发明名称 CONTROL AND VERIFICATION OF PERMISSIONS
摘要 A verification method includes configuring a reference system, running on a computer, to have the same set of executables and customizations as an e-business system to be verified. The reference system is configured with one or more roles that have permissions to execute all transactions in a scope of a planned verification. One or more business processes that are implemented in the e-business system and are in the scope of the planned verification are mapped and are executed using the reference system. Logs of permission checks conducted in the business processes are saved in a repository. Reference data is created by merging records from the logs of the permission checks with respect to at least one role in the scope of the verification. Permission settings for the at least one role in the e-business system are compared with corresponding permission values in the reference data for the at least one role. Based on comparing the permission settings, an indication is displayed to a user of whether the permission settings match the corresponding permission values.
申请公布号 US2016036824(A1) 申请公布日期 2016.02.04
申请号 US201514882491 申请日期 2015.10.14
申请人 Levit Grigory 发明人 Levit Grigory
分类号 H04L29/06 主分类号 H04L29/06
代理机构 代理人
主权项 1. A verification method, comprising: configuring a reference system, running on a computer, to have a same set of executables and customizations as an e-business system to be verified; mapping one or more business processes that are implemented in the e-business system and are in the scope of the planned verification; executing the one or more business processes, using the reference system, and saving in a repository logs of permission checks conducted in executing the business processes; creating a merged permission log by merging records from the saved logs of the permission checks with respect to at least one role; comparing permission settings for the at least one role in the e-business system with corresponding permission values in the merged permission log for the at least one role; and based on the comparing of the permission settings, displaying to a user an indication of whether the permission settings in the e-business system match the corresponding permission values in the merged permission log.
地址 Petah Tikva IL