US20090222833A1 - Codeless provisioning sync rules - Google Patents
Codeless provisioning sync rules Download PDFInfo
- Publication number
- US20090222833A1 US20090222833A1 US12/120,136 US12013608A US2009222833A1 US 20090222833 A1 US20090222833 A1 US 20090222833A1 US 12013608 A US12013608 A US 12013608A US 2009222833 A1 US2009222833 A1 US 2009222833A1
- Authority
- US
- United States
- Prior art keywords
- downstream
- resource manager
- resource
- synchronization
- expected
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/468—Specific access rights for resources, e.g. using capability register
Definitions
- Computers and computing systems have affected nearly every aspect of modern living. Computers are generally involved in work, recreation, healthcare, transportation, entertainment, household management, etc.
- resource manager systems have been created to manage entity permissions within an enterprise.
- the resource manager systems communicate with other resource systems in the enterprise to provide the other resource systems with instructions to add or remove permissions for entities.
- ILM Identity Lifecycle Manager
- a programmer create imperative programming code that allows the resource manager system to communicate with the other resource systems to cause the systems to add the appropriate permissions for entities. This of course may add additional complexity and difficulty to resource management functionality.
- the subject matter claimed herein is not limited to embodiments that solve any disadvantages or that operate only in environments such as those described above. Rather, this background is only provided to illustrate one exemplary technology area where some embodiments described herein may be practiced.
- Embodiments may be directed to managing resources in an enterprise.
- a computing environment may include a resource manager.
- the resource manager includes programmatic code for managing resources in the enterprise.
- Expected rule entries are added to an expected rules list.
- Each of the expected rule entries includes: an indicator used to identify a synchronization rule, a definition of flow type specifying that the synchronization rule can be used for at least one of importing data into the resource manager from a downstream resource system or exporting data from the resources manager to a downstream resource system, a specification of an object type in the resource manager to which the synchronization rule applies, a specification of a downstream resource system, a specification of an object type in the downstream resource system to which the synchronization rule applies, a specification of relationship criteria including one or more conditions for linking objects in the resource manager and the downstream resource system, and a specification of attribute flow information.
- Objects in downstream resource systems can be synchronized with objects in the resource manager based on the expected rule entries in the expected rules list.
- FIG. 1 illustrates a topology including a resource manager and downstream connected resource systems
- FIG. 2 illustrates a method of creating objects in downstream resource systems
- FIG. 3 illustrates a method of removing permissions from objects in downstream resource systems
- FIG. 4 illustrates a method of adding permissions to objects in downstream resource systems
- FIG. 5 illustrates a method of coordinating detected permissions with expected or desired permissions.
- Embodiments described in herein allow for the implementation of a resource manager system that synchronizes objects in a resource manager with objects in other downstream resource systems by executing declared workflows as appropriate.
- appropriate permissions can be granted in the downstream resource system objects so as to grant appropriate permissions to entities corresponding to the resource manger objects and downstream resource system objects. This allows the entities to access resources in the downstream resource systems.
- the following discussion illustrates a number of examples of how this functionality is implemented.
- a resource manager can be used to control what objects exist in downstream resource systems. The existence of objects in downstream resource systems allows for the functionality of those systems to be used and appropriate controls over resources implemented.
- the user object may provide functionality for allowing a computer user to access resources on the resource system. For example, if a user is to be granted access to an email system, a user object will typically need to be created in the email system. Similarly, if a user is to be granted access to data in a data storage system, a user object for the user will need to be created in the data storage system.
- a resource manager can facilitate creation of these user objects in the downstream systems including the email system, the data storage system, or other resource systems.
- Some embodiments described herein include a unified model, based around the concept of a “synchronization rule” along with policy rules and process to replace previous models with one that provides a single set of concepts that allows, through for example, the use of visually created processes and synchronization rules, the definition of how data is to flow both into and out of a resource manager to downstream resource systems.
- embodiments described herein may include functionality for exporting objects at a resource manager to downstream resource systems, importing objects at downstream resource systems into a resource manger, and functionality for updating or deleting existing objects in a resource manager and corresponding objects in downstream resource systems.
- a customer can use a resource manager portal, including a graphical user interface, to define synchronization rules, which encapsulate the details of how data is to flow in and out of a resource manager.
- the resource manager portal may include a graphical user interface including user interactive elements for receiving user input defining one or more objects, including object name and object type, managed by a resource manager, flow type for synchronizing objects managed by a resource manager with objects in one or more downstream resource systems, identification of one or more downstream resource systems, identification of object types in downstream resource systems corresponding to the one or more object types in the resource manager, and definition of relationship criteria for correlating objects in downstream resource systems with objects in the resource manager.
- a synchronization rule may define the relationship and transformation between a resource manager object and objects in downstream resource systems.
- a relationship may be based on a username, email address, or other identifier.
- the synchronization rule may define: how the resource manager creates objects in a downstream resource system, how the resource manager creates objects in its own store, and how data flows from a downstream resource system and a resource manager object. The customer can then use policy rules and process designer wizards to control the application of those particular synchronization rules to modifications of data within the resource manager application store.
- embodiments may implement graphical user interface elements for a synchronization rule designer application that allow an IT profession to design synchronization rules.
- the graphical user interface of the synchronization rule designer may be in a wizard format with “General Information,” “Scope,” “Relationship,” “Outbound Attribute Flow,” and “Inbound Attribute Flow” screens.
- the “General Information” screen allows a designer to define a name for a rule, a description for a rule, dependencies for a rule, and flow type for a rule.
- the name is a name that can be used to identify a synchronization rule.
- the description is an optional description of the rule that can include any description deemed applicable by the designer. A dependency on the existence of another synchronization rule can also be set.
- the “General Information” screen provides a pull-down menu for selecting already defined synchronization rules. As with other graphical user interface elements described herein, other interfaces may alternatively be used.
- the “General Information” screen may also include an interface for selection of flow type. For example, a user can define the rule as an inbound rule allowing for importing of data into the resource manager and/or an outbound rule allowing for exporting of data to a downstream system.
- the synchronization rule designer application may further include a “Scope” screen.
- the “Scope” screen in the example embodiment may allow for selecting a resource manager object type, selecting a downstream resource system, selecting a downstream system object type, and/or defining connected object scope. Defining connected object scope may be performed by defining one or more filters that identifies to which objects in a downstream resource system a synchronization rule will be applied. In one embodiment, the synchronization rule applies to objects in the downstream resource system which match all conditions defined in the connected object scope.
- the synchronization rule designer application may further include a “Relationship” screen.
- the “Relationship” screen includes user interface elements for defining how a relationship between a resource manager and a downstream resource system are identified and created.
- the “Relationship” screen allows for defining relationship criteria and relationship creation.
- User interface elements allowing for the specification of relationship criteria allow for specifying conditions that link together objects in the resource manager and in the downstream resource system.
- Various attributes may be selected, such as email addresses, usernames, etc. Additionally, various conditions may be specified.
- the “Relationship” screen may also allow for specifying that an object can be created if relationship criteria specified in the defined relationship criteria are not satisfied.
- a user can specify that an object is created in the resource manager if absent from the resource manager, an object is created in a downstream resource system if absent from a downstream resource system, that an object hierarchy is created in a downstream resource system and/or that an object is are deleted from a downstream resource system when an object is removed from the resource manager.
- the synchronization rule designer application may further include an “Outbound Attribute Flow” screen.
- the “Outbound Attribute Flow” screen includes user interface elements for defining attributes and values to flow from the resource manager to the downstream resource system.
- the “Outbound Attribute Flow” user interface elements allow for the definition of a source field, to identify the data to flow from the resource manager to an attribute in the downstream resource system; the destination, to identify the attribute in the downstream resource system to receive data identified in the source field; and options. For example, a user may specify an option whereby an attribute only flows when the destination object is created. Further, a user may select an option to specify that the attribute is used to flow to test the presence of a synchronization rule on a destination object.
- the synchronization rule designer application may further include an “Inbound Attribute Flow” screen.
- the “Inbound Attribute Flow” screen includes similar user interface elements to the “Outbound Attribute Flow” screen except that flow is defined from downstream resource systems to the resource manager.
- a business manager designer application provides a graphical user interface that allows a business manger to add or remove synchronization rules to or from resource manager objects. Adding or removing may be performed by manual selection or be selected to be performed automatically based on attribute values.
- a canonical scenario includes the provisioning of new users through a resource manager into downstream systems such as various email systems, database systems, or other systems. Provisioning may include, for example, adding permissions for a new employee to appropriate system resources to allow the employee to perform necessary work functions.
- FIG. 1 will now be used to illustrate an example. Note that in FIG. 1 , various components may be described generically or specifically. For example, a generic reference to a resource manager object 106 refers to any and all resource manager objects generically while specific references to resource manager object instances may be made by reference to an additional parenthetical designator such as resource manager 106 a . Similar references and designations are illustrated in FIG.
- synchronization rules 102 can be defined and included in expected rules lists (ERLs) 104 at the resource manager 110 that encapsulate how to transform what is created as resource manager object type into downstream resource system objects.
- ERPs expected rules lists
- the synchronization rules can be defined in some embodiments by using the graphical user interface as described above.
- synchronization rules 102 may be included explicitly in the expected rules list 104 or may be defined separate from the expected rules lists 104 and included by reference in the expected rules lists 104 as appropriate.
- the synchronization rule 102 a may indicate how to transform resource manager object 106 a , when created or modified, to a corresponding downstream resource object 108 a at the downstream resource system 114 a .
- a synchronization rule 102 may define both how data is to flow from the resource manager 110 to the downstream resource system object 108 , as well as specific instructions on how to find an already existing downstream resource system object 108 to flow data to as well as further instructions on how, if desired, to create a new downstream resource system user object 108 if a suitable one is not found.
- a customer can then define a policy rule around the creation of new resource manager objects 106 in the resource manager 110 as they arrive through its resource management service. From here, the customer can construct a resource manager process, associated to the action phase of an event that will add the newly created resource manager object 106 to the synchronization rule 102 defined previously. The ultimate result being that when a new resource manager object 106 is created in the resource manager 110 , an event will be generated that causes this action process to run and signal that this newly created resource manager object 106 is to have the synchronization rule 102 applied to it.
- a user can create arbitrarily complex processes, such as in the form or declarative workflows, which add and remove objects in the resource manager 110 to synchronization rules 102 as needed and dictated by their own business process.
- the termination or de-provisioning scenario in which a user is leaving the company can be handled in a similar manner as the creation scenario, just that a process will be defined to run on the event of a resource manager object 106 being deleted from the resource manager system and that process will remove that deleted resource manager object 106 from the synchronization rule 102 .
- declarative workflows differ from imperative programming in the declarative objects in declarative workflows define an end goal without defining specific acts to accomplish the goal.
- imperative programming requires a programmer to define explicitly each step without necessarily defining the end goal.
- Embodiments described herein may include definitions of bidirectional data flow logic within the concept of a synchronization rule 102 . Further embodiments may include the application of synchronization rules 102 by virtue of matching of a policy rule and execution of a subsequent resource manager process.
- Embodiments may be directed to both processing of synchronization rules by a synchronization engine, as well as the rules application to relevant resource manager objects 106 done through the resource manager request processing cycle (which, in one embodiment, processes end user web service requests through three distinct phases: authentication, authorization and action).
- a customer defines both the relationship between an object in a downstream resource system and one in a resource manager metaverse as well as the flow of data between the two.
- this single structure did not exist, but rather a user would have to define the inbound flow of data through a single set of concepts (Join/Projection/Inbound Flow) that were independent from those which governed the flow of data outbound from the resource manager (Programmed logic+Outbound flow).
- the synchronization rule defines a new set of concepts which is meant to treat both directions of flow the same, while at the same time eliminating the need for any programming as part of this structure.
- Synchronization rules are run both when importing changes from a downstream resource system into the resource manager (‘inbound’), as well as when exporting changes from the resource manager to a downstream resource system (‘outbound’).
- a synchronization rule may operate by scoping the appropriate set of objects, then looking for or establishing a relationship with an object in the other system, and then applying the transformation specified as part of the rule between the source object and the target object found as part of the relationship.
- scoping may be achieved through a straight attribute-value filter which is used to collect the necessary set of objects in the downstream resource system upon which a synchronization rule should be applied to on import.
- set memberships, policy rules and process may be the dictators of which objects are brought in and out of scope of a synchronization rule rather than a straight filter as is used on the inbound case.
- each resource manager object has associated a list of synchronization rules to which the resource manager object should be applied. This list is referred to herein as the expected rules list 104 .
- synchronization rules are added and removed from a resource manager object's expected rules 104 list through action processes in a declarative workflow which use the synchronization rule activity to manipulate the expected rules list. These action workflows may be expected to launch as a result of normal resource manager operations on its objects.
- each resource manager object 106 also has an associated list which visualizes what synchronization rules are confirmed to exist on that resource manager object in the real world, this list is called the detected rules list 112 .
- the detected rules list 112 and expected rules list 104 may be completely independent of each other and are only applicable from a resource manager centric view. That is, the expected rules list 104 is used for outbound synchronization and the detected rules list 112 is used for looking at a resource manager object's representation in downstream systems.
- 108 a is a downstream representation of 106 a.
- a detected rules list 112 may be created by identifying objects in connected downstream systems 114 and correlating the objects with objects in the resource manager 110 .
- Resource manager objects 106 can be created in the resource manager 110 as necessary to account for objects 108 discovered in downstream resource systems.
- downstream resource systems 114 may include objects 108 granting permissions to entities of which the resource manager 110 is not aware.
- Creation of a detected rules list 112 provides functionality for identifying these objects 108 in downstream systems 114 .
- the expected rules list 104 can then be updated to either note the objects 108 in the downstream systems 114 or to remove permissions, by removing downstream resource system objects 108 from the downstream systems 114 or to remove permission from the downstream system objects 108 .
- the expected rules list 104 and detected rules list 112 constructs allow for a user to both look at what a representation of resource manager object 106 is supposed to look like in downstream systems 114 as a downstream resource system object 108 , as well as confirm what that representation actually is.
- the detected rules list 112 proves especially useful for compliance reporting, in that a single attribute will display the known representation of that particular resource manager object 106 as it is known to correspond to downstream resource system objects 108 in other systems.
- each object's expected rules list 104 may used to determine which objects fall into the scope of the synchronization rule 102 .
- the method 200 may be practiced for example in a computing environment including a resource manager.
- the resource manager includes programmatic code for managing resources.
- the method 200 includes an act of receiving user input indicating that a new entity should be added to the resource manager (act 202 ).
- a user may desire to add a new object such as resource manager object 106 a to the resource manager 110 .
- a user may indicate, using a user interface coupled to the resource manager 110 , the desire to add the resource manager object 106 a.
- the method 200 further includes creating a new entity object corresponding to the new entity (act 204 ) and generating an event (act 206 ).
- a resource manager object 106 a may be added to the resource manager repository and an event may be generated.
- the event may specify a workflow that should be executed.
- the workflow is configured to add synchronization rules 102 to an expected rules list 104 a particular to the new entity object.
- a workflow may be configured to add the synchronization rule 102 a to the expected rules list 104 a .
- Synchronization rules 102 on the expected rules list define how to transform objects 106 at the resource manager 110 into objects 108 at downstream resource systems 114 .
- synchronization rules 102 may define how one or more entity objects 108 are created in a downstream resource system 114 , how one or more entity objects 106 are created at the resource manager 110 and how data flows from a downstream resource system 114 to a resource manager object 106 .
- synchronization 102 rules may define within a single synchronization rule 102 , one or more of an inbound, outbound, or bi-directional relationship between a downstream resource system 114 and the resource manager 110 .
- the method 200 further illustrates that in response to the event, the workflow specified in the event is executed causing synchronization rules to be added to the expected rules list (act 208 ).
- the synchronization rule 102 a is added to the expected rules list 104 a .
- adding synchronization rules to an expected rules list may be performed in a number of different fashions.
- a synchronization rule 102 a may be stored in a rule repository at the resource manager 110 .
- the synchronization rule 102 a may be added to the expected rules list 104 a by reference to a synchronization rule in the rule repository.
- a rule may be added to the expected rules list explicitly by direct definition in the expected rules list 104 a .
- an expected rules list 104 may serve as the repository for synchronization rules 102 in the expected rules list 104 .
- the method 200 may further be practiced such that at a synchronization engine of the resource manager, a workflow is executed to synchronize the new entity object with corresponding objects in downstream resource systems managed by the resource manager so as to cause the creation of permissions for the new entity in the downstream resource systems by executing the synchronization rules in the expected rules list.
- the synchronization engine may reference the synchronization rule 102 a in the expected rules list 104 a .
- the synchronization engine may determine that the resource manager object 106 a should be synchronized with the downstream resource system object 108 a at the downstream resource system 114 a . As will be described in more detail below, this may be accomplished by correlation of an existing downstream resource system object 108 with a resource manager object 106 or by creation of a new downstream resource system object 108 to correspond with the resource manager object 106 .
- the method 200 may be performed where causing the creation of permissions for the new entity in the downstream resource systems includes determining that an object corresponding to the new entity object does not exist in the downstream resource system; and creating an object in the downstream resource system corresponding to the new entity object at the resource manager.
- the downstream resource system object 108 a may not exist in the downstream resource system 114 a when the synchronization engine executes a workflow to synchronize the synchronization rule 102 a to synchronize the resource manager object 106 a with the downstream resource system object 108 a .
- embodiments may include creating the downstream resource system object 108 a in the downstream resource system 114 a . This allows for further synchronization in granting of appropriate rights and permissions.
- the method 200 may be practiced where executing a workflow to synchronize the new entity object with corresponding objects in downstream resource systems managed by the resource manager includes executing synchronization rules according to precedence specified for the synchronization rules.
- the precedence specifies synchronization rules that should be executed before other synchronization rules.
- the expected rules list 104 a may include a number of synchronization rules including rules 102 a through 102 n .
- the method 300 illustrates the number of acts that may be performed in a computing environment including a resource manager.
- the resource manager includes programmatic code for managing resources in the computing environment.
- the method 300 includes acts for managing resources including managing permissions for entities to access the resources.
- the method includes receiving user input indicating that an entity represented by an entity object of the resource manager should have permissions removed at the resource manager (act 302 ). For example, a user interacting with a user interface connected to the resource manager 110 may indicate that an entity corresponding to a resource manager object 106 a should have permissions removed from downstream resource systems 114 .
- the entity is an employee at an organization and the role of the entity is changed, it may be necessary to remove certain permissions from a certain downstream resource systems 114 such that the entity can no longer access, or perform certain access actions at resources at the downstream resource systems 114 . Such may be indicated by an administrator interacting with the resource manager 110 .
- an event is generated (act 304 ).
- the event specifies a workflow that should be executed.
- the workflow is configured to cause synchronization rules in an expected rules list particular to the entity object to indicate that permissions should be removed for the entity in one or more downstream resource systems. For example, a synchronization rule 102 a may be modified to indicate that permissions should be removed from a downstream resource system object 108 a.
- the method 300 may further include in response to the event, executing the workflow specified in the event (act 306 ) causing synchronization rules to indicate that permissions should be removed for the entity in one or more downstream resource systems.
- the method 300 may further include, at a synchronization engine of the resource manager, executing a workflow to synchronize the entity object with corresponding objects in downstream resource systems managed by the resource manager so as to cause the removal of permissions for the entity in the downstream resource systems.
- a workflow may be configured to reference the synchronization rule 102 a and to synchronize a resource manager object 106 a with a downstream resource system object 108 a where such synchronization results in the removal of permissions for the downstream resource system object 108 a.
- the method 300 may be practiced where causing synchronization rules in an expected rules list particular to the entity object to indicate that permissions should be removed for the entity in downstream resource systems includes adding new synchronization rules to the expected rules list. For example, a new synchronization rule 102 may be added to an expected rules list 104 indicating that permissions should be removed.
- the method 300 may further include generating a detected rules list, where the detected rules list specifies existing permissions for the entity object for resources in an the computing environment.
- Generating a detected rules list includes examining objects in downstream resource systems and correlating the examined objects in downstream resource systems with resource manager objects managed by the resource manager.
- Executing the workflow specified in the event causing synchronization rules to be removed from the expected rules list includes causing a workflow to be executed that causes existing permission from the detected rules list to be removed from the expected rules list.
- the detected rules list 112 a may determine that a downstream resource system object 108 a includes certain permissions that are undesirable to be granted to an entity corresponding to the downstream resource system object 108 a . To remove these permissions, the synchronization rule 102 may be added to the expected rules list 104 a which specifically removes the permissions from the downstream resource system object 108 a.
- causing synchronization rules in an expected rules list particular to the entity object to indicate that permissions should be removed for the entity in downstream resource systems may include modifying existing synchronization rules in the expected rules list. For example, if the synchronization rule 102 a is included on the expected rules list 104 a and grants certain permissions to the downstream resource system object 108 a , removal of the permissions may be accomplished by modifying the synchronization rule 102 a.
- FIG. 4 illustrates yet another embodiment that may be practiced in a computing environment including a resource manager.
- the resource manager includes programmatic code for managing resources in the computing environment.
- the method of managing resources includes managing permissions for entities to access the resources.
- the method 400 includes receiving user input indicating that an entity represented by an entity object of the resource manager should have permissions added at the resource manager (act 402 ). For example, a resource manager object 106 a corresponding to an entity may exist in the resource manager 110 .
- An administrator interacting with the resource manager 110 may provide user input indicating that additional permissions should be added in downstream resource systems 114 for the resource manager object 106 a.
- the method 400 further illustrates that in response to receiving user input that an entity should have permissions added at the resource manager, an event is generated (act 404 ).
- the event specifies a workflow that should be executed.
- the workflow is configured to cause synchronization rules in an expected rules list particular to the entity object to indicate that permissions should be added for the entity in one or more downstream resource systems.
- a synchronization rule 102 a may be added to an expected rules list 104 a , or modified if the appropriate synchronization rule 102 a already exists in the expected rules list 104 a , to allow for an event to indicate that permissions should be added to a downstream resource system object 108 a.
- the method 400 further includes in response to the event, executing the workflow specified in the event causing synchronization rules to indicate that permissions should be added for the entity in one or more downstream resource systems (act 406 ).
- the method 400 may further include at a synchronization engine of the resource manager, executing a workflow to synchronize the entity object with corresponding objects in downstream resource systems managed by the resource manager so as to cause the creation of permissions for the new entity in the downstream resource systems by executing the synchronization rules in the expected rules list.
- a workflow may be configured to reference the synchronization rule 102 a in the expected rules list 104 a so as to synchronize and/or otherwise create permissions in the downstream resource system object 108 a.
- the method 500 may be practiced In a computing environment including a resource manager, the resource manager comprising programmatic code for managing resources in the computing environment, the method 500 includes generating a detected rules list (act 502 ).
- the detected rules list specifies existing permissions for an entity for resources in a computing system.
- Generating a detected rules list includes examining objects in downstream resource systems and correlating the examined objects in downstream resource systems with resource manager objects managed by the resource manager.
- the method 500 further includes accessing an expected rules list (act 504 ).
- the expected rules list defines permissions that should exist for the entity for resources in the computing system.
- an expected rules list may define how synchronization should be performed between a resource manager object 102 and a corresponding downstream resource system object 108 . Permissions can be inferred or determined from the rules in the expected rules list 104 .
- the method 500 further includes comparing the detected rules list to the expected rules list and determining that the detected rules list includes permissions not included in the expected rules list (act 506 ).
- the detected rules list 104 a may be compared to the detected rules list 112 a . Based on the comparison, a determination may be made that the detected rules list 112 a includes permissions for an entity that are not included in the expected rules list 104 a.
- the method 500 may further include receiving user input indicating the permissions included in the detected rules list and not included in the expected rules list should be removed. This embodiment further includes in response to the user input, removing the permissions included in the detected rules list and not included in the expected rules list by modifying the expected rules list and executing a workflow.
- the workflow is configured to cause the removal of permissions in downstream resource systems.
- modifying the expected rules list includes including an entry in the expected rules list indicating removal of one or more permissions.
- correlating the examined objects in downstream resource systems with objects managed by the resource manager includes determining that an object does not exist in the resource manager that can be correlated with an object in the downstream resource system. An object is created in the resource manager to correlate with the object in the downstream resource system.
- the method 500 may be practiced where the expected rules list includes one or more synchronization rules.
- Each of the one or more synchronization rules may include a number of parameters.
- each of the one or more synchronization rules may include an indicator used to identify the synchronization rule.
- Each of the one or more synchronization rules may include, a definition of flow type specifying that the synchronization rule can be used for at least one of importing data into a the resource manager from a downstream resource system or exporting data from the resources manager to a downstream resource system.
- Each of the one or more synchronization rules may include specification of an object type in the resource manager that the synchronization rule applies to.
- Each of the one or more synchronization rules may include specification of a downstream resource system.
- Each of the one or more synchronization rules may include specification of an object type in the downstream resource system to which the synchronization rule applies.
- Each of the one or more synchronization rules may include specification of relationship criteria including one or more conditions for linking objects in the resource manager and the downstream resource system.
- each of the one or more synchronization rules may optionally include specification of attribute flow information.
- Each of the one or more synchronization rules may optionally include a description of the synchronization rule.
- Each of the one or more synchronization rules may optionally include information defining a dependency on the existence of another synchronization rule.
- Each of the one or more synchronization rules may optionally include a filter used for identifying objects in the downstream resource system to which the synchronization rule will be applied. The filter may include conditions that must be satisfied to apply the synchronization rule.
- Each of the one or more synchronization rules may optionally include specification of relationship creation acts that can be used when the relationship criteria specified in the relationship criteria is not satisfied.
- the relationship creation acts may include creation of an object in the resource manager if absent from the resource manager.
- relationship creation acts may include creation of an object in a downstream resource system if absent from the downstream resource system.
- relationship creation acts may include creation of an object hierarchy in a downstream resource system.
- relationship creation acts may include deletion of an object from a downstream resource system when a corresponding object is removed from the resource manager.
- Embodiments herein may comprise a special purpose or general-purpose computer including various computer hardware, as discussed in greater detail below.
- Embodiments may also include computer-readable media for carrying or having computer-executable instructions or data structures stored thereon.
- Such computer-readable media can be any available media that can be accessed by a general purpose or special purpose computer.
- Such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code means in the form of computer-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer.
- Computer-executable instructions comprise, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
- This application claims the benefit of U.S. Provisional Application No. 61/032,389, filed Feb. 28, 2008 titled “Codeless Provisioning”, which is incorporated herein by reference in its entirety.
- Computers and computing systems have affected nearly every aspect of modern living. Computers are generally involved in work, recreation, healthcare, transportation, entertainment, household management, etc.
- In many computing enterprises it is often desirable to grant permissions to entities working within the enterprise to allow entities to access certain resources within the enterprise. For example, when an individual is hired at a company it may be appropriate to assign the individual access to e-mail by creation of an e-mail account, access to certain databases by creation of database access accounts, or access to other resources.
- Various resource manager systems have been created to manage entity permissions within an enterprise. The resource manager systems communicate with other resource systems in the enterprise to provide the other resource systems with instructions to add or remove permissions for entities. For example, Identity Lifecycle Manager® (ILM) provided by Microsoft® Corporation of Redmond Wash. provides the ability to manage entity permissions within an enterprise. However, many such systems require that a programmer create imperative programming code that allows the resource manager system to communicate with the other resource systems to cause the systems to add the appropriate permissions for entities. This of course may add additional complexity and difficulty to resource management functionality. The subject matter claimed herein is not limited to embodiments that solve any disadvantages or that operate only in environments such as those described above. Rather, this background is only provided to illustrate one exemplary technology area where some embodiments described herein may be practiced.
- Embodiments may be directed to managing resources in an enterprise. A computing environment may include a resource manager. The resource manager includes programmatic code for managing resources in the enterprise. Expected rule entries are added to an expected rules list. Each of the expected rule entries includes: an indicator used to identify a synchronization rule, a definition of flow type specifying that the synchronization rule can be used for at least one of importing data into the resource manager from a downstream resource system or exporting data from the resources manager to a downstream resource system, a specification of an object type in the resource manager to which the synchronization rule applies, a specification of a downstream resource system, a specification of an object type in the downstream resource system to which the synchronization rule applies, a specification of relationship criteria including one or more conditions for linking objects in the resource manager and the downstream resource system, and a specification of attribute flow information. Objects in downstream resource systems can be synchronized with objects in the resource manager based on the expected rule entries in the expected rules list.
- This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
- Additional features and advantages will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the teachings herein. Features and advantages of the invention may be realized and obtained by means of the instruments and combinations particularly pointed out in the appended claims. Features of the present invention will become more fully apparent from the following description and appended claims, or may be learned by the practice of the invention as set forth hereinafter.
- In order to describe the manner in which the above-recited and other advantages and features can be obtained, a more particular description of the subject matter briefly described above will be rendered by reference to specific embodiments which are illustrated in the appended drawings. Understanding that these drawings depict only typical embodiments and are not therefore to be considered to be limiting in scope, embodiments will be described and explained with additional specificity and detail through the use of the accompanying drawings in which:
-
FIG. 1 illustrates a topology including a resource manager and downstream connected resource systems; -
FIG. 2 illustrates a method of creating objects in downstream resource systems; -
FIG. 3 illustrates a method of removing permissions from objects in downstream resource systems; -
FIG. 4 illustrates a method of adding permissions to objects in downstream resource systems; and -
FIG. 5 illustrates a method of coordinating detected permissions with expected or desired permissions. - Embodiments described in herein allow for the implementation of a resource manager system that synchronizes objects in a resource manager with objects in other downstream resource systems by executing declared workflows as appropriate. In particular, using resource manager objects correlated to downstream resource system objects, appropriate permissions can be granted in the downstream resource system objects so as to grant appropriate permissions to entities corresponding to the resource manger objects and downstream resource system objects. This allows the entities to access resources in the downstream resource systems. The following discussion illustrates a number of examples of how this functionality is implemented. In particular, a resource manager can be used to control what objects exist in downstream resource systems. The existence of objects in downstream resource systems allows for the functionality of those systems to be used and appropriate controls over resources implemented. For example, if a user object exists in a downstream resource system, the user object may provide functionality for allowing a computer user to access resources on the resource system. For example, if a user is to be granted access to an email system, a user object will typically need to be created in the email system. Similarly, if a user is to be granted access to data in a data storage system, a user object for the user will need to be created in the data storage system. A resource manager can facilitate creation of these user objects in the downstream systems including the email system, the data storage system, or other resource systems.
- Previously there has been no mechanism to control how data flows between two systems in a purely declarative manner. Some embodiments described herein include a unified model, based around the concept of a “synchronization rule” along with policy rules and process to replace previous models with one that provides a single set of concepts that allows, through for example, the use of visually created processes and synchronization rules, the definition of how data is to flow both into and out of a resource manager to downstream resource systems. In particular, embodiments described herein may include functionality for exporting objects at a resource manager to downstream resource systems, importing objects at downstream resource systems into a resource manger, and functionality for updating or deleting existing objects in a resource manager and corresponding objects in downstream resource systems.
- A customer can use a resource manager portal, including a graphical user interface, to define synchronization rules, which encapsulate the details of how data is to flow in and out of a resource manager. The resource manager portal may include a graphical user interface including user interactive elements for receiving user input defining one or more objects, including object name and object type, managed by a resource manager, flow type for synchronizing objects managed by a resource manager with objects in one or more downstream resource systems, identification of one or more downstream resource systems, identification of object types in downstream resource systems corresponding to the one or more object types in the resource manager, and definition of relationship criteria for correlating objects in downstream resource systems with objects in the resource manager. In particular, a synchronization rule may define the relationship and transformation between a resource manager object and objects in downstream resource systems. For example, a relationship may be based on a username, email address, or other identifier. The synchronization rule may define: how the resource manager creates objects in a downstream resource system, how the resource manager creates objects in its own store, and how data flows from a downstream resource system and a resource manager object. The customer can then use policy rules and process designer wizards to control the application of those particular synchronization rules to modifications of data within the resource manager application store.
- For example, embodiments may implement graphical user interface elements for a synchronization rule designer application that allow an IT profession to design synchronization rules. In one embodiment, the graphical user interface of the synchronization rule designer may be in a wizard format with “General Information,” “Scope,” “Relationship,” “Outbound Attribute Flow,” and “Inbound Attribute Flow” screens.
- The “General Information” screen allows a designer to define a name for a rule, a description for a rule, dependencies for a rule, and flow type for a rule. The name is a name that can be used to identify a synchronization rule. The description is an optional description of the rule that can include any description deemed applicable by the designer. A dependency on the existence of another synchronization rule can also be set. In one embodiment, the “General Information” screen provides a pull-down menu for selecting already defined synchronization rules. As with other graphical user interface elements described herein, other interfaces may alternatively be used. The “General Information” screen may also include an interface for selection of flow type. For example, a user can define the rule as an inbound rule allowing for importing of data into the resource manager and/or an outbound rule allowing for exporting of data to a downstream system.
- The synchronization rule designer application may further include a “Scope” screen. The “Scope” screen, in the example embodiment may allow for selecting a resource manager object type, selecting a downstream resource system, selecting a downstream system object type, and/or defining connected object scope. Defining connected object scope may be performed by defining one or more filters that identifies to which objects in a downstream resource system a synchronization rule will be applied. In one embodiment, the synchronization rule applies to objects in the downstream resource system which match all conditions defined in the connected object scope.
- The synchronization rule designer application may further include a “Relationship” screen. The “Relationship” screen includes user interface elements for defining how a relationship between a resource manager and a downstream resource system are identified and created. In particular, the “Relationship” screen allows for defining relationship criteria and relationship creation. User interface elements allowing for the specification of relationship criteria allow for specifying conditions that link together objects in the resource manager and in the downstream resource system. Various attributes may be selected, such as email addresses, usernames, etc. Additionally, various conditions may be specified. The “Relationship” screen may also allow for specifying that an object can be created if relationship criteria specified in the defined relationship criteria are not satisfied. A user can specify that an object is created in the resource manager if absent from the resource manager, an object is created in a downstream resource system if absent from a downstream resource system, that an object hierarchy is created in a downstream resource system and/or that an object is are deleted from a downstream resource system when an object is removed from the resource manager.
- The synchronization rule designer application may further include an “Outbound Attribute Flow” screen. The “Outbound Attribute Flow” screen includes user interface elements for defining attributes and values to flow from the resource manager to the downstream resource system. The “Outbound Attribute Flow” user interface elements allow for the definition of a source field, to identify the data to flow from the resource manager to an attribute in the downstream resource system; the destination, to identify the attribute in the downstream resource system to receive data identified in the source field; and options. For example, a user may specify an option whereby an attribute only flows when the destination object is created. Further, a user may select an option to specify that the attribute is used to flow to test the presence of a synchronization rule on a destination object. The synchronization rule designer application may further include an “Inbound Attribute Flow” screen. The “Inbound Attribute Flow” screen includes similar user interface elements to the “Outbound Attribute Flow” screen except that flow is defined from downstream resource systems to the resource manager.
- A business manager designer application provides a graphical user interface that allows a business manger to add or remove synchronization rules to or from resource manager objects. Adding or removing may be performed by manual selection or be selected to be performed automatically based on attribute values.
- A canonical scenario includes the provisioning of new users through a resource manager into downstream systems such as various email systems, database systems, or other systems. Provisioning may include, for example, adding permissions for a new employee to appropriate system resources to allow the employee to perform necessary work functions.
FIG. 1 will now be used to illustrate an example. Note that inFIG. 1 , various components may be described generically or specifically. For example, a generic reference to a resource manager object 106 refers to any and all resource manager objects generically while specific references to resource manager object instances may be made by reference to an additional parenthetical designator such asresource manager 106 a. Similar references and designations are illustrated inFIG. 1 for synchronization rules 102, expected rules lists 104, downstream resource system objects 108, and detected rules lists (DRLs) 112. Also note that although not discussed specifically, some specific representations, such as 102 b, 104b 106 b, 112 b, 108 b-108 f, 114 b and 114 c are included to illustrates that multiple specific instances of an item may be included in a computing environment. However, the remaining principles can be understood by reference to the single instances referred to below. - Illustrating now an example, in the case of provisioning, and referring once again to
FIG. 1 , synchronization rules 102 can be defined and included in expected rules lists (ERLs) 104 at theresource manager 110 that encapsulate how to transform what is created as resource manager object type into downstream resource system objects. The synchronization rules can be defined in some embodiments by using the graphical user interface as described above. Notably, synchronization rules 102 may be included explicitly in the expected rules list 104 or may be defined separate from the expected rules lists 104 and included by reference in the expected rules lists 104 as appropriate. Illustrating now an example, thesynchronization rule 102 a may indicate how to transformresource manager object 106 a, when created or modified, to a correspondingdownstream resource object 108 a at thedownstream resource system 114 a. A synchronization rule 102 may define both how data is to flow from theresource manager 110 to the downstream resource system object 108, as well as specific instructions on how to find an already existing downstream resource system object 108 to flow data to as well as further instructions on how, if desired, to create a new downstream resource system user object 108 if a suitable one is not found. - Once a synchronization rule 102 is defined, a customer can then define a policy rule around the creation of new resource manager objects 106 in the
resource manager 110 as they arrive through its resource management service. From here, the customer can construct a resource manager process, associated to the action phase of an event that will add the newly created resource manager object 106 to the synchronization rule 102 defined previously. The ultimate result being that when a new resource manager object 106 is created in theresource manager 110, an event will be generated that causes this action process to run and signal that this newly created resource manager object 106 is to have the synchronization rule 102 applied to it. - Using these constructs, a user can create arbitrarily complex processes, such as in the form or declarative workflows, which add and remove objects in the
resource manager 110 to synchronization rules 102 as needed and dictated by their own business process. - The termination or de-provisioning scenario in which a user is leaving the company can be handled in a similar manner as the creation scenario, just that a process will be defined to run on the event of a resource manager object 106 being deleted from the resource manager system and that process will remove that deleted resource manager object 106 from the synchronization rule 102. Note that declarative workflows differ from imperative programming in the declarative objects in declarative workflows define an end goal without defining specific acts to accomplish the goal. In contrast, imperative programming requires a programmer to define explicitly each step without necessarily defining the end goal.
- Embodiments described herein may include definitions of bidirectional data flow logic within the concept of a synchronization rule 102. Further embodiments may include the application of synchronization rules 102 by virtue of matching of a policy rule and execution of a subsequent resource manager process.
- Embodiments may be directed to both processing of synchronization rules by a synchronization engine, as well as the rules application to relevant resource manager objects 106 done through the resource manager request processing cycle (which, in one embodiment, processes end user web service requests through three distinct phases: authentication, authorization and action).
- Within the single structure of synchronization rules, a customer defines both the relationship between an object in a downstream resource system and one in a resource manager metaverse as well as the flow of data between the two. In previous versions of resource managers, this single structure did not exist, but rather a user would have to define the inbound flow of data through a single set of concepts (Join/Projection/Inbound Flow) that were independent from those which governed the flow of data outbound from the resource manager (Programmed logic+Outbound flow). In some embodiments, the synchronization rule defines a new set of concepts which is meant to treat both directions of flow the same, while at the same time eliminating the need for any programming as part of this structure.
- Synchronization rules are run both when importing changes from a downstream resource system into the resource manager (‘inbound’), as well as when exporting changes from the resource manager to a downstream resource system (‘outbound’).
- In any direction, a synchronization rule may operate by scoping the appropriate set of objects, then looking for or establishing a relationship with an object in the other system, and then applying the transformation specified as part of the rule between the source object and the target object found as part of the relationship.
- When looking at the direction of flow being from a downstream resource system to the resource manager, scoping may be achieved through a straight attribute-value filter which is used to collect the necessary set of objects in the downstream resource system upon which a synchronization rule should be applied to on import.
- However, when looking at synchronization from the resource manager perspective, set memberships, policy rules and process may be the dictators of which objects are brought in and out of scope of a synchronization rule rather than a straight filter as is used on the inbound case. Specifically, when looking at the resource manager, there may be no automatic filter which collects users within the scope of a rule, instead each resource manager object has associated a list of synchronization rules to which the resource manager object should be applied. This list is referred to herein as the expected rules list 104. When a synchronization rule appears on a resource manager object's expected rules list 104, that resource manager object is then manually added to the scope of the associated synchronization rule upon the next run of the synchronization engine. It is expected that synchronization rules are added and removed from a resource manager object's expected rules 104 list through action processes in a declarative workflow which use the synchronization rule activity to manipulate the expected rules list. These action workflows may be expected to launch as a result of normal resource manager operations on its objects.
- Additionally, each resource manager object 106 also has an associated list which visualizes what synchronization rules are confirmed to exist on that resource manager object in the real world, this list is called the detected rules list 112. The detected rules list 112 and expected rules list 104 may be completely independent of each other and are only applicable from a resource manager centric view. That is, the expected rules list 104 is used for outbound synchronization and the detected rules list 112 is used for looking at a resource manager object's representation in downstream systems. In
FIG. 1 , 108 a is a downstream representation of 106 a. - A detected rules list 112 may be created by identifying objects in connected downstream systems 114 and correlating the objects with objects in the
resource manager 110. Resource manager objects 106 can be created in theresource manager 110 as necessary to account for objects 108 discovered in downstream resource systems. Often downstream resource systems 114 may include objects 108 granting permissions to entities of which theresource manager 110 is not aware. Creation of a detected rules list 112 provides functionality for identifying these objects 108 in downstream systems 114. The expected rules list 104 can then be updated to either note the objects 108 in the downstream systems 114 or to remove permissions, by removing downstream resource system objects 108 from the downstream systems 114 or to remove permission from the downstream system objects 108. - The expected rules list 104 and detected rules list 112 constructs allow for a user to both look at what a representation of resource manager object 106 is supposed to look like in downstream systems 114 as a downstream resource system object 108, as well as confirm what that representation actually is. The detected rules list 112 proves especially useful for compliance reporting, in that a single attribute will display the known representation of that particular resource manager object 106 as it is known to correspond to downstream resource system objects 108 in other systems.
- As mentioned above, if the synchronization rule is being evaluated in the inbound direction, the scoping of an object may be done via the filter. If it is being evaluated in the outbound leg, each object's expected rules list 104 may used to determine which objects fall into the scope of the synchronization rule 102.
- The following discussion now refers to a number of methods and method acts that may be performed. It should be noted, that although the method acts may be discussed in a certain order, no particular ordering is necessarily required unless specifically stated, or required because an act is dependent on another act being completed prior to the act being performed.
- Referring now to
FIG. 2 , amethod 200 is illustrated. Themethod 200 may be practiced for example in a computing environment including a resource manager. The resource manager includes programmatic code for managing resources. Themethod 200 includes an act of receiving user input indicating that a new entity should be added to the resource manager (act 202). For example, in the example illustrated inFIG. 1 , a user may desire to add a new object such asresource manager object 106 a to theresource manager 110. A user may indicate, using a user interface coupled to theresource manager 110, the desire to add theresource manager object 106 a. - In response to receiving user input indicating that a new entity should be added to the resource manager, the
method 200 further includes creating a new entity object corresponding to the new entity (act 204) and generating an event (act 206). For example, aresource manager object 106 a may be added to the resource manager repository and an event may be generated. The event may specify a workflow that should be executed. The workflow is configured to add synchronization rules 102 to an expected rules list 104 a particular to the new entity object. For example, a workflow may be configured to add thesynchronization rule 102 a to the expected rules list 104 a. Synchronization rules 102 on the expected rules list define how to transform objects 106 at theresource manager 110 into objects 108 at downstream resource systems 114. In particular, synchronization rules 102 may define how one or more entity objects 108 are created in a downstream resource system 114, how one or more entity objects 106 are created at theresource manager 110 and how data flows from a downstream resource system 114 to a resource manager object 106. Additionally, synchronization 102 rules may define within a single synchronization rule 102, one or more of an inbound, outbound, or bi-directional relationship between a downstream resource system 114 and theresource manager 110. - The
method 200 further illustrates that in response to the event, the workflow specified in the event is executed causing synchronization rules to be added to the expected rules list (act 208). As illustrated inFIG. 1 , thesynchronization rule 102 a is added to the expected rules list 104 a. Notably, adding synchronization rules to an expected rules list may be performed in a number of different fashions. For example, asynchronization rule 102 a may be stored in a rule repository at theresource manager 110. Thesynchronization rule 102 a may be added to the expected rules list 104 a by reference to a synchronization rule in the rule repository. Alternatively, a rule may be added to the expected rules list explicitly by direct definition in the expected rules list 104 a. In other words, an expected rules list 104 may serve as the repository for synchronization rules 102 in the expected rules list 104. - The
method 200 may further be practiced such that at a synchronization engine of the resource manager, a workflow is executed to synchronize the new entity object with corresponding objects in downstream resource systems managed by the resource manager so as to cause the creation of permissions for the new entity in the downstream resource systems by executing the synchronization rules in the expected rules list. For example, the synchronization engine may reference thesynchronization rule 102 a in the expected rules list 104 a. The synchronization engine may determine that theresource manager object 106 a should be synchronized with the downstream resource system object 108 a at thedownstream resource system 114 a. As will be described in more detail below, this may be accomplished by correlation of an existing downstream resource system object 108 with a resource manager object 106 or by creation of a new downstream resource system object 108 to correspond with the resource manager object 106. - For example, the
method 200 may be performed where causing the creation of permissions for the new entity in the downstream resource systems includes determining that an object corresponding to the new entity object does not exist in the downstream resource system; and creating an object in the downstream resource system corresponding to the new entity object at the resource manager. In the example illustrated inFIG. 1 , the downstream resource system object 108 a may not exist in thedownstream resource system 114 a when the synchronization engine executes a workflow to synchronize thesynchronization rule 102 a to synchronize theresource manager object 106 a with the downstream resource system object 108 a. Thus, embodiments may include creating the downstream resource system object 108 a in thedownstream resource system 114 a. This allows for further synchronization in granting of appropriate rights and permissions. - In one embodiment the
method 200 may be practiced where executing a workflow to synchronize the new entity object with corresponding objects in downstream resource systems managed by the resource manager includes executing synchronization rules according to precedence specified for the synchronization rules. The precedence specifies synchronization rules that should be executed before other synchronization rules. For example, the expected rules list 104 a may include a number of synchronizationrules including rules 102 a through 102 n. However, it may be desirable to perform the synchronization specified in some synchronization rules 102 before the synchronization specified in other rules. This may be done for example to ensure that permissions or restrictions specified in one rule are not overwritten by the later application of a different synchronization rule. - Referring now to
FIG. 3 , amethod 300 is illustrated. Themethod 300 illustrates the number of acts that may be performed in a computing environment including a resource manager. The resource manager includes programmatic code for managing resources in the computing environment. Themethod 300 includes acts for managing resources including managing permissions for entities to access the resources. The method includes receiving user input indicating that an entity represented by an entity object of the resource manager should have permissions removed at the resource manager (act 302). For example, a user interacting with a user interface connected to theresource manager 110 may indicate that an entity corresponding to aresource manager object 106 a should have permissions removed from downstream resource systems 114. For example, if the entity is an employee at an organization and the role of the entity is changed, it may be necessary to remove certain permissions from a certain downstream resource systems 114 such that the entity can no longer access, or perform certain access actions at resources at the downstream resource systems 114. Such may be indicated by an administrator interacting with theresource manager 110. - In response to receiving user input that an entity should have permissions removed at the resource manager, an event is generated (act 304). The event specifies a workflow that should be executed. The workflow is configured to cause synchronization rules in an expected rules list particular to the entity object to indicate that permissions should be removed for the entity in one or more downstream resource systems. For example, a
synchronization rule 102 a may be modified to indicate that permissions should be removed from a downstream resource system object 108 a. - The
method 300 may further include in response to the event, executing the workflow specified in the event (act 306) causing synchronization rules to indicate that permissions should be removed for the entity in one or more downstream resource systems. - The
method 300 may further include, at a synchronization engine of the resource manager, executing a workflow to synchronize the entity object with corresponding objects in downstream resource systems managed by the resource manager so as to cause the removal of permissions for the entity in the downstream resource systems. For example a workflow may be configured to reference thesynchronization rule 102 a and to synchronize aresource manager object 106 a with a downstream resource system object 108 a where such synchronization results in the removal of permissions for the downstream resource system object 108 a. - In one embodiment, the
method 300 may be practiced where causing synchronization rules in an expected rules list particular to the entity object to indicate that permissions should be removed for the entity in downstream resource systems includes adding new synchronization rules to the expected rules list. For example, a new synchronization rule 102 may be added to an expected rules list 104 indicating that permissions should be removed. - In one embodiment, the
method 300 may further include generating a detected rules list, where the detected rules list specifies existing permissions for the entity object for resources in an the computing environment. Generating a detected rules list includes examining objects in downstream resource systems and correlating the examined objects in downstream resource systems with resource manager objects managed by the resource manager. Executing the workflow specified in the event causing synchronization rules to be removed from the expected rules list (act 306) includes causing a workflow to be executed that causes existing permission from the detected rules list to be removed from the expected rules list. - For example, as has been discussed above and as will be discussed in more detail below the detected rules list 112 a may determine that a downstream resource system object 108 a includes certain permissions that are undesirable to be granted to an entity corresponding to the downstream resource system object 108 a. To remove these permissions, the synchronization rule 102 may be added to the expected rules list 104 a which specifically removes the permissions from the downstream resource system object 108 a.
- In an alternative embodiment, causing synchronization rules in an expected rules list particular to the entity object to indicate that permissions should be removed for the entity in downstream resource systems may include modifying existing synchronization rules in the expected rules list. For example, if the
synchronization rule 102 a is included on the expected rules list 104 a and grants certain permissions to the downstream resource system object 108 a, removal of the permissions may be accomplished by modifying thesynchronization rule 102 a. -
FIG. 4 illustrates yet another embodiment that may be practiced in a computing environment including a resource manager. The resource manager includes programmatic code for managing resources in the computing environment. The method of managing resources includes managing permissions for entities to access the resources. Themethod 400 includes receiving user input indicating that an entity represented by an entity object of the resource manager should have permissions added at the resource manager (act 402). For example, aresource manager object 106 a corresponding to an entity may exist in theresource manager 110. An administrator interacting with theresource manager 110 may provide user input indicating that additional permissions should be added in downstream resource systems 114 for theresource manager object 106 a. - The
method 400 further illustrates that in response to receiving user input that an entity should have permissions added at the resource manager, an event is generated (act 404). The event specifies a workflow that should be executed. The workflow is configured to cause synchronization rules in an expected rules list particular to the entity object to indicate that permissions should be added for the entity in one or more downstream resource systems. As illustrated in previous examples, asynchronization rule 102 a may be added to an expected rules list 104 a, or modified if theappropriate synchronization rule 102 a already exists in the expected rules list 104 a, to allow for an event to indicate that permissions should be added to a downstream resource system object 108 a. - The
method 400 further includes in response to the event, executing the workflow specified in the event causing synchronization rules to indicate that permissions should be added for the entity in one or more downstream resource systems (act 406). - The
method 400 may further include at a synchronization engine of the resource manager, executing a workflow to synchronize the entity object with corresponding objects in downstream resource systems managed by the resource manager so as to cause the creation of permissions for the new entity in the downstream resource systems by executing the synchronization rules in the expected rules list. For example, a workflow may be configured to reference thesynchronization rule 102 a in the expected rules list 104 a so as to synchronize and/or otherwise create permissions in the downstream resource system object 108 a. - As noted previously, several embodiments make use of a detected rules list where the detected rules list defines an actual state of permissions in downstream resource systems for an entity. Thus, some embodiments may be directed to generating the detected rules list and making appropriate use of the detected rules list. For example, the
method 500 may be practiced In a computing environment including a resource manager, the resource manager comprising programmatic code for managing resources in the computing environment, themethod 500 includes generating a detected rules list (act 502). The detected rules list specifies existing permissions for an entity for resources in a computing system. Generating a detected rules list includes examining objects in downstream resource systems and correlating the examined objects in downstream resource systems with resource manager objects managed by the resource manager. - The
method 500 further includes accessing an expected rules list (act 504). The expected rules list defines permissions that should exist for the entity for resources in the computing system. For example, an expected rules list may define how synchronization should be performed between a resource manager object 102 and a corresponding downstream resource system object 108. Permissions can be inferred or determined from the rules in the expected rules list 104. - The
method 500 further includes comparing the detected rules list to the expected rules list and determining that the detected rules list includes permissions not included in the expected rules list (act 506). For example, the detected rules list 104 a may be compared to the detected rules list 112 a. Based on the comparison, a determination may be made that the detected rules list 112 a includes permissions for an entity that are not included in the expected rules list 104 a. - An indication can be provided that the detected rules list includes permissions not included in the expected rules list (act 508).
- The
method 500 may further include receiving user input indicating the permissions included in the detected rules list and not included in the expected rules list should be removed. This embodiment further includes in response to the user input, removing the permissions included in the detected rules list and not included in the expected rules list by modifying the expected rules list and executing a workflow. The workflow is configured to cause the removal of permissions in downstream resource systems. In one embodiment, modifying the expected rules list includes including an entry in the expected rules list indicating removal of one or more permissions. - In one embodiment of the
method 500, correlating the examined objects in downstream resource systems with objects managed by the resource manager includes determining that an object does not exist in the resource manager that can be correlated with an object in the downstream resource system. An object is created in the resource manager to correlate with the object in the downstream resource system. - The
method 500 may be practiced where the expected rules list includes one or more synchronization rules. Each of the one or more synchronization rules may include a number of parameters. For example, each of the one or more synchronization rules may include an indicator used to identify the synchronization rule. Each of the one or more synchronization rules may include, a definition of flow type specifying that the synchronization rule can be used for at least one of importing data into a the resource manager from a downstream resource system or exporting data from the resources manager to a downstream resource system. Each of the one or more synchronization rules may include specification of an object type in the resource manager that the synchronization rule applies to. Each of the one or more synchronization rules may include specification of a downstream resource system. Each of the one or more synchronization rules may include specification of an object type in the downstream resource system to which the synchronization rule applies. Each of the one or more synchronization rules may include specification of relationship criteria including one or more conditions for linking objects in the resource manager and the downstream resource system. - Embodiments may be implemented where each of the one or more synchronization rules may optionally include specification of attribute flow information. Each of the one or more synchronization rules may optionally include a description of the synchronization rule. Each of the one or more synchronization rules may optionally include information defining a dependency on the existence of another synchronization rule. Each of the one or more synchronization rules may optionally include a filter used for identifying objects in the downstream resource system to which the synchronization rule will be applied. The filter may include conditions that must be satisfied to apply the synchronization rule.
- Each of the one or more synchronization rules may optionally include specification of relationship creation acts that can be used when the relationship criteria specified in the relationship criteria is not satisfied. For example, the relationship creation acts may include creation of an object in the resource manager if absent from the resource manager. Alternatively or additionally, relationship creation acts may include creation of an object in a downstream resource system if absent from the downstream resource system. Alternatively or additionally, relationship creation acts may include creation of an object hierarchy in a downstream resource system. Alternatively or additionally, relationship creation acts may include deletion of an object from a downstream resource system when a corresponding object is removed from the resource manager.
- Embodiments herein may comprise a special purpose or general-purpose computer including various computer hardware, as discussed in greater detail below.
- Embodiments may also include computer-readable media for carrying or having computer-executable instructions or data structures stored thereon. Such computer-readable media can be any available media that can be accessed by a general purpose or special purpose computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code means in the form of computer-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer. When information is transferred or provided over a network or another communications connection (either hardwired, wireless, or a combination of hardwired or wireless) to a computer, the computer properly views the connection as a computer-readable medium. Thus, any such connection is properly termed a computer-readable medium. Combinations of the above should also be included within the scope of computer-readable media.
- Computer-executable instructions comprise, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.
- The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/120,136 US20090222833A1 (en) | 2008-02-28 | 2008-05-13 | Codeless provisioning sync rules |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US3238908P | 2008-02-28 | 2008-02-28 | |
US12/120,136 US20090222833A1 (en) | 2008-02-28 | 2008-05-13 | Codeless provisioning sync rules |
Publications (1)
Publication Number | Publication Date |
---|---|
US20090222833A1 true US20090222833A1 (en) | 2009-09-03 |
Family
ID=41014214
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/120,136 Abandoned US20090222833A1 (en) | 2008-02-28 | 2008-05-13 | Codeless provisioning sync rules |
US12/120,138 Expired - Fee Related US8407331B2 (en) | 2008-02-28 | 2008-05-13 | Codeless provisioning |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/120,138 Expired - Fee Related US8407331B2 (en) | 2008-02-28 | 2008-05-13 | Codeless provisioning |
Country Status (5)
Country | Link |
---|---|
US (2) | US20090222833A1 (en) |
EP (1) | EP2266025A4 (en) |
JP (1) | JP5426578B2 (en) |
CN (1) | CN101960420B (en) |
WO (1) | WO2009108452A2 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9483308B2 (en) | 2012-06-29 | 2016-11-01 | Intel Corporation | Performance of predicted actions |
US9367597B2 (en) * | 2013-11-18 | 2016-06-14 | International Business Machines Corporation | Automatically managing mapping and transform rules when synchronizing systems |
US10402744B2 (en) | 2013-11-18 | 2019-09-03 | International Busniess Machines Corporation | Automatically self-learning bidirectional synchronization of a source system and a target system |
US9542467B2 (en) * | 2013-11-18 | 2017-01-10 | International Business Machines Corporation | Efficiently firing mapping and transform rules during bidirectional synchronization |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020138763A1 (en) * | 2000-12-22 | 2002-09-26 | Delany Shawn P. | Runtime modification of entries in an identity system |
US20030232616A1 (en) * | 2001-02-23 | 2003-12-18 | Mobilitec, Inc. | Rule-based system and method for managing the provisioning of user applicatins on limited-resource and/or wireless devices |
US20030236820A1 (en) * | 2001-10-24 | 2003-12-25 | Groove Networks, Inc. | Method and apparatus for managing a peer-to-peer collaboration system |
US20040225674A1 (en) * | 2003-05-08 | 2004-11-11 | Microsoft Corporation | Rules customization and related methods |
US20040260748A1 (en) * | 2003-06-19 | 2004-12-23 | Springer James Alan | Method, system, and program for remote resource management |
US20050071687A1 (en) * | 2003-09-30 | 2005-03-31 | Novell, Inc. | Techniques for securing electronic identities |
US20060005198A1 (en) * | 2000-07-28 | 2006-01-05 | Michihiro Uchishiba | Method for automatically imparting reserve resource to logical partition and logical partitioned computer system |
US20060015539A1 (en) * | 2004-07-16 | 2006-01-19 | Wolf Werner G | Synchronizing agent for multiple clients/applications on a computer system |
US7124203B2 (en) * | 2000-07-10 | 2006-10-17 | Oracle International Corporation | Selective cache flushing in identity and access management systems |
US20060271600A1 (en) * | 2005-05-12 | 2006-11-30 | Goh Sweefen | Adaptive and dynamic data synchronization system for managing data and inventory |
US7181472B2 (en) * | 2003-10-23 | 2007-02-20 | Microsoft Corporation | Method and system for synchronizing identity information |
US20070100834A1 (en) * | 2004-09-15 | 2007-05-03 | John Landry | System and method for managing data in a distributed computer system |
US7216163B2 (en) * | 2002-05-15 | 2007-05-08 | Oracle International Corporation | Method and apparatus for provisioning tasks using a provisioning bridge server |
US20070180075A1 (en) * | 2002-04-25 | 2007-08-02 | Doug Chasman | System and method for synchronization of version annotated objects |
US20070244932A1 (en) * | 2006-04-13 | 2007-10-18 | Ahn Chang-Won | Method for providing personalized information lifecycle management service using policy-based autonomic data management |
US7302446B1 (en) * | 1996-11-13 | 2007-11-27 | Intellisync Corporation | Synchronizing databases |
US7822707B1 (en) * | 2007-09-28 | 2010-10-26 | Emc Corporation | Object searching and management information viewing in a storage area network environment |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5892900A (en) * | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
JPH11120103A (en) * | 1997-10-20 | 1999-04-30 | Fujitsu Ltd | Network management system by management object |
JP3576008B2 (en) * | 1998-10-09 | 2004-10-13 | 株式会社東芝 | Access control setting system and storage medium |
US7383320B1 (en) * | 1999-11-05 | 2008-06-03 | Idom Technologies, Incorporated | Method and apparatus for automatically updating website content |
US7058947B1 (en) * | 2000-05-02 | 2006-06-06 | Microsoft Corporation | Resource manager architecture utilizing a policy manager |
JP2005038124A (en) * | 2003-07-18 | 2005-02-10 | Hitachi Information Systems Ltd | File access control method and control system |
US8099509B2 (en) * | 2005-02-04 | 2012-01-17 | Nec Corporation | Access control unit |
US8554916B2 (en) | 2005-04-11 | 2013-10-08 | Accenture Global Services Gmbh | Service delivery platform and development of new client business models |
US20070067403A1 (en) * | 2005-07-20 | 2007-03-22 | Grant Holmes | Data Delivery System |
CN101101653A (en) | 2006-06-06 | 2008-01-09 | 美国西门子医疗解决公司 | Dynamic workflow scheduling |
-
2008
- 2008-05-13 US US12/120,136 patent/US20090222833A1/en not_active Abandoned
- 2008-05-13 US US12/120,138 patent/US8407331B2/en not_active Expired - Fee Related
-
2009
- 2009-01-30 JP JP2010548776A patent/JP5426578B2/en not_active Expired - Fee Related
- 2009-01-30 CN CN200980107151.4A patent/CN101960420B/en not_active Expired - Fee Related
- 2009-01-30 WO PCT/US2009/032602 patent/WO2009108452A2/en active Application Filing
- 2009-01-30 EP EP09715737A patent/EP2266025A4/en not_active Withdrawn
Patent Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7302446B1 (en) * | 1996-11-13 | 2007-11-27 | Intellisync Corporation | Synchronizing databases |
US7124203B2 (en) * | 2000-07-10 | 2006-10-17 | Oracle International Corporation | Selective cache flushing in identity and access management systems |
US20060005198A1 (en) * | 2000-07-28 | 2006-01-05 | Michihiro Uchishiba | Method for automatically imparting reserve resource to logical partition and logical partitioned computer system |
US20020138763A1 (en) * | 2000-12-22 | 2002-09-26 | Delany Shawn P. | Runtime modification of entries in an identity system |
US20030232616A1 (en) * | 2001-02-23 | 2003-12-18 | Mobilitec, Inc. | Rule-based system and method for managing the provisioning of user applicatins on limited-resource and/or wireless devices |
US20030236820A1 (en) * | 2001-10-24 | 2003-12-25 | Groove Networks, Inc. | Method and apparatus for managing a peer-to-peer collaboration system |
US20070180075A1 (en) * | 2002-04-25 | 2007-08-02 | Doug Chasman | System and method for synchronization of version annotated objects |
US7216163B2 (en) * | 2002-05-15 | 2007-05-08 | Oracle International Corporation | Method and apparatus for provisioning tasks using a provisioning bridge server |
US7240073B2 (en) * | 2003-05-08 | 2007-07-03 | Microsoft Corporation | Rules customization and related methods |
US20040225674A1 (en) * | 2003-05-08 | 2004-11-11 | Microsoft Corporation | Rules customization and related methods |
US20040260748A1 (en) * | 2003-06-19 | 2004-12-23 | Springer James Alan | Method, system, and program for remote resource management |
US20050071687A1 (en) * | 2003-09-30 | 2005-03-31 | Novell, Inc. | Techniques for securing electronic identities |
US7181472B2 (en) * | 2003-10-23 | 2007-02-20 | Microsoft Corporation | Method and system for synchronizing identity information |
US20060015539A1 (en) * | 2004-07-16 | 2006-01-19 | Wolf Werner G | Synchronizing agent for multiple clients/applications on a computer system |
US20070100834A1 (en) * | 2004-09-15 | 2007-05-03 | John Landry | System and method for managing data in a distributed computer system |
US20060271600A1 (en) * | 2005-05-12 | 2006-11-30 | Goh Sweefen | Adaptive and dynamic data synchronization system for managing data and inventory |
US20070244932A1 (en) * | 2006-04-13 | 2007-10-18 | Ahn Chang-Won | Method for providing personalized information lifecycle management service using policy-based autonomic data management |
US7822707B1 (en) * | 2007-09-28 | 2010-10-26 | Emc Corporation | Object searching and management information viewing in a storage area network environment |
Also Published As
Publication number | Publication date |
---|---|
EP2266025A4 (en) | 2011-08-17 |
JP2011513842A (en) | 2011-04-28 |
WO2009108452A3 (en) | 2009-10-22 |
JP5426578B2 (en) | 2014-02-26 |
CN101960420A (en) | 2011-01-26 |
CN101960420B (en) | 2014-02-05 |
US20090222834A1 (en) | 2009-09-03 |
WO2009108452A2 (en) | 2009-09-03 |
EP2266025A2 (en) | 2010-12-29 |
US8407331B2 (en) | 2013-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9047132B2 (en) | Automatic management of configuration parameters and parameter management engine | |
JP4599364B2 (en) | Automated workflow service system | |
US9420006B2 (en) | Method and system for managing security policies | |
US9773216B2 (en) | Workflow sharing | |
US7505995B2 (en) | Object-relational model based user interfaces | |
US8196187B2 (en) | Resource state transition based access control system | |
US6820118B1 (en) | Method and system for providing a linkage between systems management systems and applications | |
US9589240B2 (en) | System and method for flexible chaining of distinct workflow task instances in a business process execution language workflow | |
US20140172918A1 (en) | Role Based Access Management for Business Object Data Structures | |
EP2487582A1 (en) | Systems and/or methods for identifying and resolving complex model merge conflicts based on atomic merge conflicts | |
US20150066572A1 (en) | Identity and access management | |
US9542656B2 (en) | Supporting ETL processing in BPEL-based processes | |
US8407331B2 (en) | Codeless provisioning | |
EP1936494A1 (en) | Method for runtime execution of one or more tasks defined in a workflow process language | |
US20130304716A1 (en) | Allowing updates to database objects | |
US8521698B2 (en) | Method for safeguarding the integrity of a relational database in case of structural transaction execution | |
El Bakkali | Enhancing Workflow Systems Resiliency by Using Delegation and Priority Concepts. | |
JP2011513842A5 (en) | ||
Schneider | SAP Business ByDesign Studio: Application Development | |
Alissa et al. | BP-XACML an authorisation policy language for business processes | |
US20150019451A1 (en) | Decision basis for benefits program | |
Dursun | A generic policy-conflict handling model | |
Buyens et al. | Identifying and resolving least privilege violations in software architectures | |
Perrin et al. | A contract model to deploy and control cooperative processes | |
Kohler et al. | ProActive Caching: Generating caching heuristics for business process environments |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MICROSOFT CORPORATION, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GILL, JASJEET;GANJEH, NIMA;KJELLMAN, BJORN GUSTAF ANDREAS;AND OTHERS;REEL/FRAME:020945/0588 Effective date: 20080513 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE |
|
AS | Assignment |
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034766/0509 Effective date: 20141014 |