Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Utilizing component targets in defining roles in a distributed and integrated system or systems

A definition and role technology, applied in the field of distributed computer systems, can solve problems such as restricting the use of the system

Inactive Publication Date: 2009-01-07
INT BUSINESS MASCH CORP
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This requires extensive administrative tasks to remove identities from desired components by customers, and in some cases limits usage of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Utilizing component targets in defining roles in a distributed and integrated system or systems
  • Utilizing component targets in defining roles in a distributed and integrated system or systems
  • Utilizing component targets in defining roles in a distributed and integrated system or systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] figure 1 A general cluster system environment is shown. The environment includes a central management server 100, preferably an IBM Cluster Management Server (CMS), and a set of nodes 101, 102, 103 in the cluster, preferably IBM's P-Series servers. These nodes are usually the target of administrative tasks. figure 1 Also shown are network switches, cabling and protocol stacks, designated 110, which are used by the various nodes and the CMS to communicate, and persistent storage 130, which is typically multiple disks similar to an IBM 2107 storage system driver.

[0017] refer to figure 2 , at 210, 211 denote users or identities, which may for example be UNIX users with a UID structure as defined by the UNIX Open Group Standard. An authentication mechanism similar to MIT Kerberos is shown at 220, and a set of roles are shown at 231, 232, which are defined in the cluster as having the capability to perform one to N tasks. figure 2 The remote execution mechanism for...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed are methods of and systems for creating roles on a centralized management server that include one to many authorizations for a given identity as well as the component targets they will be authorized for. The authorizations are defined based on the intersection of the task and the component for which it will act on. This combined authorization is then associated with specific identities. When a task is to be initiated, the central management server determines if the identity has been authorized for that task and for which components it can execute that task against. The infrastructure then generates the appropriate sub commands and only executes those sub commands against the authorized components contained in the list of requested components from the initiation request.

Description

technical field [0001] The present invention relates generally to distributed computer systems, and more particularly, the present invention relates to methods and systems for defining roles in such systems. Background technique [0002] In a distributed or integrated computer system in a server federation environment, such as a computer cluster or BladeCenter or a BladeCenter within a large computer cluster, separation of functions is required due to various industry practices and regulatory requirements. This separation of functions is often compromised when building a central management server or module. In current practice, the industry typically defines roles or identities across the cluster for various authenticated users. Cluster management operations via the central management server provide access across all components in the entire cluster and enable the execution of cluster-wide authorized tasks. [0003] The cluster is considered a safe domain for most tasks. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/46G06F21/31G06F21/12G06F21/62
CPCH04L63/105G06F21/6218G06F21/604H04L63/20
Inventor M·布朗
Owner INT BUSINESS MASCH CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products