Data driven role based security

ABSTRACT

Data driven role based security is provided. At login, the system queries for a data context in connection with access to computing objects of a computing system. When a request for access to computing objects is received by the computing system, one or more control expressions specified for the computing object being accessed are evaluated. The evaluation of the control expressions may reference the user context or the data context previously established, and returns a set of effective permissions. Access to the computing object is then granted if the set of permissions includes an appropriate permission for the request for access.

TECHNICAL FIELD

The subject disclosure relates to role based access control based ondata context and evaluation of control expressions relative to the datacontext.

BACKGROUND

By way of background concerning some conventional systems, access todata resources and/or operations of a protected system via an accesscontrol system has traditionally been achieved by assigning one or moreaccess privileges to one or more users of the protected system. In thisregard, conventional role based access control (RBAC) techniques enablea user to access protected system resources based on a role assigned tothe user. As such, the user is permitted to access and/or performoperations on the protected system based on one or more accessprivileges assigned to the role. For example, protected systemoperations (in this case a storage system being the protected system)such as “create storage volume” and “delete storage volume” can beassigned to an “administrator” role. When the user is assigned theadministrator role, the user can create and/or delete any storage volumeincluded in the storage system.

RBAC is thus an approach to restricting system, or system resource,access to authorized users based roles and permissions defined for theroles. Within an organization, roles are created for various jobfunctions, such as manager or administrator. The permissions to performcertain operations are assigned to specific roles. Members of staff orother system users are assigned particular roles, and through those roleassignments, those user(s) acquire the permissions to perform particularsystem functions. Since users are not assigned permissions directly, butthrough their role (or roles), management of individual user rightsbecomes a matter of assigning appropriate users to appropriate roles.Typically, a role is represented as an identifier (role name or ID) anda list of role member IDs, e.g., users or groups stored as securityidentifiers (SIDs) in Windows-based systems or user entity names inUnix-based systems.

To supplement the role assignments, in a conventional access controllist (ACL) model, objects or resources can be assigned a set of role IDsthat describe the effective set of users for which access to the objectsor resources can be granted. Typically, in operation, based on the usercontext of a user making a request for an operation or a resource, i.e.,based on what roles the user is allowed to assume, and based on whatpermission set those roles resolve according to the access control list(ACL) enforced over a given object or resource being accessed, thesystem makes a determination of whether the action being taken by thegiven user is permitted. In this regard, both the set of roles that auser can assume and the set of permissions defined over an object forgiven roles are purely declarative and therefore statically defined.While this is generally sufficient for a system or a hierarchy ofresources of a known extent and scale, when the number of users andtypes of roles and relationships between them become non-trivial, orchange frequently, statically defining the access permissions and userroles and keeping them up to date and consistent with changing resourcesand resource hierarchies can present a burdensome security configurationmanagement challenge.

In this regard, traditional access control administration models arebased on objects whereby access control is specified at the object orobject container (for example, in an ACL), and typically anadministrator or other authorized entity specifies permissions grantedto the object. Administrators thus translate the organizationalauthorization policy into permissions on objects: Each object has a listof access permissions that is granted to roles representing varioususers and groups within an organization. Compared to the situation ofhaving to define custom code for controlling permissions for a givendata system, RBAC simplifies access control administration and increasesmanageability in enterprise environments by allowing permissions to bemanaged in terms of user job functions.

Some of the goals of role-based access control can be accomplished usinggroups. A group corresponds to an employee role, and applicationadministrators can specify the permissions that are needed by the roleby granting the group permission in an ACL for the object. As objectcollections grow, however, the number of places where administratorsmanage permissions grows. Diligent use of resource groups and usergroups can help minimize this effort, but this requires consistentpractice and coordination among administrators and precise definitionsof resource groups. These processes slow down the administrativeprocess, so administrators often avoid use of groups.

Additionally, querying the granted access to a particular group or roleacross an application becomes more difficult as the number of objectsgrows. For example, to accurately determine what permissions are grantedto a user or group, administrators generally examine the permissions onevery object. Since there are too many objects to query, the state ofaccess control with respect to a particular group or user can bedifficult to verify. Moreover, where more than non-trivial changes occurto an organization's resource hierarchy, such as, for example, when ahuman resources information management system records employee transferto a different department, updates may be required to both the affecteduser objects and to any applicable ACLs, and failure to do so, canresult in incorrect access permissions or an undefined state of thesystem. Specifically, these difficulties are due to permissions beingexplicitly assigned in the ACL without regard to extended properties ofthe protected resource.

The above-described deficiencies of today's role based security systemsare merely intended to provide an overview of some of the problems ofconventional systems, and are not intended to be exhaustive. Otherproblems with the state of the art and corresponding benefits of some ofthe various non-limiting embodiments may become further apparent uponreview of the following detailed description.

SUMMARY

A simplified summary is provided herein to help enable a basic orgeneral understanding of various aspects of exemplary, non-limitingembodiments that follow in the more detailed description and theaccompanying drawings. This summary is not intended, however, as anextensive or exhaustive overview. Instead, the sole purpose of thissummary is to present some concepts related to some exemplarynon-limiting embodiments in a simplified form as a prelude to the moredetailed description of the various embodiments that follow.

In various embodiments, data driven role based security is provided. Inone embodiment, at login, the system employs the user context of theconnecting user to query for a data context in connection with access tocomputing objects of a computing system. Then, when a request for accessto computing objects is received by the computing system, one or morecontrol expressions specified for the computing object being accessedare evaluated. The evaluation of the control expressions may referencethe user context or the data context previously established, and basedon the data context to form a set of effective permissions. Access tothe computing object is then granted if the set of permissions includesan appropriate permission for the request for access.

In another embodiment, a computer-implemented system includes a logincomponent configured to query for a data context for access requests todata objects of a computing system in response to a user login, wherethe data context is retrieved based on the data objects being accessed.The system also includes an access control component configured todynamically evaluate, in response to a request for access to a dataobject, control expression(s) of an access control object that determinethe set of effective permissions, which further determine whether theaccess is granted. In another embodiment, a method includes receivingfirst input via a user interface of a computing device regarding anapplication function of an application for which role based securitycontrol is to be applied for users of the application function. Themethod further includes receiving second input via the user interfaceregarding at least one data field of a data set applicable to carryingout the application function and receiving third input via the userinterface regarding data instances to be extracted from the data set toestablish a data context applicable to a given user at a time of loginin connection with potential use of the application function. Further,the method includes receiving fourth input via the user interface, basedat least in part on the first, second and third inputs, defining atleast one control expression for a role based access control object fordynamic evaluation in connection with the potential use of theapplication function.

Other embodiments and various non-limiting examples, scenarios andimplementations are described in more detail below.

BRIEF DESCRIPTION OF THE DRAWINGS

Various non-limiting embodiments are further described with reference tothe accompanying drawings in which:

FIG. 1 is a block diagram of an illustrative example of a role basedsecurity system employing a tree to represent data objects andattributes;

FIG. 2 is a block diagram of an illustrative example of an accesscontrol object that can be employed in connection with securing the dataobjects of FIG. 1;

FIG. 3 is a block diagram of the illustrative example of FIG. 1 in whichan employee is re-organized to a different part of the organization andcorresponding consequences;

FIG. 4 is a block diagram of changes that are made to the access controlobject of FIG. 2 based on the re-organization of the employeeillustrated in FIG. 3;

FIG. 5 is a system diagram illustrating a non-limiting embodiment ofdata driven role based security;

FIG. 6 is a block diagram showing the retrieval of a data context uponuser login in accordance with an aspect of data driven role basedsecurity;

FIG. 7 is a block diagram illustrating an example evaluation of acontrol expression in an access control object in accordance with anembodiment of data driven role based security;

FIG. 8 is a block diagram illustrating the grant (or denial) of accessbased on the set of permissions of an access control object derived froman evaluation of a control expression of the access control object;

FIG. 9 is a block diagram of an exemplary, non-limiting user interfacefor defining control expressions for use in connection with accesscontrol objects to achieve data driven role based security;

FIG. 10 is a flow diagram of an exemplary, non-limiting process for datadriven role based security in accordance with an embodiment;

FIG. 11 is a flow diagram of another exemplary, non-limiting process fordata driven role based security in accordance with an embodiment;

FIG. 12 is a block diagram representing exemplary non-limiting networkedenvironments in which various embodiments described herein can beimplemented; and

FIG. 13 is a block diagram representing an exemplary non-limitingcomputing system or operating environment in which one or more aspectsof various embodiments described herein can be implemented.

DETAILED DESCRIPTION Overview

As discussed in the background, role-based access control allowsadministrators to specify access control in terms of the organizationalstructure of a company by creating objects called roles. Users areassigned to roles to perform associated job functions. Roles define theauthorization permissions on set(s) of resources. In the RBAC model, theadministrator uses the role to manage permissions and assignments. Forexample, a company may create a role called Sales Manager that has thepermissions that a sales manager needs for their job. When salesmanagers are hired, they are assigned the Sales Manager role andinstantly have the permissions for that job as a result. When they leavethe position of sales manager, they are removed from the Sales Managerrole and no longer have Sales Manager access. Since the role allowsaccess to be granted in terms of a company's organizational model, RBACis an intuitive way for administrators to specify access control.

In brief, RBAC maps user roles to application permissions so that accesscontrol administration can be accomplished in terms of a user's roles.The RBAC system then translates a user's role membership to applicationpermissions. Since the permissions are granted via the role, permissionscan be queried and changed via the role without examining the specificresources.

However, as alluded to in the background, the reality of complexorganizations is that data dependencies develop among roles such that arole for a user that applies at one time, which might result in grant ofpermission for editing a given resource at that time, will, at adifferent time, result in denial of access for editing that givenresource. For instance, for a human resources application that tracksemployee information, each employee in turn has a manager, who in turnhas a manager, who in turn has a manager—and so on—with the sequenceterminating with the top level employee, e.g., the founder of thecompany. Thus, while the term “manager” as a role has meaning, and alongwith that manager role come certain permissions, such permissions arewith respect to those who are managed by that manager, but not withrespect to all employees.

Thus, when an individual changes sub-organizations within a company,more changes in terms of permissions structure than that individual'spermissions. In particular, permissions structure changes for thatindividual's manager, and depending on where the people previouslymanaged by that individual end up in the organizational structure as aresult of that individual's shift to the difference sub-organization,their permissions and roles may have changed as well. These changesshould thus also be propagated to the ACLs that govern access to thevarious appropriate resources for people of the organization to ensurethat individual no longer has access to certain former resources towhich that individual had access, and to ensure that individual hasaccess to certain new resources appropriate for the new position in thehierarchy. If these changes are not made, incorrect permissions willresult, or worse, the system may enter into an undefined state, fromwhich it may be difficult to recover.

Further details of these and other various exemplary, non-limitingembodiments and scenarios are provided below.

Data Driven Role Based Access

As mentioned, in the context of role based permissions, complexhierarchies for the underlying data can introduce a significant burdenwhere there is significant reorganization of the hierarchy, and datadependencies that are affected as a result of such reorganization. Moregenerally, for any application for which security depends not only onwho the individual is that is requesting permission, but also on otherunderlying data that may change frequently, the updates in individualinformation and associated ACLs can be a significant burden onadministrators of the system to ensure the correct permission structureis enforced over the application.

As an illustrative example, FIG. 1 shows a human resources applicationthat tracks a company's worldwide employees and employee attributes, asrepresented by a tree structure 100. While FIG. 1 is illustrated with arelatively small number of employees, it can be appreciated that some ofthe world's largest companies have tens or hundreds of thousands ofemployees, and thus, the example is for simplicity of conceptualillustration, but not intended to undermine the complexity or burdenintroduced by the problems that can result in administration of largenumbers of data objects having inter object dependencies. As depicted,top level employee has user (e.g., username or ID) 102, followed byusers 104, 106 and 108 that report to user 102. Users 104 and 108 inturn have their reporting employees (not shown), and user 106 has users110, 112 and 114 reporting to user 106. In this regard, the user objectspossess certain attributes 120 that may be applicable to the givenapplication, here, a human resource application as an example. Forinstance, attributes 120 may include address information 122 (e.g., homeaddress), title information 124 (e.g., product unit manager), contactinformation 126 (e.g., phone number or email address) or salary/levelinformation 128.

In this regard, some of these attributes 120 may be editable by user 114directly, such as home address information 122. Some of them may not beeditable, however, such as title information 124. Some information maybe public to all or a subset of all, such as contact information 126.Other information may be private to all but a select few individuals,such as salary/level information 128. For instance, it may be the casethat only a manager of user 114, namely user 106 or user 102, can changethe title information 124 associated with user 114.

On the ACL side, to implement these kinds of permissions, e.g., who canview and who cannot view, who can authorize changes or make changes andwho cannot, etc., the ACL associated with user 114 will specify whatroles can edit the title, change the salary, etc. However, the problemwith roles in such a large organization is that the role “manager” has adifferent meaning for different employees since most employees have adifferent manager. And thus, specific managers will be specified in theACL for a given user object, such as user 114, namely users 106 and 102in FIG. 1, whereas user 108 even though above user 114 will not be ableto change user 114's title information 124 since user 108 is not user114's manager.

To illustrate, FIG. 2 illustrates an object associated with user 114,i.e., the data that represents user 114 and the attributes 120. In thisregard, to implement security with an ACL, ACL 130 includes a list ofroles and permissions for those roles. As mentioned, since the managerrole 140 by itself is not enough information to determine if a givenuser has permission to change the title information associated with user114, the manager IDs that do have permission are enumerated in the ACL130, e.g., user 102 (e.g., managerID1 142) and user 106 (e.g.,managerID2 144) are both identified as having permission to edit thetitle or perform other actions on user 114 since they are veritablemanagers of user 114. Any manager not listed in the ACL 130 for user 114will not be able to act in the capacity of manager with respect to user114.

As mentioned, an issue presents itself when user 114 (or any user)switches to a difference part of the tree structure 100, e.g., isre-organized from one sub-group of the company to another sub-group,such as from one product group to another. The move of the employee fromone part of the tree structure 100 to another part by itself isrelatively straightforward. In such case, once the move is authorizedand as illustrated in FIG. 3, an administrator re-positions the user 114from one part of the tree structure 100 to another. However, this movein the tree structure 100 does not change the security settingsassociated with the object representing user 114. As illustrated in FIG.4, such a re-organization will also be accompanied by a manual change ofACL(s) associated with user 114. For instance, the managerIDs associatedwith the manager role 140 defining which managers are capable ofcarrying out a manager role with respect to user 114, are to change ifan updated permission set is desirable. Specifically, user 106 is nolonger user 114's manager and thus user 106 will be deleted from ACL 130and managerID3 146 representing user 104 is added to the list ofmanagerIDs defining who can act in the manager role with respect to suchindividual.

If this type of event happened once in awhile, or if the tree isrelatively small, the administrative overhead stays relatively low.However, if the tree is large or if movement occurs frequently, or ifthe set of permissions that can be granted over an object via an ACL islarge and complex, the administrative burden can be overwhelming. Inaddition, if an administrator fails to update the ACLs properly, ormakes a mistake in doing so, the security system can be prone to errorin granting permission, or reach an unstable state where otherdependencies are broken, or become circular.

Accordingly, in various non-limiting embodiments, a role based system isprovided that is data driven. Specifically, control expressions can beprovided instead of, or in addition to, explicit IDs in the ACLs, whichare evaluated based on a current data context for the user, therebygreatly simplifying the design of complex security requirements where asingle role cannot be generalized for all members assuming functions ofthat role. While in the past, systems have used customized applicationcode to handle evaluation of complex security expressions, such systemstake time to design and, if security requirements change frequently,then updating the custom application code each time implicatessignificant development and maintenance costs. If such customapplication code contains logical or programming errors, security caninadvertently be compromised, or system down time may be incurred. Thus,the ability to drive security access decisions as a function ofunderlying data in a programmatic way apart from the application itselfis beneficial.

Thus, in various embodiments, a data driven mechanism for role-basedsecurity is provided enabling role-based access control using dataitself as input for access control decisions. In certain suitableapplications, concepts that are context-dependent and that ordinarilycannot be mapped to a list of users in a context-free manner can berepresented as security roles. Some non-limiting benefits over existingmethods are reduced overhead surrounding permissions management and moredirect expression of access control intent.

As mentioned, conventional methods of access control are reliant on aset of static permission grants, maintained separate from the data set,authorizing a set of users, groups or roles to access certain dataelements. While generalizable, in cases where the structure of protecteddata set is descriptive enough to inform access control, e.g., Managercan modify Employee.Salary, the user is Manager ifUser.ID=Employee.ManagerID, it is useful to be able to express accesscontrol intent in formulaic fashion. By contrast, conventional rolebased security processes enforce that each individual manager in theorganization be granted the permission to modify salaries of theirdirect reports.

Using a data driven mechanism in accordance with various embodimentsdescribed herein therefore provides a way to express access controlpolicy with respect to the structures defined in the protected data set.Then, a one-time, expression-like security role definition, such as thedefinition of Manager above, can be employed for access control withoutever designating a specific set of user identities as members of ManagerRole. Additional detail and examples are discussed below in connectionwith the implementation of data-dependent roles, data-dependent rolemembership determination and data-dependent permission evaluation.

In one embodiment, the data driven mechanism for data security comprisestwo parts. A first part is a new kind of security role within thegeneral framework of role-based access control, which can be referred toas a derived role (DROL) since a DROL serves to express roles that arepopulated not by explicit enumeration of user IDs, but rather defined bysome aspect of data context in which they occur. A second part is amodification to the access control procedure, which can be referred toas data-dependent role access control (DRAC). DRAC applies when the userattempting to access a data element has a permission grant on that dataelement resolving through a DROL. A mechanism including these two partscan be implemented standalone or as an augmentation to an ordinaryrole-based access control system.

As mentioned, a conventional security role is identified by a nameand/or ID and has a list of members. For DROLs on the other hand,membership is dynamically determined, e.g., as follows. DROLs have threeapplication-defined parameters, Associated Entity, Member Query, andControl Expression. In one embodiment, when a user is authenticated andhas role memberships determined, first, useful aspects of the userauthentication token are captured, e.g. textual user name and binarySID, and any available application-level identifying information. Next,a member query is executed against an associated entity furnishing theelements from the previous step as query variables. Next, if the queryhas returned an entity, role membership is affirmed and the returnedentity is saved in the user context as role context for subsequent usein the DRAC procedure.

The DRAC procedure is used to evaluate whether a permission grantresolving through a DROL is to be honored at runtime. The data element,or control context, is evaluated against role context according tocontrol expression(s) specified in the DROL. In one embodiment, controlcontext and role context are treated as object-type variables for thepurposes of such evaluation. Permission grant is then honored if thecontrol expression evaluates to True. If not, the permission grant isignored.

FIG. 5 is a system block diagram illustrating a non-limiting embodimentof data driven role based security including control expressions in ACLs508 for dynamic evaluation. In this regard, a user 500 logs in at 510 toan application 504 of a system 502. It can be appreciated that the DRACtechniques described herein can be implemented at a system level as wellas an application level. For conceptual illustration, the descriptionherein applies to an example of employee-based data, but similartechniques can be applied to objects of a file system, or anywhere it isdesirable to restrict access to objects based on dynamic roles. Atlogin, a login component 550 retrieves a data context 520 applicable tothe use of application 504 by user 500. For instance, the logincomponent can query for the data context in response to receiving alogin based on user credentials identifying the user. Accordingly, whenuser 500 makes a request for data 506, access control component 560dynamically evaluates control expressions of ACLs 508 relative to thedata context 520 to determine if permission can be granted at 540 forthe given user request. For instance, access control component 560 candynamically evaluate a programmatic expression against current versionsof the data objects.

FIG. 6 is a block diagram showing the retrieval of a data context uponuser login in accordance with an aspect of data driven role basedsecurity. To illustrate data driven role based security in the contextof the example discussed earlier in connection with FIGS. 1-4, considerthe point at which user 114 has been re-organized under user 104 insteadof user 106. As mentioned, since security settings do not auto-updatewhen the position of user 104 in the tree changes, in accordance with anembodiment, when user 104 logs in to the application, a queryautomatically returns data context for user 104. In this regard, any ofattributes 120 can be returned as instances of data for the data context160 for user 104. For instance, an attribute 120 may include managedIDs150 listing those who are managed by the individual, such as user 114(or this information could be extracted by examining the tree structureapplying to the organizational chart). In the present example, it isassumed that the system/application would like to determine who user104's direct reports are, since user 104 wishes to make a change to thetitle of one of the employees. As a result of the real-time retrieval ofup to date information, in this case, it is determined as part of thedata context 160 that user 104 has user 114 as a direct report as partof the re-organization by examining managedIDs 150.

FIG. 7 is a block diagram illustrating an example evaluation of acontrol expression in an access control object in accordance with anembodiment of data driven role based security. In this regard, asmentioned, the change of position of user 114 does not automaticallychange the associated ACLs for user 104 or user 114. In the presentexample, thus, an ACL 700 is defined including a DROL, e.g., managerrole 740, which can optionally include some explicit managedIDs 760(e.g., those specifically enumerated as direct reports for user 104) andmay also include managedIDs 770 from control expression(s) which arederived dynamically from the data context retrieved according to theexemplary process of FIG. 6. Upon dynamic evaluation vis-à-vis the datacontext, it is determined that user 114 is in fact one of user 104'sdirect reports and thus any operation permitted as a manager will bepermitted according to such role.

FIG. 8 is a block diagram illustrating the grant (or denial) of accessbased on the set of permissions of an access control object derived froman evaluation of a control expression of the access control object. Inthis regard, according to the example of FIGS. 6-7, if user 104 requestsa change 800 to the object representing user 114, based on the dynamicevaluation of the control expression in ACL 700, the request will begranted assuming that the item being changed in the object is within theprovince of a manager role.

FIG. 9 is a block diagram of an exemplary, non-limiting user interfacefor defining control expressions for use in connection with accesscontrol objects to achieve data driven role based security. As such, thetool illustrated having user interface 900 is but one example of a toolfor creating control expressions for defining dynamic roles as describedabove, and should not be considered limiting. For instance, via a simpleUI for a given role such as manager, a user of the tool could select afunction 910 of a given application, e.g., edit, view, print,distribute, etc., and also input which data fields 920 are applicable tothe application function. For instance, in the above example, themanagedID data field will be relevant to the ability to change in themanager role. Next, data fields 940 that are to be retrieved asinstances as part of the data context when a user logs in to theapplication are also selected. Based on these pieces, a controlexpression can be formed by control expression input component 930,e.g., by specifying a Boolean expression that resolves to true when therole conditions are met by the data context. As a result, such controlexpression(s) can be output for use in role based access control objectsby a data driven role based security system, such as output for use asACLs with such control expressions 950.

FIG. 10 is a flow diagram of an exemplary, non-limiting process for datadriven role based security in accordance with an embodiment. At 1000,the system queries for a data context in connection with potentialaccess to computing objects of a computing system by a computing deviceon behalf of a user identity. For instance the querying can includequerying for the data context in response to receiving a login based oncredentials identifying the user identity. At 1010, the computing devicereceives a request for access to a computing object. At 1020, a controlexpression of an object governing access to the computing object isdynamically evaluated based on the data context to form a set ofpermissions. The evaluating can include evaluating a programmaticexpression against one or more current versions of the one or morecomputing objects. At 1030, access to the computing object is granted ifthe set of permissions includes a permission for the request for access.

FIG. 11 is a flow diagram of another exemplary, non-limiting process fordata driven role based security in accordance with an embodiment. At1100, input is received via a user interface of a computing deviceregarding an application function of an application for which role basedsecurity control is to be applied for users of the application function.At 1110, further input is received regarding data field(s) of a data setapplicable to carrying out the application function. At 1120, input isreceived regarding data instances to be extracted from the data set toestablish a data context applicable to a given user at a time of loginin connection with potential use of the application function. At 1130,additional input is received via the user interface, based on thevarious inputs, that defines control expression(s) for an access controlobject for dynamic evaluation in connection with potential use of theapplication function by different users and determining theirpermissions in connection with a data driven role based security systemaccording to one or more embodiments described herein.

Exemplary Networked and Distributed Environments

One of ordinary skill in the art can appreciate that the variousembodiments of methods and devices for data driven role based securityand related embodiments described herein can be implemented inconnection with any computer or other client or server device, which canbe deployed as part of a computer network or in a distributed computingenvironment, and can be connected to any kind of data store. In thisregard, the various embodiments described herein can be implemented inany computer system or environment having any number of memory orstorage units, and any number of applications and processes occurringacross any number of storage units. This includes, but is not limitedto, an environment with server computers and client computers deployedin a network environment or a distributed computing environment, havingremote or local storage.

FIG. 12 provides a non-limiting schematic diagram of an exemplarynetworked or distributed computing environment. The distributedcomputing environment comprises computing objects or devices 1210, 1212,etc. and computing objects or devices 1220, 1222, 1224, 1226, 1228,etc., which may include programs, methods, data stores, programmablelogic, etc., as represented by applications 1230, 1232, 1234, 1236,1238. It can be appreciated that computing objects or devices 1210,1212, etc. and computing objects or devices 1220, 1222, 1224, 1226,1228, etc. may comprise different devices, such as PDAs, audio/videodevices, mobile phones, MP3 players, laptops, etc.

The computing objects or devices 1210, 1212, etc. and computing objectsor devices 1220, 1222, 1224, 1226, 1228, etc. can communicate with oneor more other computing objects or devices 1210, 1212, etc. andcomputing objects or devices 1220, 1222, 1224, 1226, 1228, etc. by wayof the communications network 1240, either directly or indirectly. Eventhough illustrated as a single element in FIG. 12, network 1240 maycomprise other computing objects and computing devices that provideservices to the system of FIG. 12, and/or may represent multipleinterconnected networks, which are not shown. The computing objects ordevices 1210, 1212, etc. or the computing objects or devices 1220, 1222,1224, 1226, 1228, etc. can also contain an application, such asapplications 1230, 1232, 1234, 1236, 1238, that might make use of anAPI, or other object, software, firmware and/or hardware, suitable forcommunication with or implementation of data driven role based securityas provided in accordance with various embodiments.

There are a variety of systems, components, and network configurationsthat support distributed computing environments. For example, computingsystems can be connected together by wired or wireless systems, by localnetworks or widely distributed networks. Currently, many networks arecoupled to the Internet, which provides an infrastructure for widelydistributed computing and encompasses many different networks, thoughany network infrastructure can be used for exemplary communications madeincident to the techniques as described in various embodiments.

Thus, a host of network topologies and network infrastructures, such asclient/server, peer-to-peer, or hybrid architectures, can be utilized.In a client/server architecture, particularly a networked system, aclient is usually a computer that accesses shared network resourcesprovided by another computer, e.g., a server. In the illustration ofFIG. 12, as a non-limiting example, computing objects or devices 1220,1222, 1224, 1226, 1228, etc. can be thought of as clients and computingobjects or devices 1210, 1212, etc. can be thought of as servers wherethe servers provide data services, such as receiving data from clients,such as computing objects or devices 1220, 1222, 1224, 1226, 1228, etc.,storing of data, processing of data, transmitting data to clients, suchas computing objects or devices 1220, 1222, 1224, 1226, 1228, etc.,although any computer can be considered a client, a server, or both,depending on the circumstances. Any of these computing devices may beprocessing data, or requesting services or tasks that may implicate datadriven role based security and related techniques as described hereinfor one or more embodiments.

A server is typically a remote computer system accessible over a remoteor local network, such as the Internet or wireless networkinfrastructures. The client process may be active in a first computersystem, and the server process may be active in a second computersystem, communicating with one another over a communications medium,thus providing distributed functionality and allowing multiple clientsto take advantage of the information-gathering capabilities of theserver. Any software objects utilized pursuant to the user profiling canbe provided standalone, or distributed across multiple computing devicesor objects.

In a network environment in which the communications network/bus 1240 isthe Internet, for example, the computing objects or devices 1210, 1212,etc. can be Web servers with which the clients, such as computingobjects or devices 1220, 1222, 1224, 1226, 1228, etc., communicate viaany of a number of known protocols, such as HTTP. Servers, such ascomputing objects or devices 1210, 1212, etc., may also serve asclients, such as computing objects or devices 1220, 1222, 1224, 1226,1228, etc., as may be characteristic of a distributed computingenvironment.

Exemplary Computing Device

As mentioned, various embodiments described herein apply to any devicewherein it may be desirable to implement one or pieces of data drivenrole based security. It should be understood, therefore, that handheld,portable and other computing devices and computing objects of all kindsare contemplated for use in connection with the various embodimentsdescribed herein, i.e., anywhere that a device may provide somefunctionality in connection with data driven role based security.Accordingly, the below general purpose remote computer described belowin FIG. 13 is but one example, and the embodiments of the subjectdisclosure may be implemented with any client having network/businteroperability and interaction.

Although not required, any of the embodiments can partly be implementedvia an operating system, for use by a developer of services for a deviceor object, and/or included within application software that operates inconnection with the operable component(s). Software may be described inthe general context of computer-executable instructions, such as programmodules, being executed by one or more computers, such as clientworkstations, servers or other devices. Those skilled in the art willappreciate that network interactions may be practiced with a variety ofcomputer system configurations and protocols.

FIG. 13 thus illustrates an example of a suitable computing systemenvironment 1300 in which one or more of the embodiments may beimplemented, although as made clear above, the computing systemenvironment 1300 is only one example of a suitable computing environmentand is not intended to suggest any limitation as to the scope of use orfunctionality of any of the embodiments. Neither should the computingenvironment 1300 be interpreted as having any dependency or requirementrelating to any one or combination of components illustrated in theexemplary operating environment 1300.

With reference to FIG. 13, an exemplary remote device for implementingone or more embodiments herein can include a general purpose computingdevice in the form of a handheld computer 1310. Components of handheldcomputer 1310 may include, but are not limited to, a processing unit1320, a system memory 1330, and a system bus 1321 that couples varioussystem components including the system memory to the processing unit1320.

Computer 1310 typically includes a variety of computer readable media,such as, but not limited to, digital versatile disks (DVDs), flashstorage, internal or external hard drives, compact disks (CDs), etc.,and can be any available media that can be accessed by computer 1310including remote drives, cloud storage disks, etc. The system memory1330 may include computer storage media in the form of volatile and/ornonvolatile memory such as read only memory (ROM) and/or random accessmemory (RAM). By way of example, and not limitation, memory 1330 mayalso include an operating system, application programs, other programmodules, and program data.

A user may enter commands and information into the computer 1310 throughinput devices 1340 A monitor or other type of display device is alsoconnected to the system bus 1321 via an interface, such as outputinterface 1350. In addition to a monitor, computers may also includeother peripheral output devices such as speakers and a printer, whichmay be connected through output interface 1350.

The computer 1310 may operate in a networked or distributed environmentusing logical connections to one or more other remote computers, such asremote computer 1370. The remote computer 1370 may be a personalcomputer, a server, a router, a network PC, a peer device or othercommon network node, or any other remote media consumption ortransmission device, and may include any or all of the elementsdescribed above relative to the computer 1310. The logical connectionsdepicted in FIG. 13 include a network 1371, such local area network(LAN) or a wide area network (WAN), but may also include othernetworks/buses. Such networking environments are commonplace in homes,offices, enterprise-wide computer networks, intranets and the Internet.

As mentioned above, while exemplary embodiments have been described inconnection with various computing devices, networks and advertisingarchitectures, the underlying concepts may be applied to any networksystem and any computing device or system in which it is desirable topublish, build applications for or consume data in connection withinteractions with a cloud or network service.

There are multiple ways of implementing one or more of the embodimentsdescribed herein, e.g., an appropriate API, tool kit, driver code,operating system, control, standalone or downloadable software object,etc. which enables applications and services to use data driven rolebased security. Embodiments may be contemplated from the standpoint ofan API (or other software object), as well as from a software orhardware object that facilitates provision data driven role basedsecurity in accordance with one or more of the described embodiments.Various implementations and embodiments described herein may haveaspects that are wholly in hardware, partly in hardware and partly insoftware, as well as in software.

The word “exemplary” is used herein to mean serving as an example,instance, or illustration. For the avoidance of doubt, the subjectmatter disclosed herein is not limited by such examples. In addition,any aspect or design described herein as “exemplary” is not necessarilyto be construed as preferred or advantageous over other aspects ordesigns, nor is it meant to preclude equivalent exemplary structures andtechniques known to those of ordinary skill in the art. Furthermore, tothe extent that the terms “includes,” “has,” “contains,” and othersimilar words are used in either the detailed description or the claims,for the avoidance of doubt, such terms are intended to be inclusive in amanner similar to the term “comprising” as an open transition wordwithout precluding any additional or other elements.

As mentioned, the various techniques described herein may be implementedin connection with hardware or software or, where appropriate, with acombination of both. As used herein, the terms “component,” “system” andthe like are likewise intended to refer to a computer-related entity,either hardware, a combination of hardware and software, software, orsoftware in execution. For example, a component may be, but is notlimited to being, a process running on a processor, a processor, anobject, an executable, a thread of execution, a program, and/or acomputer. By way of illustration, both an application running oncomputer and the computer can be a component. One or more components mayreside within a process and/or thread of execution and a component maybe localized on one computer and/or distributed between two or morecomputers.

The aforementioned systems have been described with respect tointeraction between several components. It can be appreciated that suchsystems and components can include those components or specifiedsub-components, some of the specified components or sub-components,and/or additional components, and according to various permutations andcombinations of the foregoing. Sub-components can also be implemented ascomponents communicatively coupled to other components rather thanincluded within parent components (hierarchical). Additionally, itshould be noted that one or more components may be combined into asingle component providing aggregate functionality or divided intoseveral separate sub-components, and any one or more middle layers, suchas a management layer, may be provided to communicatively couple to suchsub-components in order to provide integrated functionality. Anycomponents described herein may also interact with one or more othercomponents not specifically described herein but generally known bythose of skill in the art.

In view of the exemplary systems described supra, methodologies that maybe implemented in accordance with the disclosed subject matter will bebetter appreciated with reference to the flowcharts of the variousfigures. While for purposes of simplicity of explanation, themethodologies are shown and described as a series of blocks, it is to beunderstood and appreciated that the claimed subject matter is notlimited by the order of the blocks, as some blocks may occur indifferent orders and/or concurrently with other blocks from what isdepicted and described herein. Where non-sequential, or branched, flowis illustrated via flowchart, it can be appreciated that various otherbranches, flow paths, and orders of the blocks, may be implemented whichachieve the same or a similar result. Moreover, not all illustratedblocks may be required to implement the methodologies describedhereinafter.

While in some embodiments, a client side perspective is illustrated, itis to be understood for the avoidance of doubt that a correspondingserver perspective exists, or vice versa. Similarly, where a method ispracticed, a corresponding device can be provided having storage and atleast one processor configured to practice that method via one or morecomponents.

While the various embodiments have been described in connection with thepreferred embodiments of the various figures, it is to be understoodthat other similar embodiments may be used or modifications andadditions may be made to the described embodiment for performing thesame function without deviating therefrom. Still further, one or moreaspects of the above described embodiments may be implemented in oracross a plurality of processing chips or devices, and storage maysimilarly be effected across a plurality of devices. Therefore, thepresent invention should not be limited to any single embodiment, butrather should be construed in breadth and scope in accordance with theappended claims.

1. A method, comprising: querying for a data context in connection withpotential access to one or more computing objects of a computing systemby at least one computing device on behalf of a user identity;receiving, by the at least one computing device, a request for access toat least one computing object of the one or more computing objects;evaluating a control expression of an object governing access to the atleast one computing object based on the data context to form a set ofpermissions; and granting access to the at least one computing object ifthe set of permissions includes a permission for the request for access.2. The method of claim 1, wherein the evaluating includes evaluating aprogrammatic expression against one or more current versions of the oneor more computing objects of the computing system.
 3. The method ofclaim 1, further comprising: denying access to the at least onecomputing object if the set of permissions does not include thepermission for the request for access.
 4. The method of claim 1, whereinthe evaluating includes evaluating the control expression of an accesscontrol list governing access to the at least one computing object basedon the data context.
 5. The method of claim 4, wherein the evaluatingincludes evaluating the control expression to form a list ofpermissions.
 6. The method of claim 1, wherein the evaluating furtherincludes evaluating a set of static permissions included in the objectgoverning access to the at least one computing object.
 7. The method ofclaim 1, wherein the querying includes querying for the data context inresponse to receiving a login based on credentials identifying the useridentity.
 8. The method of claim 1, wherein the querying includesquerying for an updated data context in response to receiving anadditional request for access to the at least one computing object. 9.The method of claim 1, wherein the querying includes querying for a datacontext in connection with potential access to one or more computingobjects representing employees of a human resources computing system.10. The method of claim 1, further comprising: receiving a definition ofthe control expression of the object governing access to the at leastone computing object from a user interface expressing relationshipsbetween access control and the one or more computing objects of thecomputing system.
 11. A computer-implemented system, comprising: a logincomponent configured to query for a data context for access requests todata objects of a computing system in response to a user login, the datacontext is retrieved based on the data objects; an access controlcomponent configured to dynamically evaluate, in response to a requestfor access to at least one data object of the data objects, at least onecontrol expression of an access control object that controls whether theaccess is granted to determine a set of permissions and configured togrant permission based on the set of permissions.
 12. The system ofclaim 11, wherein the access control component is configured todynamically evaluate a programmatic expression against current versionsof the data objects.
 13. The system of claim 11, wherein the accesscontrol component is further configured to deny access to the at leastone data object if the set of permissions does not include a permissionfor the request for access.
 14. The system of claim 11, wherein theaccess control component is configured to evaluate the controlexpression of an access control list governing access to the at leastone data object based on the data context.
 15. The system of claim 14,wherein the access control component is configured to evaluate thecontrol expression to output a list of permissions.
 16. The system ofclaim 11, wherein the access control component is configured to evaluatea set of static permissions included in the object governing access tothe at least one data object.
 17. The system of claim 11, wherein thelogin component is configured to query for the data context in responseto receiving a login based on user credentials identifying a user. 18.The system of claim 11, wherein the login component is configured toquery for an updated data context in response to receiving an additionalrequest for access to the at least one data object.
 19. The system ofclaim 11, wherein the login component is configured to query for a datacontext in connection with access to data objects representing employeesof an enterprise.
 20. A method, comprising: receiving first input via auser interface of at least one computing device regarding an applicationfunction of an application for which role based security control is tobe applied for users of the application function; receiving second inputvia the user interface regarding at least one data field of a data setapplicable to carrying out the application function; receiving thirdinput via the user interface regarding data instances to be extractedfrom the data set to establish a data context applicable to a given userat a time of login in connection with potential use of the applicationfunction; and based on the first, second and third inputs, receivingfourth input via the user interface defining at least one controlexpression for a role based access control object for dynamic evaluationin connection with the potential use of the application function.