The present invention will be understood and appreciated more fully from the following detailed description taken in conjunction with the appended drawings in which
Reference is now made to
Any of the parameter values of any rule 100 may be overridden through the application of corresponding parameter values or variable values that are associated with any policy 102, profile 104, and/or association 106. For example, each policy 102 may include one or more parameters, where a policy parameter value may be used to override corresponding parameter values of any rules 100 included in policy 102. The value for a policy parameter may come from any source, such as an external management system which maps business content or any other content to computing resources (e.g., security constraints that are mapped to profile variables and used by security rules and policies). Similarly, each profile 104 may include one or more variables, where a profile variable may be used to override corresponding parameter values of any rules 100 or policies 102. Likewise, association 106 may include one or more parameters, where an association parameter value may be used to override corresponding parameter values of any rules 100, policies 102, or profiles 104.
Thus, in the example shown in
It will be appreciated that various precedence hierarchies may be constructed for determining which parameter or variable values in rules, policies, profiles, and associations override which other corresponding values in other rules, policies, profiles, and associations.
The present invention may be additionally understood in the context of the following scenarios given the following rule, policy, profile, and association definitions:
Scenario #1 is shown in
If a rule parameter is defined as mandatory with no default value, and no value is assigned to it during the instantiation of an association, either by the association or its policy or profile, such an association may be invalidated and prevented from being applied.
Reference is now made to
The instantiation of DeleteLogFiles/MyDatabaseServers #2 would then result in the following scenario:
It is appreciated that one or more of the steps of any of the methods described herein may be omitted or carried out in a different order than that shown, without departing from the true spirit and scope of the invention.
While the methods and apparatus disclosed herein may or may not have been described with reference to specific computer hardware or software, it is appreciated that the methods and apparatus described herein may be readily implemented in computer hardware or software using conventional techniques.
While the present invention has been described with reference to one or more specific embodiments, the description is intended to be illustrative of the invention as a whole and is not to be construed as limiting the invention to the embodiments shown. It is appreciated that various modifications may occur to those skilled in the art that, while not specifically shown herein, are nevertheless within the true spirit and scope of the invention.