The present disclosure involves systems, software, and computer-implemented methods for providing role-based resource navigation.
Network navigation may be performed using unique resource identifiers, such as uniform resource locators (URLs). In some cases, URLs may be used to address applications within a system. For example, the user may click on a link within a webpage displayed within a browser application to launch a specific application, or to perform a specific action. Such a click may generate a Hypertext Transfer Protocol (HTTP) request for the URL associated with a link. In response, the server receiving the request may invoke an application associated with the URL.
The present disclosure involves systems, software, and computer-implemented methods for providing role-based resource navigation. In one general aspect, an example method includes identifying a particular navigation intent from a user associated with a particular user role, the navigation intent representing an action associated with the particular business object; determining a particular target mapping associated with the particular navigation intent based at least in part on the particular user role, the target mapping associated with an application to be executed in response to identification of the associated navigation intent; and executing the application associated with the particular target mapping in response to determining the particular target mapping.
While generally described as computer-implemented software embodied on non-transitory, tangible media that processes and transforms the respective data, some or all of the aspects may be computer-implemented methods or further included in respective systems or other devices for performing this described functionality. The details of these and other aspects and implementations of the present disclosure are set forth in the accompanying drawings and the description below. Other features, objects, and advantages of the disclosure will be apparent from the description and drawings, and from the claims.
The present disclosure involves systems, software, and computer-implemented methods for providing role-based resource navigation.
The present disclosure describes a URL-based navigation scheme that enables user specific navigation and navigation exploration by decoupling the navigation intent from the actual navigation target using user roles.
In current approaches to navigation, the intent of a navigation is either expressed in a very technical manner in the URL or not exposed at all. For instance, certain solutions may trigger navigation programmatically, such as by JavaScript or other methods. In such a case, the intent of the navigation may not be exposed at all in the URL. Other approaches expose URLs addressing a target application in an encoded manner, such that the intent of the navigation can be only understood by experts. Most navigation approaches do not enable the client to explore available navigation intents. Accordingly, a user cannot get a complete or context-sensitive list of available intents to explore further navigation possibilities.
Current approaches also do not support role-based mapping between the navigation intent and the actual target of the navigation. In such approaches, a URL points statically to a single application, no matter which role the user is assigned. In such a case, it may not be possible to provide role-specific target resolution using a single URL.
The present approach provides a navigation scheme in which navigation intents are human readable, and in which the target applications associated with the navigation intent may be specific to the user's role. One example method involves identifying a particular navigation intent representing an action associated with a particular business object associated with a particular user role. A particular target mapping is then determined for the navigation intent based at least in part on the particular user role. The application associated with that particular target mapping is then executed in response to determining the particular target mapping.
The present solution may provide several potential advantages. By providing a human readable navigation scheme, a user may be able to easily browse their navigation history and identify previously executed intents, allowing the user to easily access previously accessed applications and business objects. The user may also be able to bookmark frequently used navigation intents. Since the navigation intent is human readable, a user may be able to directly manipulate it, such as, for example, by changing the action, the object, parameters, etc. Further, allowing the target applications for the navigation intents to vary based on the user's role provides additional flexibility and control for the application designer. The navigation scheme further serves to decouple applications from one another, as an application designer will not have to include direct links to the application, which may change or become stale.
In the illustrated implementation, the example environment 100 includes a navigation management system 130. At a high level, the navigation management system 130 comprises an electronic computing device operable to receive navigation requests including resource IDs from the client 180 and provide target applications to the client based on a user role associated with a user of the client. The navigation management system 130 may be a distributed system including different servers and components. In some implementations, the navigation management system 130 may be a combination of hardware components and software components. The navigation management system 130 may also be a single computing device.
In some implementations, the navigation management system 130 may be a web service that is accessible via standard web protocols, such as, for example, Hypertext Transfer Protocol (HTTP), Simple Object Access Protocol (SOAP), or any other suitable protocol or combination of protocols. In some cases, the navigation management system 130 may provide an Application Programming Interface (API) through which the client 180 may submit navigation requests.
As used in the present disclosure, the term “computer” is intended to encompass any suitable processing device. For example, although
The navigation management system 130 also includes an interface 132, a processor 134, and a memory 150. The interface 132 is used by the navigation management system 130 for communicating with other systems in a distributed environment—including within the environment 100—connected to the network 120; for example, the clients 180, as well as other systems communicably coupled to the network 120 (not illustrated). Generally, the interface 132 comprises logic encoded in software and/or hardware in a suitable combination and operable to communicate with the network 120. More specifically, the interface 132 may comprise software supporting one or more communication protocols associated with communications such that the network 120 or interface's hardware is operable to communicate physical signals within and outside of the illustrated environment 100.
As illustrated in
In the illustrated implementation, the navigation management system 130 includes a navigation service 140. In some implementations, the navigation service 140 may be operable to perform the navigation intent to target mapping association based on user role. In some implementations, the navigation service 140 may be a software process or set of software processes executing on the navigation management system 130. The navigation service 140 may also be a network service executing on a separate computing device from the navigation management system 130. The navigation service 140 may utilize the interface 132 to send and receive data from the network 120, such as receiving requests from the one or more clients 180, and sending responses to these requests. The navigation service 140 may also utilize the memory 150 to read and write data needed for operation, such as user roles, navigation intents, and target applications.
The navigation service 140 may include an intent handler 142. In operation, the intent handler 142 may be operable to receive a requested URL including a navigation intent, and parse the URL to extract the navigation intent. The intent handler 142 may check this parsed intent against the database 160 to determine if the intent is valid, such as by determining if the navigation intent is included in the navigation intents 164. In some cases, the intent handler 142 may retrieve target applications mapped to the specific navigation intent from the set of target applications 166. In some cases, the intent handler 142 may be a module or set of modules in the navigation service 140. The intent handler 142 may also be an external network service accessible by the navigation service 140 to perform the described functions.
In the illustrated implementation, the navigation service 140 also includes a user role handler 144. In operation, the user role in the 144 may be operable to determine which of the target applications 166 are associated with the received navigation intent given the requesting user's role or roles. In some implementations, the user role handler 144 may determine the user's role or roles based on a previous exchange prior to the user requesting the navigation intent, such as a login exchange. In some cases, the user's login credentials may be included in the request. In some cases, the user role in their 144 may respond to the client with a list of target applications associated with the received navigation intent. For example, if the user is associated with multiple roles, each role may be associated with a different target application for the particular navigation intent. If the user is associated with a single user role, the particular navigation intent may still be associated with multiple target applications, in which case the user role in their 144 may return a list of the target applications.
Regardless of the particular implementation, “software” may include computer-readable instructions, firmware, wired and/or programmed hardware, or any combination thereof on a tangible medium (transitory or non-transitory, as appropriate) operable when executed to perform at least the processes and operations described herein. Indeed, each software component may be fully or partially written or described in any appropriate computer language including C, C++, Java™, Visual Basic, assembler, Perl®, any suitable version of 4GL, as well as others. While portions of the software illustrated in
The navigation service system 130 also includes a memory 150 or multiple memories 150. The memory 150 may include any type of memory or database module and may take the form of volatile and/or non-volatile memory including, without limitation, magnetic media, optical media, random access memory (RAM), read-only memory (ROM), removable media, or any other suitable local or remote memory component. The memory 150 may store various objects or data, including caches, classes, frameworks, applications, backup data, business objects, jobs, web pages, web page templates, database tables, repositories storing business and/or dynamic information, and any other appropriate information including any parameters, variables, algorithms, instructions, rules, constraints, or references thereto associated with the purposes of the navigation service system 130. Additionally, the memory 150 may include any other appropriate data, such as VPN applications, firmware logs and policies, firewall policies, a security or access log, print or other reporting files, as well as others.
As illustrated in
As shown, the database 160 includes one or more user roles 162. In some implementations, the user roles 162 may be general classes of users to which individual users may be assigned. The user roles 162 may be stored within the database 160, or may be retrieved from an external system, such as a user authentication system or role management system.
The database 160 may also include navigation intents 164. In some implementations, the navigation intents 164 may be formatted as shown in
In the illustrated implementation, the database 160 also includes target applications 166. Target applications 166 may be applications operable to perform an operation associated with a particular navigation intent. In some implementations, the target applications may be stored as URLs by which the applications may be accessed.
The database 160 may include associations between the user roles 162, the navigation intents 164, and the target applications 166, such that for a given navigation intent, a list of one or more target applications 166 may be determined by the navigation service 140.
Illustrated client 180 is intended to encompass any computing device, such as a desktop computer, laptop/notebook computer, wireless data port, smart phone, personal data assistant (PDA), tablet computing device, one or more processors within these devices, or any other suitable processing device. For example, client 180 may comprise a computer that includes an input device, such as a keypad, touch screen, or other device that can accept user information and an output device that conveys information associated with the operation of the navigation management system 130 or client 180 itself, including digital data, visual information, or a graphical user interface (GUI). Client 180 may include an interface 189, a processor 184, a memory 188 and a client application 186. In some implementations, the client application 186 may be a web browser. Client 180 may be used by a user to access the navigation management system 130 to view or change items in the database 160, such as user roles 162.
At 202, a particular navigation intent from a user associated with a particular user role is identified, the navigation intent representing an action associated with the particular business object. At 204, a particular target mapping associated with the particular navigation intent is determined based at least in part on the particular user role, the target mapping associated with an application to be executed in response to identification of the associated navigation intent. At 206, the application associated with the particular target mapping is executed in response to determining the particular target mapping.
The semantic object 306 may be a centrally defined business related identifier such as, for example, a SalesOrder or PurchaseOrder. The action 308 may be a verb representing the action to be executed on the semantic object (e.g. display, approve, etc.). In some implementations, an intent-based URL such as URL 300 can be bookmarked, copy/pasted or shared by email. In some cases, the navigation intent 304 does not explicitly disclose the application which will be launched. The target application is determined during target resolution based on target mapping assigned to the user role(s).
The navigation intent 304 does not explicitly expose the target application, which will launch when navigating. The actual application for a given intent is defined in a target mapping. There can be any number of target mappings for a given navigation intent. Which target mapping is used at runtime depends at least in part on the targets mappings assigned to the requesting user's role(s). The role dependency enables different users to call different applications for the same navigation intent. For example, a user with an “employee” user role may be routed to a limited employee view application for the navigation intent “employee-view,” while a user with a “manager” role may be routed to an employee view application with additional functionality for the same navigation intent. A user may, in some cases, have several target mappings assigned for the same intent. In that case a user interface may present a list of available targets and let the user choose one.
In some implementations, a user may be able to explore available intents. The list of available intents depends from role set assigned to user. In some cases, a user may query a list of available semantic (business) objects on which he can operate. The user may perform further analysis on the available intents for instance, such as, for example, which actions can be executed for a given semantic object (e.g. LeaveRequest: display, create, approve) or identify objects which can be used for specific actions on (e.g. approve: LeaveRequest, PurchaseOrder).
A navigation service 410 executes on the navigation server 408, and is operable to determine the available navigation intents from user roles 416 assigned to the user within the role repository 414. Target mappings 424 and navigation intents 424 are grouped in catalogs 420 to simplify their role assignment.
When the user clicks on a tile, navigation resolution is triggered. The navigation service 410 searches for matching target mapping(s) 422 for the given navigation intent 406. Each target mapping stores technical information to launch the appropriate application for the intent from applications 418. In some cases, this information includes the navigation target repository name (e.g., 412) and the ID of the application within this repository. The navigation services 410 use this information to read the application details from the given repository 412, to resolve and trigger the navigation.
The preceding figures and accompanying description illustrate example processes and computer implementable techniques. Environment 100 (or its software or other components) contemplates using, implementing, or executing any suitable technique for performing these and other tasks. These processes are for illustration purposes only and that the described or similar techniques may be performed at any appropriate time, including concurrently, individually, or in combination. In addition, many of the steps in these processes may take place simultaneously, concurrently, and/or in different order than as shown. Moreover, environment 100 may use processes with additional steps, fewer steps, and/or different steps, so long as the methods remain appropriate.
In other words, although this disclosure has been described in terms of certain implementations and generally associated methods, alterations and permutations of these implementations and methods will be apparent to those skilled in the art. Accordingly, the above description of example implementations does not define or constrain this disclosure. Other changes, substitutions, and alterations are also possible without departing from the spirit and scope of this disclosure.
This application claims the benefit of priority of U.S. Provisional Application No. 61/904,914, filed Nov. 15, 2013, which is hereby incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
6952620 | Cherdron et al. | Oct 2005 | B2 |
7050056 | Meyringer | May 2006 | B2 |
7225424 | Cherdron et al. | May 2007 | B2 |
7302648 | Brunner | Nov 2007 | B1 |
7555543 | Encarnacion | Jun 2009 | B2 |
7581204 | Reeder et al. | Aug 2009 | B2 |
7600014 | Russell | Oct 2009 | B2 |
7600215 | Cherdron et al. | Oct 2009 | B2 |
7797370 | Brunswig et al. | Sep 2010 | B2 |
7925968 | Fischer et al. | Apr 2011 | B2 |
8018473 | Sylthe et al. | Sep 2011 | B2 |
8117529 | Melamed et al. | Feb 2012 | B2 |
8307300 | Fisher | Nov 2012 | B1 |
8380648 | Matson et al. | Feb 2013 | B2 |
8407297 | Schmidt-Karaca et al. | Mar 2013 | B2 |
8463075 | Bastide et al. | Jun 2013 | B2 |
8474820 | Walker et al. | Jul 2013 | B2 |
8566699 | Tomasic et al. | Oct 2013 | B2 |
8620770 | Pope | Dec 2013 | B1 |
8645300 | Cowdrey et al. | Feb 2014 | B1 |
8645823 | Thiess | Feb 2014 | B1 |
9122981 | Pope | Sep 2015 | B1 |
20030237044 | Hayer et al. | Dec 2003 | A1 |
20040088210 | Tsyganskiy | May 2004 | A1 |
20050076311 | Kusterer et al. | Apr 2005 | A1 |
20050138137 | Encarnacion | Jun 2005 | A1 |
20050165761 | Chan | Jul 2005 | A1 |
20060010229 | Chen et al. | Jan 2006 | A1 |
20100153428 | Schechter | Jun 2010 | A1 |
20110078203 | Cohen et al. | Mar 2011 | A1 |
20110148878 | Baikie | Jun 2011 | A1 |
20110208730 | Jiang | Aug 2011 | A1 |
20110209159 | Baratz et al. | Aug 2011 | A1 |
20110252305 | Tschani et al. | Oct 2011 | A1 |
20110264518 | Liu | Oct 2011 | A1 |
20110298724 | Ameling et al. | Dec 2011 | A1 |
20120158693 | Papadimitriou et al. | Jun 2012 | A1 |
20120235938 | Laubach | Sep 2012 | A1 |
20120245996 | Mendez | Sep 2012 | A1 |
20130007147 | Toga et al. | Jan 2013 | A1 |
20130080641 | Lui et al. | Mar 2013 | A1 |
20130212462 | Athas et al. | Aug 2013 | A1 |
20130239028 | Forutanpour et al. | Sep 2013 | A1 |
20140013203 | Rogoveanu | Jan 2014 | A1 |
20140244661 | Peiris | Aug 2014 | A1 |
20140330809 | Raina | Nov 2014 | A1 |
20140330818 | Raina | Nov 2014 | A1 |
20150088648 | Chitnis | Mar 2015 | A1 |
Number | Date | Country |
---|---|---|
102880723 | Jan 2013 | CN |
02024244 | Oct 2002 | EP |
Entry |
---|
Office Action in related matter U.S. Appl. No. 14/226,379 mailed May 5, 2016; 17 pages. |
U.S. Appl. No. 13/904,561, filed May 29, 2013, Andreas Kunz. |
Number | Date | Country | |
---|---|---|---|
20150142941 A1 | May 2015 | US |
Number | Date | Country | |
---|---|---|---|
61904914 | Nov 2013 | US |