Roles and policies are used to provide display and access to data in a flexible manner. Users and/or web applications can be mapped to user roles that dictate which displays or other application resources are available to the user or application. Roles are assigned to web applications individually, allowing for user roles to be used without requiring an independent mapping of users to roles. In some cases, application roles can be centrally managed, so that presentation systems also avoid the need for an independent mapping of user or application roles.
Don L. Hayler - Palo Alto CA, US Daniel Vu - Lafayette CA, US
Assignee:
Oracle International Corporation - Redwood City CA
International Classification:
G06F 15/16 G06F 9/00 G06F 17/00 G06F 3/00
US Classification:
726 12, 715741
Abstract:
Roles and policies are used to provide display and access to data in a flexible manner. Users and/or web applications can be mapped to user roles that dictate which displays or other application resources are available to the user or application. Roles are assigned to web applications individually, allowing for user roles to be used without requiring an independent mapping of users to roles. In some cases, application roles can be centrally managed, so that presentation systems also avoid the need for an independent mapping of user or application roles.
Don L. Hayler - Palo Alto CA, US Daniel Vu - Lafayette CA, US
Assignee:
BEA SYSTEMS, INC. - San Jose CA
International Classification:
G06F 12/14
US Classification:
713193
Abstract:
A number of secondary passwords can be encrypted with a primary password and stored in a credential vault. An encrypted secondary password from the credential vault can be decrypted using the primary password and provided the secondary password to an application. Encrypted secondary passwords can be updated when the primary password changes.
Don L. Hayler - Palo Alto CA, US Daniel Vu - Lafayette CA, US
Assignee:
BEA SYSTEMS, INC. - San Jose CA
International Classification:
G06F 17/00
US Classification:
726 12
Abstract:
Application role mappings can be maintained at a reverse proxy server. When a request for a web application is received at the reverse proxy servers, the proper user role for the web application can be determined at the reverse proxy server. The proper user role can be sent as part of a HTTP header to the web application. The web application can use the user role without doing an independent mapping of the user to a role.