Implementing information technology management policies
A method (200) of implementing a policy of an information technology (IT) system. A requestor group (110) comprising a plurality of requestors with equal privileges under the policy is formed (210). A resource group (116) comprising a plurality of resources to be accessed by the resource group subje...
Saved in:
Main Author | |
---|---|
Format | Patent |
Language | English |
Published |
03.11.2004
|
Edition | 7 |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | A method (200) of implementing a policy of an information technology (IT) system. A requestor group (110) comprising a plurality of requestors with equal privileges under the policy is formed (210). A resource group (116) comprising a plurality of resources to be accessed by the resource group subject to the policy is formed (220). The policy is implemented as the requestor group acting upon the resource group (230). The requester group may comprise an internet protocol address or information identifying specific users. The resource group may comprise a communications protocol, an application software program, a firewall device, a network router, a data set stored on computer readable media or a server computer system. The implemented policy may comprise one or more natural language statements. |
---|---|
Bibliography: | Application Number: GB20040007726 |