Claims
- 1. A system for restricting access to a resource for a validated system user, comprising:
an application view component adapted to receive a request from the validated system user and configure a security principal for the validated system user, the application view component further adapted to provide an interface for the validated system user to access the resource; and a resource adapter adapted to receive the request from the application view and use a security principal map to map the security principal to a resource-appropriate principal, the resource adapter further adapted to perform a resource sign-on in a manner specific to the resource using the resource-appropriate principal.
- 2. A system according to claim 1, wherein:
the resource adapter is further adapted to invoke functionality in the resource and expose that functionality through the application view component.
- 3. A system according to claim 1, wherein:
the application view component further provides a self-describing interface to services and events in the resource.
- 4. A system according to claim 1, further comprising:
a resource consisting of an enterprise system.
- 5. A system according to claim 1, wherein:
the application view component is specific to the resource adapter.
- 6. A system according to claim 1, wherein:
the application view component is further adapted to allow the setting and management of multiple levels of access and security in configuring a security principal.
- 7. A system according to claim 1, wherein:
the application view component further comprises a method that can to be invoked to allow a security level be set before a service is invoked on the application view component.
- 8. A system according to claim 1, further comprising:
an application component adapted to validate a user as a validated system user.
- 9. A system according to claim 1, wherein:
the resource adapter is a JCA connector.
- 10. A system according to claim 1, further comprising:
an application integration service adapted to run as a security principal for the application view component.
- 11. A system according to claim 1, further comprising:
a ConnectionSpec object adapted to be used by the application view component to set credentials for the resource.
- 12. A method for restricting access to a resource for a validated system user, comprising:
exposing an interface for a validated system user to access a resource; configuring a security principal for the validated system user when the validated system user makes a request to the interface; using a security principal map to map the security principal to a resource-appropriate principal; and performing a resource sign-on in a manner specific to the resource using the resource-appropriate principal, whereby the validated system user can access functionality in the resource.
- 13. A method according to claim 12, further comprising:
invoking functionality in the resource and exposing that functionality through the interface.
- 14. A method according to claim 12, further comprising:
setting and managing of multiple levels of access and security to be used in configuring a security principal.
- 15. A method according to claim 12, further comprising:
validating a user as a validated system user.
- 16. A system for integrating applications, comprising:
means for exposing an interface for a validated system user to access a resource; means for configuring a security principal for the validated system user when the validated system user makes a request to the interface; means for using a security principal map to map the security principal to a resource-appropriate principal; and means for performing a resource sign-on in a manner specific to the resource using the resource-appropriate principal, whereby the validated system user can access functionality in the resource.
- 17. A computer-readable medium, comprising:
means for exposing an interface for a validated system user to access a resource; means for configuring a security principal for the validated system user when the validated system user makes a request to the interface; means for using a security principal map to map the security principal to a resource-appropriate principal; and means for performing a resource sign-on in a manner specific to the resource using the resource-appropriate principal, whereby the validated system user can access functionality in the resource.
- 18. A computer program product for execution by a server computer for restricting access to a resource for a validated system user, comprising:
computer code for exposing an interface for a validated system user to access a resource; computer code for configuring a security principal for the validated system user when the validated system user makes a request to the interface; computer code for using a security principal map to map the security principal to a resource-appropriate principal; and computer code for performing a resource sign-on in a manner specific to the resource using the resource-appropriate principal, whereby the validated system user can access functionality in the resource.
- 19. A computer system comprising:
a processor; object code executed by said processor, said object code configured to:
expose an interface for a validated system user to access a resource; configure a security principal for the validated system user when the validated system user makes a request to the interface; use a security principal map to map the security principal to a resource-appropriate principal; and perform a resource sign-on in a manner specific to the resource using the resource-appropriate principal, whereby the validated system user can access functionality in the resource.
- 20. A computer data signal embodied in a transmission medium, comprising:
a code segment including instructions to expose an interface for a validated system user to access a resource; a code segment including instructions to configure a security principal for the validated system user when the validated system user makes a request to the interface; a code segment including instructions to use a security principal map to map the security principal to a resource-appropriate principal; and a code segment including instructions to perform a resource sign-on in a manner specific to the resource using the resource-appropriate principal, whereby the validated system user can access functionality in the resource.
CLAIM OF PRIORITY
[0001] This application claims priority to U.S. Provisional patent application No. 60/347,919, filed Oct. 18, 2001, entitled “APPLICATION VIEW,” as well as U.S. application Ser. No. 60/347,901, filed Oct. 18, 2001, entitled “EVENT ADAPTER,” each of which is hereby incorporated herein by reference.
Provisional Applications (2)
|
Number |
Date |
Country |
|
60347919 |
Oct 2001 |
US |
|
60347901 |
Oct 2001 |
US |