Claims
- 1. A method for synchronizing entries in a replicated storage system, the method comprising:
invalidating an entry of at least one replica store, wherein the invalidating of the entry of the replica store triggers information synchronization of a corresponding invalidated entry of a master store to a corresponding entry of an authoritative store on a next attempt to authenticate against the invalidated entry of the replica store.
- 2. The method, as recited in claim 1, wherein the replica store is a slave store.
- 3. The method, as recited in claim 1, further comprising:
propagating information of the synchronized master store entry to at least one other replica store.
- 4. The method, as recited in claim 1, further comprising:
propagating information of the synchronized master store entry to at least a second master store.
- 5. The method, as recited in claim 1, further comprising:
invalidating a corresponding entry of at least a second master store.
- 6. The method, as recited in claim 1, further comprising:
synchronizing the invalidated entry of the master store to a corresponding entry of an authoritative store.
- 7. The method, as recited in claim 6, wherein the synchronization of the invalidated entry of the master store to the corresponding entry of an authoritative store is based at least in part on information received from the replica store.
- 8. The method, as recited in claim 1, further comprising:
authenticating information at the master store for a request to authenticate at the replica store against the invalidated entry of the replica store.
- 9. The method, as recited in claim 1, further comprising:
synchronizing the invalidated entry of the replica store to a corresponding entry of the master store.
- 10. The method, as recited in claim 9, wherein the master store synchronizes the entry of the replica store to the corresponding entry of the master store.
- 11. The method, as recited in claim, 1 further comprising:
authenticating information at the replica store for a request, received by the replica store, to authenticate at the replica store against a valid entry.
- 12. The method, as recited in claim 6, wherein the information in the master store and the authoritative store are encoded using dissimilar protective transforms.
- 13. The method, as recited in claim 1, wherein the replica store and master store are encoded using similar or identical protective transforms.
- 14. The method, as recited in claim 1, further comprising:
detecting change to an entry of an authoritative store.
- 15. The method, as recited in claim 1, wherein the information includes an encoded credential.
- 16. The method, as recited in claim 1, wherein the information includes user authentication information.
- 17. The method, as recited in claim 1, further comprising:
securing at least some communications between the master and replica stores using a protective transform.
- 18. The method, as recited in claim 17, wherein the protective transform is in accordance with a secure sockets layer (SSL) protocol.
- 19. The method, as recited in claim 1, embodied, at least in part, as a computer program product executable encoded in one or more computer readable media selected from the set of disk, tape, or other magnetic, optical, or electronic storage medium and a network, wireline, wireless, or other communication medium.
- 20. The method, as recited in claim 1, embodied, at least in part, as a replicated directory system.
- 21. The method, as recited in claim 20, wherein the replicated directory system operates in accordance with a Lightweight Directory Access Protocol (LDAP).
- 22. A computer system comprising:
a master store; and at least one replica store, wherein the master store pushes invalidation information from the master store to the replica store.
- 23. The computer system of claim 22, wherein in response to the invalidation information, the replica store chains authentication to the master store.
- 24. The computer system of claim 22, wherein the master store pushes synchronization information from the master store to the replica store.
- 25. The computer system of claim 22, wherein the master store synchronizes an invalidated entry with a corresponding entry of an authoritative store in response to an invalidity indicator.
- 26. The computer system of claim 25 further comprising:
the authoritative store.
- 27. A computer program product executable to synchronize information stored in a replica store with that stored in a master store, wherein the master store synchronizes with an authoritative store in response to an invalidity indication for an entry of the master store and based at least in part on information received from the replica store.
- 28. The computer program product executable of claim 27,
wherein the synchronization is performed without reversing the protective transform employed by the authoritative store.
- 29. The computer program product executable of claim 27, wherein the master store updates the replica store.
- 30. A computer program product executable to synchronize information stored in a replica store with that stored in a master store, wherein the replica store authenticates at a master store in response to an invalidity indication for an entry of the replica store.
- 31. The computer program product executable of claim 30, wherein the replica store chains authentication information to the master store.
- 32. The computer program product executable of claim 30, wherein the master store synchronizes the invalid entry of the replica store.
- 33. The computer program product executable of claim 30, wherein the master store invalidates at least one entry of the replica store.
- 34. The computer program product executable of claim 30, wherein the master store invalidates at least one entry of a second master store.
- 35. A synchronization facility comprising:
a detector of an invalidated entry of a replica store; and an authenticator that chains to a master store authentication requests corresponding to invalidated entries of the replica store.
- 36. The synchronization facility of claim 35, wherein the master store synchronizes invalidated entries of the master store with corresponding entries of an authoritative store.
- 37. The synchronization facility of claim 35, wherein the master store synchronizes the invalidated entry of the replica store to a corresponding entry of the master store.
- 38. The synchronization facility of claim 35, wherein the authenticator authenticates, on the replica store, authentication requests received by the replica store corresponding to valid entries.
- 39. The synchronization facility of claim 35, wherein the master store pushes invalidated information to the replica store.
- 40. An apparatus comprising:
a replica store; means for synchronizing an invalidated entry of a replica store to an entry of an authoritative store that employs a different protective transform than the replica store.
- 41. The apparatus of claim 40 further comprising:
means for invalidating an entry of the replica store corresponding to a changed entry in the authoritative store.
CROSS-REFERENCE TO RELATED APPLICATION(S)
[0001] This application claims benefit under 35 U.S.C. § 119 of provisional application No. 60/438,386, filed Jan. 7, 2003, entitled “SYNCHRONIZATION FACILITY FOR INFORMATION DOMAINS EMPLOYING DISSIMILAR PROTECTIVE TRANSFORMS” naming Robert Lavender, Mark Wahl, Duane Baldwin, Andrew Coulbeck, and Bertold Kolics as inventors, and, in addition, claims benefit under 35 U.S.C. § 119 of provisional application No. 60/432,829, filed Dec. 12, 2002, naming Robert Lavender, Mark Wahl, Duane Baldwin, Andrew Coulbeck, and Bertold Kolics as inventors.
[0002] This application is related to co-pending application number ______, entitled “INVALIDATION FACILITY FOR SYNCHRONIZING INFORMATION DOMAINS” naming Robert Lavender, Mark Wahl, Duane Baldwin, Andrew Coulbeck, and Bertold Kolics as inventors, Attorney Docket No. 004-9364 and co-pending application number ______, entitled “SYNCRONIZATION FACILITY FOR INFORMATION DOMAINS EMPLOYING DISSIMILAR PROTECTIVE TRANSFORMATIONS” naming Robert Lavender, Mark Wahl, Duane Baldwin, Andrew Coulbeck, and Bertold Kolics as inventors Attorney Docket No. 004-9259 filed on even date herewith.
Provisional Applications (2)
|
Number |
Date |
Country |
|
60432829 |
Dec 2002 |
US |
|
60438386 |
Jan 2003 |
US |