was
No
Yes
DATE
|
marked as “deleted”. This
|
field will only contain date
|
if the record is in the
|
“pseudo” deleted state.
|
LAST_VAL_DATE
Date this record was last
No
No
DATE
|
revalidated. Upon
|
creation, the create date is
|
entered into this field.
|
VAL_SENT_TO
Date this record was last
No
Yes
Varchar
128
|
revalidated. Upon
|
creation, the create date is
|
entered into this field.
|
VAL_SENT_ON
Date on which the
No
Yes
DATE
|
revalidation notice record
|
was sent. This field
|
remains blank until the
|
first revlaidation notice is
|
sent.
|
VAL_LEVEL
Foreign key pointer to the
Foreign
No
Integer
|
Validation table to identify
|
the current
|
validation_level for this
|
record.
|
UPDATED_BY
Logged on user who saved
No
Yes
Varchar
128
|
this record.
|
COMMENTS
Optional Comments
No
Yes
Varchar
1,024
|
|
[0208] ACCT_TO_CONNECTIONS Table
[0209] The ACCT_TO_CONNECTIONS table creates a relationship of connections to a specific account (types=Internet only) record. An Internet Account can contain one to many connections. These connections identified at the account level provide the range the sub-accounts can choose from which dictate the IP range a device can be within. The ACCT_TO_CONNECTIONS table is a sub-set of the ACCOUNT record and is viewed on the Account web screen. Table 38 shows the design of this table.
39TABLE 38
|
|
ACCT_TO_CONNECTIONS Table Schema
KeyAccept
Column NameDescriptionTypeNulls?TypeLength
|
ACCOUNT—Foreign keysPrimaryNoInteger
IDto a specificForeign
ACCOUNT
record.
CONNECTION—UniquePrimaryNoInteger
IDIdentifier Key.Foreign
Foreign keyed
back to the
CONNEC-
TION table.
|
[0210] ACCT_AUTH_USERS Table
[0211] The ACCT_AUTH_USERS table contains MAD_USERS which gives them authority to this specific account. The ACCT_AUTH_USERS table is a sub-set of the ACCOUNT record and is viewed on the Account web screen. Table 39 provides and example of this table.
40TABLE 39
|
|
ADDL_AUTH_USERS Table Schema
KeyAccept
Column NameDescriptionTypeNulls?TypeLength
|
ACCOUNT—Foreign keys to aPrimaryNoInteger
IDspecificForeign
ACCOUNT
record.
MAD_IDForeign keysPrimaryNoInteger
to a specificForeign
MAD-USERS.
|
[0212] ADDL_ACCT_USERS Table
[0213] The ADDL_ACCT_USERS table creates a relationship for giving MAD_USERS authority to a specific account record. Once added to this table, these MAD_USERS have the same rights as the Account Owners. The ADDL_ACCT_USERS table is available to the MAD Administrator only. He has the ability to add and remove users from this table (i.e., adding and removing this authority). The creator (logged on MAD User) of the Account record automatically becomes an additional user in this table. See Table 40 for an example of this table.
41TABLE 40
|
|
ADDL_AUTH_USERS Table Schema
KeyAccept
Column NameDescriptionTypeNulls?TypeLength
|
ACCOUNT—UniquePrimaryNoInteger
IDIdentifier Key.Foreign
Foreign back
to the
ACCOUNT table.
MAD_IDForeign keysPrimaryNoInteger
to a specificForeign
MAD-USERS.
|
[0214] SUB_ACCOUNT Table
[0215] The SUB_ACCOUNT Table allows authorized users the ability to define other authorized users who in turn will be given create/update authority for MAD Device Records. There can be one or multiple MAD Sub-Account Records (of the same type as the account) under an Account. See Tables 41 and 42 for more details.
42TABLE 41
|
|
SUB_ACCOUNT Table Privileges
De-Pseudo
PrivilegesCreateEditleteDeleteQuery
|
MAD AdminYYYY
Regional AdminY 3
Connection AdminY 3
Account Owners (Primary andYY 2Y 2Y 3
Second
Account Authorized UserYY 2Y 2Y 3
Internet Owners (Primary andY 2Y 2Y 3
Second)
Intranet Owners (Primary andY 3
Second
Device Authorized UserY 3
Device Owners (Business &Y 3
Tech)
General mad userY
|
[0216]
43
TABLE 42
|
|
|
SUB_ACCOUNT Table Schema
|
Accept
|
Column Name
Description
Key Type
Nulls?
Type
Length
|
|
ACCOUNT_ID
Unique Identifier Key
Primary
No
Integer
|
Foreign
|
SUB-ACCOUNT—
Unique Identifier Key
Primary
No
Integer
|
ID
|
NAME
Unique Sub-Account
No
No
Character
46
|
Name
|
PRIMARY—
Foreign key pointer to the
Foreign
No
Integer
|
OWNER_ID
MAD_USERS identified
|
as this records Primary
|
Owner
|
BACKUP—
Foreign key pointer to the
Foreign
No
Integer
|
OWNER_ID
MAD_USERS identified
|
as this records Backup
|
Owner.
|
DELTE_FLG
Record marked for
No
No
Smallint
|
deletion?
|
DELTE_FLG—
Date this record was
No
Yes
DATE
|
SET
marked as “deleted”. This
|
field will only contain data
|
if the record is in the
|
“pseudo” deleted state.
|
LAST_VAL—
Date this record was last
No
No
DATE
|
DATE
revalidated. Upon
|
creation, the create date is
|
entered into this field
|
VAL-SENT—
Date this record was last
No
Yes
Varchar
128
|
TO
revalidated. Upon
|
creation, the create date is
|
entered into this field.
|
VAL_SENT—
Date on which the
No
Yes
DATE
|
ON
revalidation notice record
|
was sent. This field
|
remains blank until the
|
first revalidation notice is
|
sent.
|
VAL_LEVEL
Foreign key pointer to the
Foreign
No
Integer
|
Validation table to identify
|
the current
|
validation_level for this
|
record.
|
UPDATED
Logged on user who saved
No
Yes
Varchar
128
|
BY
this record
|
COMMENTS
Optional Comments
No
Yes
Varchar
1,024
|
|
[0217] INTERNET_SUB Table
[0218] The INTERNET_SUB Table is an extension to the SUB_ACCOUNT table for Internet Accounts. Internet Sub-Accounts contain extra fields (from the Intranet Sub-Account) which are housed in this table. The INTERNET_SUB table is a sub-set of the SUB-ACCOUNT record and is viewed on the Sub-Account web screen. See Table 43 for more details of the preferred embodiment of this table.
44TABLE 43
|
|
INTERNET_SUB Table Schema
Accept
Column NameDescriptionKey TypeNulls?TypeLength
|
SUB_ACCOUNT—Foreign Key to thePrimaryNoInteger
IDSUB_ACCOUNTForeign
CONNECTION—Foreign keys to a specificForeignNoInteger
IDCONNECTION record
COMMERCIAL—Indicates whether or notForeignNoInteger
FLGthis record is intended for
commercial use. See note
below.
IP_MINMinimum IP AddressPrimaryNoInteger
IP_MIN_STRMinimum IP AddressNoNoVarchar
(string format)
IP_MAXMaximum IP AddressNoNoInteger
IP_MAX_STRMaximum IP AddressNoNoVarchar
(string format)
|
[0219] DEVICE_AUTH_USERS Table
[0220] The DEVICE_AUTH_USERS table contains MAD_USERS which gives them authority to this specific sub-account. These users have the authority to create devices for this Sub-Account. The DEVICE_AUTH_USERS table is a sub-set of the SUB_ACCOUNT record and is viewed as part of the Sub-Account web screen. Table 44 gives an example design for this table.
45TABLE 44
|
|
DEVICE_AUTH_USERS Table Schema
KeyAccept
Column NameDescriptionTypeNulls?TypeLength
|
SUB—Foreign keys to aPrimaryNoInteger
ACCOUNT—specific SUB—Foreign
IDACCOUNT
record
MAD_IDForeign keysPrimaryNoInteger
to a specific
MAD-USERS.Foreign
|
[0221] ADDL SUB USERS Table
[0222] The ADDL_SUB_USERS table creates a relationship for giving MAD_USERS authority to a specific sub-account. Once added to this table, these MAD-USERS have the same rights as the Sub-Account Owners. The ADDL_SUB_USERS table is available to the MAD Administrator only. He has the ability to add and remove users from this table (i.e., adding and removing this authority). The creator (logged on MAD User) of the Sub-Account automatically becomes an additional user in this table. Table 45 depicts the preferred embodiment for this table.
46TABLE 45
|
|
ADDL_SUB_USERS Table Schema
KeyAccept
Column NameDescriptionTypeNulls?TypeLength
|
SUB—UniquePrimaryNoInteger
ACCOUNT—Identifier Key,Foreign
IDForeign keyed
back to the
SUB—
ACCOUNT
parent taable.
MAD_IDForeign keys to aPrimaryNoInteger
specificForeign
MAD-USERS.
|
[0223] DEVICE_Table
[0224] The DEVICE table contains MAD Device information, as shown in FIGS. 46 and 47. These Device Records are used to register and maintain up to date information on appropriate device. The DEVICE table is external.
47TABLE 46
|
|
DEVICE Table Privileges
De-Pseudo
PrivilegesCreateEditleteDeleteQuery
|
MAD AdminYYYY
Regional AdminY 3
Connection AdminY 3
Account Owners (Primary andYY 2Y 2Y 3
Second
Account Authorized UserYY 2Y 2Y 3
Internet Owners (Primary andY 2Y 2Y 3
Second)
Intranet Owners (Primary andY 2Y 2Y 3
Second
Device Authorized UserYY 2Y 2Y 3
Device Owners (Business &Y 2Y 3
Tech)
General mad userY
|
[0225]
48
TABLE 47
|
|
|
DEVICE Table Schema
|
Accept
|
Column Name
Description
Key Type
Nulls?
Type
Length
|
|
ACCOUNT_ID
Foreign keys to the
Primary
No
Integer
|
ACCOUNT
Foreign
|
SUB_ACCOUNT—
Foreign key to the
Primary
No
Integer
|
ID
SUB_ACCOUNT.
Foreign
|
DEVICE_CATEGORY—
Identifies the device
Foreign
No
Integer
|
ID
category. Foreign keys to
|
the
|
DEVICE_CATEGORY
|
table
|
MACH_TYPE—
Identifies the machine
Foreign
No
Integer
|
ID
type. Foreign keys to the
|
MACHINE_TYPE table
|
REQUEST_ID
For possible future use (if
No
Yes
Character
28
|
IES char num is required.)
|
IP_ADDR
Foreign keys to the IP
Foreign
Yes
Integer
|
Address table.
|
HOST_ID
Foreign keys to the
Foreign
Yes
Integer
|
HOSTNAME table.
|
TECH_OWNER—
Foreign key pointer to the
Foreign
Yes
Integer
|
ID
MAD_USERS identified
|
as this records Business
|
Owner.
|
BUS_OWNER—
Foreign key pointer to the
Foreign
Yes
Integer
|
ID
MAD_USERS identified
|
as this records Business
|
Owner.
|
EXTERNAL—
Foreign key pointer to the
Foreign
Yes
Integer
|
TECH_OWNER—
EXTERNAL_USERS
|
ID
identified as this records
|
Technical Owner.
|
EXTERNAL—
Foreign key pointer to the
Foreign
Yes
Integer
|
BUS_OWNER—
EXTERNAL_USERS
|
ID
identified as this records
|
Business Owner.
|
SITE_ID
Foreign keys to the SITE
Foreign
No
Integer
|
table.
|
DELTE_FLG
Record marked for
No
No
Smallint
|
deletion?
|
DELTE_FLG—
Date this record was
No
Yes
DATE
|
SET
marked as “deleted”. This
|
field will only contain data
|
if the record is in the
|
“pseudo” deleted state.
|
LAST_VAL—
Date this record was last
No
No
DATE
|
DATE
revalidated. Upon
|
creation, the create date is
|
entered into this field.
|
VAL_SENT_TO
Date this record was last
No
Yes
Varchar
128
|
revalidated. Upon
|
creation, the create date is
|
entered into this field
|
VAL_SENT—
Date on which the
No
Yes
DATE
|
ON
revalidation notice record
|
was sent. This field
|
remains blank until the
|
first revalidation notice is
|
sent.
|
VAL_LEVEL
Foreign key pointer to the
Foreign
No
Integer
|
Validation table to identify
|
the current
|
validation_level for this
|
record.
|
UPDATED_BY
Logged on user who saved
No
Yes
Varchar
128
|
this record.
|
COMMENTS
Optional Comments
No
Yes
Varchar
1,024
|
|
[0226] INTRANET DEVICE Table
[0227] The INTRANET_DEVICE Table, depicted in Table 48, is an extension to the DEVICE table for Intranet Devices. Intranet Devices contain extra fields (from the generic DEVICE table) which are housed in this table. The INTRANET_DEVICE table is a sub-set of the DEVICE record and is viewed as part of the DEVICE record.
49TABLE 48
|
|
INTRANET_DEVICE Table Schema
ColumnKeyAccept
NameDescriptionTypeNulls?TypeLength
|
DEVICE—Foreign key to thePrimaryNoInteger
IDDEVICE record.Foreign
SCANIndicates whether orNoNoSmallint
not this record will
be scanned
by the Scan Team.
SCAN—Stores the date thatNoYesDate
AGREE—the user agreed to
DATEthe scan agreement
|
[0228] ADDL_DEVICE_USERS Table
[0229] The ADDL_DEVICE_USERS table (Table 49) defines a relationship for giving MAD_USES authority to a specific device record. Once added to this table, these MAD_USERS have the same rights as the Device Owners.
[0230] The ADDL_DEVICE_USERS table is available to the MAD Administrator only. He has the ability to add and remove users from this table (i.e., adding and removing this authority). The creator (logged on MAD User) of the device record automatically becomes an additional user in this table.
50TABLE 49
|
|
ADDL_DEVICE_USERS Table Schema
Accept
Column NameDescriptionKey TypeNulls?TypeLength
|
DEVICE_IDUniquePrimaryNoInteger
Identifier Key,Foreign
Foreign keyed
back to the
DEVICE table.
MAD_IDForeign keysPrimaryNoInteger
to a specificForeign
MAD-USERS.
|
[0231] INTERNAL_IPS Table
[0232] The INTERNAL_IPS table is an extension to the DEVICE table for Internet Devices. Internet Devices can contain multiple Internal IP Addresses which are housed in this table. The INTERNAL_IPS table is a sub-set of the DEVICE record and is viewed as part of the Device record. See Table 50 for more details of the preferred embodiment of this table.
51TABLE 50
|
|
ADDL_SUB_USERS Table Schema
KeyAccept
Column NameDescriptionTypeNulls?TypeLength
|
DEVICE_IDForeign key to thePrimaryNoInteger
DEVICE record.Foreign
INTERNAL—UniquePrimaryNoInteger
IPIP AddressForeign
|
[0233] ALIAS Table
[0234] The ALIAS table (Table 51) is an extension to the DEVICE table for Intranet and Internet Devices. Devices can have multiple Alias Hostnames which are housed in this table. The ALIAS table is a sub-set of the DEVICE record and is viewed as part of the Device record.
52TABLE 51
|
|
ALIAS Table Schema
KeyAccept
Column NameDescriptionTypeNulls?TypeLength
|
DEVICE_IDForeign key to thePrimaryNoInteger
DEVICE record.Foreign
HOST_IDUnique HostnamePrimaryNoInteger
foreign keyedForeign
back to the
HOSTNAME
table.
|
[0235] DEVICE_TYPES Table
[0236] The DEVICE TYPES table is an extension to the DEVICE table for Intranet and Internet Devices. A devices can be multiple types. The DEVICE TYPES table is a sub-set of the DEVICE record and is viewed as part of the Device record. See Tables 52 and 53 for more details.
53TABLE 52
|
|
DEVICE_TYPES Table Schema
KeyAccept
Column NameDescriptionTypeNulls?TypeLength
|
DEVICE_IDForeign key to thePrimaryNoInteger
DEVICE record.Foreign
DEVICEUnique DevicePrimaryNoInteger
TYPE_IDTypeForeign
|
[0237]
54
TABLE 53
|
|
|
CONN_CHANGELOG Table Schema
|
Accept
|
Column Name
Description
Key Type
Nulls?
Type
Length
|
|
CONNECTION—
Connection ID
Primary
No
Integer
|
ID
|
ACTION
Action taken on record
Primary
No
Integer
|
CHG_TS
Timestamp above action
Primary
No
Timestamp
|
was taken.
|
CHG_BY
Logged on user
No
No
Varchar
128
|
performing the change
|
NAME
Unique Connection Name
No
No
Varchar
46
|
PRIMARY—
MAD_USERS identified
No
No
Varchar
128
|
OWNER_ID
as this records Primary
|
Owner (Notes Mail Name)
|
BACKUP—
MAD_USERS identified
No
No
Varchar
128
|
OWNER_ID
as this records Backup
|
Owner (Notes Mail Name)
|
DELTE_FLG
Record marked for
No
No
Smallint
|
deletion?
|
DELTE_FLG—
Date this record was
No
Yes
DATE
|
SET
marked as “deleted”. This
|
field will only contain data
|
if the record is in the
|
“pseudo” deleted state.
|
LAST_VAL—
Date this record was last
No
Yes
DATE
|
DATE
revalidated. Upon
|
creation, the create date is
|
entered into this field
|
VAL-SENT—
Date this record was last
No
Yes
Varchar
128
|
TO
revalidated. Upon
|
creation, the create date is
|
entered into this field.
|
VAL_SENT—
Date on which the
No
Yes
DATE
|
ON
revalidation notice record
|
was sent. This field
|
remains blank until the
|
first revalidation notice is
|
sent.
|
VAL_LEVEL
Foreign key pointer to the
No
No
Integer
|
Validation table to identify
|
the current
|
validation_level for this
|
record.
|
COMMENTS
Optional Comments
No
Yes
Varchar
1,024
|
|
[0238] ACCOUNT_CHANGELOG Table
[0239] The ACCOUNT_CHANGELOG table, illustrated in Table 54, is used to store information about each transaction in the Account table. The ACCOUNT_CHANGELOG table is for internal only.
55TABLE 54
|
|
ACCOUNT_CHANGELOG Table Schema
Accept
Column NameDescriptionKey TypeNulls?TypeLength
|
ACCOUNT_IDAccount IDPrimaryNoInteger
ACTIONAction taken on recordPrimaryNoInteger
CHG_TSTimestamp above actionPrimaryNoTimestamp
was taken
CHG_BYLogged on userNoNoVarchar128
performing the change.
NAMEAccount NameNoNoCharacter46
ACCT_TYPEAccount Type. 0 = Internet,NoNoSmallint
1 = Intranet
PRIMARY—MAD_USERS identifiedNoNoVarchar128
OWNER_IDas this records Primary
Owner (Notes Mail Name)
BACKUP—MAD_USERS identifiedNoNoVarchar128
OWNER_IDas this records Backup
Owner (Notes Mail
Name).
DELTE_FLGRecord marked forNoNoSmallint
deletion?
DELTE_FLG—Date this record wasNoYesDATE
SETmarked as “deleted”. This
field will only contain data
if the record is in the
“pseudo” deleted state.
LAST_VAL—Date this record was lastNoNoDATE
DATErevalidated. Upon
creation, the create date is
entered into this field
VAL-SENT—Date this record was lastNoYesVarchar128
TOrevalidated. Upon
creation, the create date is
entered into this field.
VAL_SENT—Date on which theNoYESDATE
ONrevalidation notice record
was sent. This field
remains blank until the
first revalidation notice is
sent.
VAL_LEVELForeign key pointer to theNoNoInteger
Validation table to identify
the current
validation_level for this
record.
COMMENTSOptional CommentsNoYesVarchar1,024
|
[0240] SUB_ACCT_CHANGELOG
[0241] The SUB_ACCT_CHANGELOG table is used to store information about each transaction in the Sub-Account table. The SUB_ACCT_CHANGELOG table is for internal use only. See Table 55 for more details of this table.
56TABLE 55
|
|
SUB_ACCOUNT_CHANGELOG Table Schema
Accept
Column NameDescriptionKey TypeNulls?TypeLength
|
ACCOUNT_IDAccount IDPrimaryNoInteger
Foreign
SUB_ACCUNT—Sub-Account IDPrimaryNoInteger
ID
ACTIONAction taken on recordPrimaryNoChar7
CHG_TSTimestamp above actionPrimaryNoTimestamp
was taken
CHG_BYLogged on userNoNoVarchar128
performing the change.
NAMEAccount NameNoNoVarchar46
PRIMARY—MAD_USERS identifiedNoNoVarchar128
OWNERas this records Primary
Owner (Notes Mail Name)
BACKUP—MAD_USERS identifiedNoNoVarchar128
OWNERas this records Backup
Owner (Notes Mail
Name).
DELTE_FLGRecord marked forNoNoSmallint
deletion?
DELTE_FLG—Date this record wasNoYesDATE
SETmarked as “deleted”. This
field will only contain data
if the record is in the
“pseudo” deleted state.
LAST_VAL—Date this record was lastNoYesDATE
DATErevalidated. Upon
creation, the create date is
entered into this field
VAL-SENT—Date this record was lastNoYesVarchar128
TOrevalidated. Upon
creation, the create date is
entered into this field.
VAL_SENT—Date on which theNoYESDATE
ONrevalidation notice record
was sent. This field
remains blank until the
first revalidation notice is
sent.
VAL_LEVELForeign key pointer to theNoNoInteger
Validation table to identify
the current
validation_level for this
record.
COMMENTSOptional CommentsNoYesVarchar1,024
|
[0242] DEVICE_CHANGELOG
[0243] The DEVICE_CHANGELOG table, shown in Table 56, is used to store information about each transaction in the Device table. The DEVICE_CHANGELOG is for internal use only.
57TABLE 56
|
|
DEVICE_CHANGELOG Table Schema
Accept
Column NameDescriptionKey TypeNulls?TypeLength
|
ACCOUNT_IDAccount IDPrimaryNoInteger
SUB-ACCOUNT—Sub-Account IDPrimaryNoInteger
IDForeign
DEVICE IDDevice IDPrimaryNoInteger
ACTIONAction taken on recordPrimaryNoCHAR7
CHG_TSLogged on userPrimaryNoTimestamp
performing the change
CHG_BYTimestamp above acitonNoNoVarchar128
was taken.
DEVICE CATDEVICE CATEGORYNoNoVarchar128
MACH_TYPEMachine type.NoNoVarchar16
REQUEST_IDRequest IDNoNoVarchar28
IP_ADDRIP AddressNoYesVarchar16
HOSTNAMEName of host machineNoYesVarchar128
TECH_OWNERMAD_USERS identifiedNoNoVarchar128
as this records Technical
Owner (Notes Mail Name)
BUS_OWNERMAD_USERS identifiedNoNoVarchar128
as this records Business
Owners (notes Mail Name)
EXTERNAL—MAD_USERS identifiedNoNoVarchar128
TECH_OWNERas this records Technical
Owner (Notes Mail Name)
EXTERNALMAD_USERS identifiedNoNoVarchar128
as this records Business
_BUS_OWNEROwner (Notes Mail Name)
DELTE_FLGRecord marked forNoNoSmallint
deletion?
DELTE_FLG—Date this record wasNoYesDATE
SETmarked as “deleted”. This
field will only contain data
if the record is in the
“pseudo” deleted state.
LAST_VAL—Date this record was lastNoNoDATE
DATErevalidated. Upon
creation, the create date is
entered into this field
VAL-SENT—Date this record was lastNoYesVarchar128
TOrevalidated. Upon
creation, the create date is
entered into this field.
VAL_SENT—Date on which theNoYesDATE
ONrevalidation notice record
was sent. This field
remains blank until the
first revalidation notice is
sent.
VAL_LEVELForeign key pointer to theForeignNoInteger
Validation table to identify
the current
validation_level for this
record.
COMMENTSOptional CommentsNoYesVarchar1,024
|
[0244] Conclusion
[0245] A high level system design has been presented for a mixed address database which fulfills the need in the art, including details of a preferred embodiment including certain network components, computing platform hardware, operating system, web server software components, programming languages and methodologies, and example database schema. However, it will be recognized by those skilled in the art that certain departures from the preferred embodiment, including but not limited to adoption of alternate web server software, computing platform components, and database design, may be made without departing from the spirit and scope of the present invention. Therefore, the scope of the present invention should be determined by the following claims.
Claims
- 1. A method for providing a mixed address database in a corporate networked computing environment comprising the steps of:
defining an account as an externally accessible or internally accessible account; associating with said account one or more connections; establishing with said account one or more sub-accounts, said sub-account being an external sub-account if said account is external or an internal sub-account if said account is internal; specifying or more devices belonging to said sub-account; and providing a user authorization policy associated with one or more user types, said policy defining which user types may be allowed to create, modify and delete said accounts, connections, sub-accounts, and devices.
- 2. The method as set forth in claim 1 further comprising the step of converting a set of existing definitions for an externally accessible network by performing said steps of defining an account, associating connections, establishing sub-accounts, specifying devices, and providing an authorization policy.
- 3. The method as set forth in claim 1 further comprising the step of converting a set of existing definitions for an internally accessible network by performing said steps of defining an account, associating connections, establishing sub-accounts, specifying devices, and providing an authorization policy.
- 4. The method as set forth in claim 1 wherein said externally accessible network is the Internet.
- 5. The method as set forth in claim 1 wherein said externally accessible network is an intranet.
- 6. A computer readable medium encoded with software for providing a mixed address database in a corporate networked computing environment, said software performing the steps of:
defining an account as an externally accessible or internally accessible account; associating with said account one or more connections; establishing with said account one or more sub-accounts, said sub-account being an external sub-account if said account is external or an internal sub-account if said account is internal; specifying or more devices belonging to said sub-account; and providing a user authorization policy associated with one or more user types, said policy defining which user types may be allowed to create, modify and delete said accounts, connections, sub-accounts, and devices.
- 7. The computer readable medium as set forth in claim 6 further comprising software for performing the step of converting a set of existing definitions for an externally accessible network by performing said steps of defining an account, associating connections, establishing sub-accounts, specifying devices, and providing an authorization policy.
- 8. The computer readable medium as set forth in claim 6 further comprising software for converting a set of existing definitions for an internally accessible network by performing said steps of defining an account, associating connections, establishing sub-accounts, specifying devices, and providing an authorization policy.
- 9. The computer readable medium as set forth in claim 6 wherein said externally accessible network is the Internet.
- 10. The computer readable medium as set forth in claim 6 wherein said externally accessible network is an intranet.
- 11. A system comprising:
an mixed address database containing records defining connections, accounts, sub-accounts, and devices, each account being of an internal account type or an external account type, and further comprising a user authorization policy; an application server with a web front end for providing access to said mixed address database via a web client according to said user authorization policy; and a personnel database accessible by said application server for use in validation of user information in said mixed address database records.
- 12. The system as set forth in claim 11 further comprising a data importer for converting records contained in an external network address database and an internal network address database for loading into said mixed address database.
- 13. The system as set forth in claim 12 wherein said external network address database is an Internet address database.
- 14. The system as set forth in claim 12 wherein said internal network address database is an intranet address database.
- 15. The system as set forth in claim 11 further comprising a removal/updating subsystem adapted to verify records in said mixed address database against said personnel database for accuracy and relevancy, and to produce an report for discrepancies found.
- 16. The system as set forth in claim 15 wherein said removal/updating subsystem is further adapted to perform said verification on a periodic basis.
- 17. The system as set forth in claim 15 wherein said removal/updating subsystem is further adapted to perform said verification on an event driven.
- 18. The system as set forth in claim 11 further comprising a replicator for creating a copy of a selected set of records of said mixed address database.