Organizational reference data and entitlement system with entitlement generator
09846847 · 2017-12-19
Assignee
Inventors
- David Rutter (Brooklyn, NY, US)
- Kathryn Duffy (Briarcliff Manor, NY, US)
- John Hendy (Berkeley Heights, NJ, US)
- Anant Verma (Berkeley Heights, NJ, US)
Cpc classification
G06Q10/06
PHYSICS
G06F2221/2141
PHYSICS
G06F21/6218
PHYSICS
G06F21/604
PHYSICS
Y10S707/99931
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
International classification
G06F21/62
PHYSICS
G06Q10/06
PHYSICS
Abstract
A system including a centralized organizational information system in communication with a centralized organizational information database and an entitlement generator in communication with the centralized organizational information system, wherein the entitlement generator is configured to automatically generate at least one executable entitlement rule based on an input rule. The system also includes a federated set of entitlements engines in communication with the entitlement generator and a plurality of entitlement databases, wherein each of the entitlements engines is for determining whether a user is entitled to access secured resources requested by the user based on the executable entitlement rule.
Claims
1. A computer-implemented system for updating entitlements in real-time for controlling access to secured electronic resources of an organization, the system comprising: an organizational information system in communication with a plurality of organizational databases storing data associated with the organization; a plurality of entitlement engines, wherein each entitlement engine is associated with a corresponding application programmed to request access to at least one secured resource of the organization, and wherein each entitlement engine comprises: a set of business entitlement rules; and an associated entitlement database that stores associated entitlement data; wherein each entitlement engine is programmed to: receive an entitlement request from the corresponding application to access the at least one secured resource of the organization; and determine whether a first user using the corresponding application is entitled to access the at least one secured resource based on the associated entitlement data; a publication system programmed to publish event data associated with the organization in real time; an entitlement generator to update entitlement data of the plurality of entitlement engines in response to real time events, wherein the entitlement generator comprises: an event listener programmed to receive the real time event data from the publication system, wherein the real time event data indicates a change in a status of a system user comprising a change to at least one of: relationship data describing a relationship between the system user and a team; role data describing a job function assigned to the system user; or coverage data describing a scope of responsibility of the system user with respect to the job function associated with the system user; and a plurality of domain processors arranged for parallel processing of the real time event data, wherein each domain processor of the plurality of domain processors is associated with a corresponding domain, wherein each domain is associated with a corresponding entitlement engine of the plurality of entitlement engines, and wherein each domain processor comprises: a rules engine comprising a rule set including a set of business entitlement rules associated with the corresponding entitlement engine; and a transformation service programmed to: apply the real time event data to the rule set to create updated entitlement data for the corresponding entitlement engine; and communicate the updated entitlement data to the corresponding entitlement engine; wherein each entitlement engine is further programmed to: store the updated entitlement data in the associated entitlement database; and determine whether the first user using the corresponding application is entitled to access the at least one secured resource further based on the updated entitlement data.
2. The system of claim 1, wherein the publication system is programmed to transmit the event data to the entitlement generator, wherein the event data corresponds to events generated by the organizational information system.
3. The system of claim 1, wherein the entitlement generator further comprises an event filter programmed to filter out unwanted messages received via the event listener.
4. A computer-implemented system for creating entitlement rules and updating entitlements for controlling access to secured electronic resources of an organization, the system comprising: an organizational information system in communication with a plurality of organizational databases storing data associated with the organization; a plurality of entitlement engines associated with a plurality of corresponding domains, wherein each entitlement engine is associated with a corresponding application programmed to request access to at least one secured resource of the organization, and wherein each entitlement engine comprises: an integrator; an associated set of business entitlement rules; and an associated entitlement database that stores associated entitlement data; an entitlement generator container, accessible via an Internet portal, wherein the entitlement generator container comprises: a rule authoring module programmed to create an entitlement rule for any domain of the plurality of corresponding domains, wherein creating the entitlement rule comprises: defining a template rule, wherein the template rule specifies an action to be taken in response to an event; defining the entitlement rule, wherein the entitlement rule specifies entitlement data to be generated for the domain for which the entitlement rule is being created; and automatically generating an execution rule, wherein the execution rule comprises the template rule customized with at least one domain-specific element of the entitlement rule; and an entitlement generator in communication with the entitlement generator container, wherein the entitlement generator is programmed to: translate any execution rule generated by the entitlement generator container into executable code; and communicate the translated execution rule, to an entitlement engine that corresponds to the domain for which the execution rule was generated, as a new entitlement rule for incorporation with the associated set of business entitlement rules; wherein each integrator of each entitlement engine is programmed to: receive the data associated with the organization from the plurality of organizational databases; apply the data to any new entitlement rule communicated from the entitlement generator to generate updated entitlement data; and store the updated entitlement data in the associated entitlement database; and wherein each entitlement engine is programmed to: receive an entitlement request from the corresponding application to access the at least one secured resource of the organization; and determine whether a user using the corresponding application is entitled to access the at least one secured resource based on the associated entitlement data including any updated entitlement data.
5. The system of claim 4, wherein creating the entitlement rule further comprises: displaying a rules creation screen; receiving a selection of at least one of a role construct having a role variable or a coverage construct having a coverage variable applicable to at least one of a team or an identity; receiving a selection of a value for the variable corresponding to the selected one of the role construct or the coverage construct; receiving a selection of an action construct having an action variable and a resource variable; and receiving a selection of a value for the action variable and a value for the resource variable for the action construct.
6. The system of claim 4, wherein the first entitlement rule comprises a high-level rule in a human-readable language.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) Further advantages of the present invention may be better understood by referring to the following description taken in conjunction with the accompanying drawings, in which:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
(19)
DESCRIPTION
(20) It is to be understood that the figures and descriptions of the present invention have been simplified to illustrate elements that are relevant for a clear understanding of the present invention, while eliminating, for purposes of clarity, other elements. Those of ordinary skill in the art will recognize, however, that these and other elements may be desirable. However, because such elements are well known in the art, and because they do not facilitate a better understanding of the present invention, a discussion of such elements is not provided herein. Also, although various embodiments of the present invention are described herein as being employed in a financial services entity, it can be understood that the various embodiments of the present invention may be employed in any type of entity in any type of industry.
(21) As used herein, the term “entitlement” means management of access control policies for a individual, a computer user, etc. to access a protected resource such as a data resource or other type of data, an application, a work flow task, functionality within an application, etc.
(22) In various embodiments of the present invention, an entitlements integrator, using defined business entitlement rules, translates organizational data and other data into entitlements. The entitlements are stored as entitlement data and applications enforce entitlements by making decisions based on entitlements information queried from an entitlements engine.
(23)
(24) In order to accurately describe an organization, the organizational information system 14 may refer to data that is resident in various databases including, for example, a human resources database 17 (e.g., containing human resources data), a contact data database 18 (e.g., containing client contact data), a firmwide directory database 20 (e.g., containing data relating to those members in the organization, or firm, in which the system is utilized), an account reference data database 22 (e.g., containing information relating to accounts, account owners, etc.), and a static data database 23 (e.g., containing, for example, lists of countries and currencies etc.). An example of the organization and type of data that may be stored in the account reference data database 22 is contained in U.S. Patent Application Publication No. US 2002/0116304, which is owned by the assignee of the present application and which is incorporated herein by reference.
(25) The organizational information system 14 may be accessed by various reporting applications 24. The reporting applications 24 enable a user to generate various reports relating to the organization such as, for example, sales revenue reports. Workflow applications 26 may utilize organizational information, as requested by workflow instances 28, from the organizational information system 14. The workflow applications 26 may be, for example, transaction event and exception routing applications, or other workflow applications such as Savvion-based applications. Entitled applications 30 utilize secured resources, access to which is determined by the entitlements engine 16. The entitlements engine 16 determines if a user of an entitled application 30 is entitled to access secured resources on the basis of entitlement data that is derived from the organizational information system 14. Databases 62 are examples of secured resources. Application access to databases 62 can be restricted by a database access control server 34. The database access control server 34 obtains entitlements from the entitlements engine 16. The database access control server 34 may be, for example, a server such as a Sybase Openserver.
(26)
(27) 1. Joe Employee is a senior manager of department X.
(28) 2. Joe Consultant is a consultant to virtual team Y.
(29) 3. The relationship between department X and team Y is enabled by task order Z.
(30) Roles 46, as assigned by role assignments 47, define job functions that are assigned to a team 44 or an identity 40 on a team 44 (e.g., client service, data quality, sales trader, research sales, etc.). Coverage 48, as assigned by coverage assignment 49, defines the scope of a team's, or an identity's responsibilities with respect to the assigned role 46 (e.g., covers clients A-M in the equity division). Time 50 defines the periodicity of the coverage (e.g., Monday through Friday from 9 am to 5 pm EST). Coverage capacity 52 defines the nature of the responsibility of a team 44 or identity 40 (e.g., primary or backup, responsible or interested, etc.). Coverage 48 is defined by coverage attributes 54. Each coverage attribute describes a line of business, financial product, client, system, etc. for which service is being provided by the identities 40 and/or the teams 44.
(31)
(32) The entitlements data stored in the databases 32 is derived from the organizational information system 14 and other data 60. Business rules 76 define functions and data that need to be protected and who should have access to such functions and data. An example of a business rule 76 is: Everyone with a role of “sales trader” in the ABC group can view trades for the clients that they cover. The other data 60 may be, for example, data that is specific to a particular domain. Integrators 64 read data from the organizational information system 14 and apply business rules 76 to the data. The integrators 64 also store entitlement data in the entitlement databases 32. As such, the entitled applications 30 can make entitlement queries of the entitlements engine 16.
(33) As shown in
(34) In one embodiment, the organizational information system 14 includes a set of maintenance rules (not shown). The maintenance rules may be logical tests that regulate the creation, modification, deletion, etc. of a particular set of organizational information. For example, such a logical test could ensure that a group is not a subgroup of itself. The maintenance rules also may be constraints on what roles 46 or coverage 48 an individual can have. Examples of such rules may be:
(35) 1. Anyone with a role of “sales trader” cannot also have a role of “payment processing.”
(36) 2. Anyone with a role of “sales trader” must have a current NASD Series 7 license.
(37) The system 70 includes an exception and work item router 80 that processes exceptions and routes work flow items. The ability to route work items (exceptions from trade processing systems, incoming faxes, workflow items, etc.) automatically to the rightful owners yields significant benefits. These benefits include, for example, efficiencies because no manual effort is required to forward the work item to the correct owner, risk management improvements because the possibility of misrouting items is greatly reduced, improved customer service because work items are available to client service representatives in a more timely fashion, etc. Various embodiments of the present invention use organizational data including coverage and role definitions to interface with work item systems such as exception processing systems and workflow automation systems.
(38) The system 70 also includes an information portal 82. Organizations often make extensive use of web-based information portals to deliver content to internal users and external clients. The content of such portals varies depending on the needs of the individual users and business areas, based on criteria such as product area, market, location, business division, etc. Significant manual effort is often expended on profiling information portal content to tailor it to specific departments and classes of users. Various embodiments of the present invention use organizational data including coverage and role definitions to determine actual content required in the information portal 82, thus reducing the need for manual content customization.
(39) In operation, the types of requests made by the applications 30 to the organizational information system 14 may be, for example, non-entitlement requests such as requests concerning teams, roles, and coverage. Examples of such requests may be:
(40) 1. What team(s) is Sarah Jones on?
(41) 2. Who has the role of “sales trader?”
(42) 3. Who in the XYZ Division New York team is responsible for confirms processing for the ABC Client Corporation cash equity business?
(43) The types of requests made by the applications 30 to an entitlements engine 16 may be, for example, entitlement requests such as requests concerning operations or reporting. Examples of such requests may be:
(44) 1. Can Joe Smith authorize a $1 MM payment?
(45) 2. Who has the ability to view trades relating to ABC Client Corporation?
(46)
(47)
(48) In the example shown in
(49)
(50) In the example shown in
(51)
(52) A maintenance service 96 permits, for example, authorized users to maintain the organizational information. In one embodiment, the maintenance service 96 uses an entitlement engine 16-3 to verify that the user of the maintenance service is entitled to access organizational information. In operation, the maintenance service 96 allows a user of the organizational information system 14 to add, remove, update, and alter organization information as described in connection with
(53) The maintenance service 96 may ensure that the correct steps, or workflow, are followed when a user attempts to add, remove, update or alter any organizational information. For example, the maintenance service 96 may require that, before the coverage 48 is changed for an individual to specify that the individual covers, for example, ABC Client Corporation, a manager electronically consent to the change before the change is effected in the organizational information system 14. In another example, if the coverage 48 is going to be changed for an individual to specify that the individual is allowed to authorize cash payments, a individual specified in the organizational information system 14 as the owner of the role of authorization cash payments has to electronically approve the addition of the role of authorize cash payments for the individual to which it is to be associated.
(54) Changes to roles and coverage in the organizational information database 500 that impact entitlements relating to the organizational information system 14 (e.g., changes to organizational information system maintenance roles and coverage) are propagated to the entitlements engine 16-3.
(55)
(56) TABLE-US-00001 TABLE 1 OrgUnit 200 This table shows information about the organizational units that the organization that utilizes the system 10 is comprised of. Column Description OrgUnitID Unique identifier for an Organizational Unit Name Name of the Organizational Unit Description Brief description of the Organizational Unit OrgUnitType Identities, Organizational Teams and Virtual Teams in the subtype tables.
(57) TABLE-US-00002 TABLE 2 Identity 202 This table shows organizational information that is specific to identities. Column Description OrgUnitID Unique identifier for a Organizational Unit FWID Firmwide Directory ID
(58) TABLE-US-00003 TABLE 3 OrgTeam 204 This table shows detailed information that is specific to organizational teams. Requirement Description OrgUnitID Unique identifier for a Organizational Unit CostCenter The cost center for the Organizational Unit
(59) TABLE-US-00004 TABLE 4 VirtualTeam 206 This table shows detailed information that is specific to virtual teams. Requirement Description OrgUnitID Unique identifier for a Organizational Unit Composition Describes if the Virtual Team is comprised of internal employees, external clients or mixed identities
(60) TABLE-US-00005 TABLE 5 OrgUnitRelationship 208 This table shows the nature of the relationship that may exist either between teams or between teams and identities. This can be used to capture parent-child hierarchies, relationship with contingent workforce team, team membership, the membership capacity of an identity on a particular team, etc. Requirement Description OrgUnitID Unique identifier for a Organizational Unit RelatedOrgUnitID The organizational unit that OrgUnitID is related to RelationshipType Describes the type of relationship shared by the two organizational units Description Brief information about the organizational relationship
(61) TABLE-US-00006 TABLE 6 OrgUnitRelationshipType 210 This table shows the relationships two organizational units may share. Requirement Description RelationshipType Describes the type of relationship shared by the two organizational units Description Brief information about the relationship type
(62) TABLE-US-00007 TABLE 7 Role 212 This table shows a list of assignable roles Requirement Description RoleID Unique identifier for a role Name The name of the role Description Brief information about the role
(63) TABLE-US-00008 TABLE 8 OrgUnitRole 214 This table shows the role assigned to either an identity as a member of team or to a team as it relates to another team. Requirement Description OrgUnitID Unique identifier for a Organizational Unit RelatedOrgUnitID The organizational unit that OrgUnitID is related to RelationshipType Describes the type of relationship shared by the two organizational units RoleID Unique identifier for a role
(64) TABLE-US-00009 TABLE 9 Coverage 216 This table shows the coverage records assignable to teams and identities. Requirement Description CoverageID Unique identifier for a coverage record Name System generated name for the coverage record Description Brief information about the coverage record
(65) TABLE-US-00010 TABLE 10 CoverageOrgUnit 218 This table associates coverage records with an identity as a member of a team with a role or a team related to another team with a role. Requirement Description OrgUnitID Unique identifier for a Organizational Unit RelatedOrgUnitID The organizational unit that OrgUnitID is related to RelationshipType Describes the type of relationship shared by the two organizational units RoleID Unique identifier for a role CoverageID Unique identifier for a coverage record CoverageTimeRule Stores the time and the periodicity of when the coverage is active Primary_Backup Stores the coverage capacity of being primary or backup Responsible_Interested Stores the coverage capacity of being responsible or interested
(66) TABLE-US-00011 TABLE 11 CoverageAttribute 220 This table stores the individual coverage attributes that comprise a coverage record. Requirement Description CoverageID Unique identifier for a coverage record CoverageTypeID The source type of the coverage attribute ExternalAttributeID Unique identifier for a coverage attribute from an external data source Descriptor A system generated field describing the coverage attribute
(67) TABLE-US-00012 TABLE 12 CoverageAttributeType 222 This table contains a list of the coverage attribute data sources. Requirement Description CoverageTypeID The source type of the coverage attribute Data Source Unique identifier for a coverage attribute in the data source DataSourceType The application type of the resource - e.g., Sybase, DB/2, LDAP Description Brief information about the coverage type
(68)
(69) Table 13 lists events that may be captured within the audit database 230 to enable accurate and efficient creation of audit trails for all organizational information system 14 functionality.
(70) TABLE-US-00013 TABLE 13 Audit Events Events Disabling of an identity New role assignment to an identity Removal of role assignment from an identity New relationship assignment to an identity Update of relationship assigned to an identity Removal of relationship assigned to an identity New relationship assignment to a team Update relationship assigned to a team Removal of relationship assigned to a team Update of team details (composition, cost center, etc.) New role assignment to a team Removal of role assignment from a team New relationship type Removal of an existing relationship type New role created Removal of a role Update of Coverage Details New Coverage Attribute Removal of Coverage Attribute Modification of Coverage Attribute New Coverage Attribute type Update of existing Coverage Attribute Type Removal of Coverage Attribute Type Workflow initiated Workflow step initiated Workflow step completion Workflow completion Sending of Notification Entitlements
(71) The following tables provide an explanation of various entities that are outlined in the audit log logical data model of
(72) TABLE-US-00014 TABLE 14 Events 234 This table logs all of the system events that may occur in the organizational information system 14. Each Event ID 232 may tie into multiple versions of audited entities. Each version represents a separate insert, update or delete operation within the organizational information system 14. Requirement Description EventID Unique identifier for organizational information system system event BusinessCase Descriptor explaining the business case for each event EventTS Timestamp of when the event was initiated EventCreator The FWID of the initiator of the event EventType Unique identifier for the different event types that may occur within the organizational information system
(73) TABLE-US-00015 TABLE 15 EventType 255 This table stores detailed information for core organizational information system 14 events 234. Requirement Description EventType Unique identifier for the different event types that may occur within the organizational information system Description Information on the nature of the organizational information system system event type
(74) TABLE-US-00016 TABLE 16 WorkflowEventDetails 236 This table captures the workflow events 236 issued by the organizational information system 14. Requirement Description EventID Unique identifier for organizational information system system event WorkflowID Unique identifier for workflow events EventTS Timestamp of when the workflow event was initiated EventCreator The FWID of the initiator of the workflow event
(75) TABLE-US-00017 TABLE 17 NotificationEventDetails 238 This table captures the Notification events 238 issued by the organizational information system 14. Requirement Description EventID Unique identifier for organizational information system system event NotificationID Unique identifier for notification events EventTS Timestamp of when the notification event was initiated EventCreator The FWID of the initiator of the notification event
(76) TABLE-US-00018 TABLE 18 RequestEventDetails 240 This table captures the Request events 240 initiated by requesting systems. Requirement Description EventID Unique identifier for organizational information system system event RequestID Unique identifier for request events EventTS Timestamp of when the request event was initiated EventRequestor The FWID of the initiator of the request event
(77) TABLE-US-00019 TABLE 19 OrgUnitVer 242 This table captures the OrgUnit entity 242 and adds columns for data versioning and event auditing. Column Description OrgUnitID Unique identifier for a Organizational Unit Name Name of the Organizational Unit Description Brief description of the Organizational Unit OrgUnitType Identities, Organizational Teams and Virtual Teams in the subtype tables. VersionID Unique identifier for the version EventID Unique identifier for organizational information system event VersionTS Timestamp of when the version was created VersionCreator The FWID of the creator of the version
(78) TABLE-US-00020 TABLE 20 IdentityVer (not shown in FIG. 9) This table captures the Identity entity and adds columns for data versioning and event auditing. Column Description OrgUnitID Unique identifier for a Organizational Unit FWID Firmwide Directory ID VersionID Unique identifier for the version EventID Unique identifier for organizational information system system event VersionTS Timestamp of when the version was created VersionCreator The FWID of the creator of the version
(79) TABLE-US-00021 TABLE 21 OrgTeamVer 244 This table captures the OrgTeam entity 244 and adds columns for data versioning and event auditing. Requirement Description OrgUnitID Unique identifier for a Organizational Unit CostCenter The cost center for the Organizational Unit VersionID Unique identifier for the version EventID Unique identifier for organizational information system system event VersionTS Timestamp of when the version was created VersionCreator The FWID of the creator of the version
(80) TABLE-US-00022 TABLE 22 VirtualTeamVer 246 This table captures the VirtualTeam entity 246 and adds columns for data versioning and event auditing. Requirement Description OrgUnitID Unique identifier for a Organizational Unit Composition Describes if the Virtual Team is comprised of internal organization employees, external clients or mixed identities VersionID Unique identifier for the version EventID Unique identifier for organizational information system system event VersionTS Timestamp of when the version was created VersionCreator The FWID of the creator of the version
(81) TABLE-US-00023 TABLE 23 OrgUnitRelationshipVer 248 This table captures the OrgUnitRelationship entity 248 and adds columns for data versioning and event auditing. Requirement Description OrgUnitID Unique identifier for a Organizational Unit RelatedOrgUnitID The organizational unit that OrgUnitID is related to RelationshipType Describes the type of relationship shared by the two organizational units Description Brief information about the organizational relationship VersionID Unique identifier for the version EventID Unique identifier for organizational information system system event VersionTS Timestamp of when the version was created VersionCreator The FWID of the creator of the version
(82) TABLE-US-00024 TABLE 24 OrgUnitRelationshipTypeVer 250 This table captures the OrgUnitRelationshipType entity 250 and adds columns for data versioning and event auditing. Requirement Description RelationshipType Describes the type of relationship shared by the two organizational units Description Brief information about the relationship type VersionID Unique identifier for the version EventID Unique identifier for organizational information system system event VersionTS Timestamp of when the version was created VersionCreator The FWID of the creator of the version
(83) TABLE-US-00025 TABLE 25 RoleVer 252 This table captures the Role entity 252 and adds columns for data versioning and event auditing. Requirement Description RoleID Unique identifier for a role Name The name of the role Description Brief information about the role VersionID Unique identifier for the version EventID Unique identifier for organizational information system system event VersionTS Timestamp of when the version was created VersionCreator The FWID of the creator of the version
(84) TABLE-US-00026 TABLE 26 OrgUnitRoleVer 253 This table captures the OrgUnitRoleVer entity 253 and adds columns for data versioning and event auditing. Requirement Description OrgUnitID Unique identifier for a Organizational Unit RelatedOrgUnitID The organizational unit that OrgUnitID is related to RelationshipType Describes the type of relationship shared by the two organizational units RoleID Unique identifier for a role VersionID Unique identifier for the version EventID Unique identifier for organizational information system system event VersionTS Timestamp of when the version was created VersionCreator The FWID of the creator of the version
(85) TABLE-US-00027 TABLE 27 CoverageVer 254 This table captures the Coverage entity 254 and adds columns for data versioning and event auditing. Requirement Description CoverageID Unique identifier for a coverage record Name System generated name for the coverage record Description Brief information about the coverage record VersionID Unique identifier for the version EventID Unique identifier for organizational information system system event VersionTS Timestamp of when the version was created VersionCreator The FWID of the creator of the version
(86) TABLE-US-00028 TABLE 28 CoverageOrgUnitVer 256 This table captures the CoverageOrgUnit entity 256 and adds columns for data versioning and event auditing. Requirement Description OrgUnitID Unique identifier for a Organizational Unit RelatedOrgUnitID The organizational unit that OrgUnitID is related to RelationshipType Describes the type of relationship shared by the two organizational units RoleID Unique identifier for a role CoverageID Unique identifier for a coverage record CoverageTimeRule Stores the time and the periodicity of when the coverage is active Primary_Backup Stores the coverage capacity of being primary or backup Responsible_Interested Stores the coverage capacity of being responsible or interested VersionID Unique identifier for the version EventID Unique identifier for organizational information system system event VersionTS Timestamp of when the version was created VersionCreator The FWID of the creator of the version
(87) TABLE-US-00029 TABLE 29 CoverageAttributeVer 258 This table captures the CoverageAttributeVer entity 258 and adds columns for data versioning and event auditing. Requirement Description CoverageID Unique identifier for a coverage record CoverageTypeID The source type of the coverage attribute ExternalAttributeID Unique identifier for a coverage attribute from an external data source Descriptor A system generated field describing the coverage attribute VersionID Unique identifier for the version EventID Unique identifier for organizational information system system event VersionTS Timestamp of when the version was created VersionCreator The FWID of the creator of the version
(88) TABLE-US-00030 TABLE 30 CoverageTypeVer 260 This table captures the CoverageAttributeTypeVer 260 entity and adds columns for data versioning and event auditing. Requirement Description CoverageTypeID The source type of the coverage attribute Data Source Unique identifier for a coverage attribute in the data source DataSourceType The application type of the resource - e.g., Sybase, DB/2, LDAP Description Brief information about the coverage type VersionID Unique identifier for the version EventID Unique identifier for organizational information system system event VersionTS Timestamp of when the version was created VersionCreator The FWID of the creator of the version
(89)
(90) A Central Administration group 300 has the ultimate responsibility for reference data maintenance. As “super users” of the organizational information system maintenance service 96, the Central Administration group 300 delegates administration responsibilities and privileges to Delegated Administrators 302 across the organizational information system 14 user population. The responsibilities of the Central Administration group 300 are outlined in Table 31.
(91) TABLE-US-00031 TABLE 31 Role Responsibility Central Create groups and assign Administrator coverage based on any set of available attributes. Delegate group administration to various business units and geographies. Define restrictions around group creation, such as which attributes can be used to define coverage. Add reference data identities to groups Administer reference data roles and attributes Central Organizational information Administration system Super user Manager Create new central administrators
(92) The responsibilities of Data Owners 310 are outlined in Table 32.
(93) TABLE-US-00032 TABLE 32 Role Responsibility Central Standards Ensure that standards in the Review Group definition of rules, use of coverage and definition of teams are in place. Role Standards Sub-set of the Central Group Standards Review Group Ensure role standardization by reviewing and granting or denying new role requests. Role Owner Define business rules around and control access to the roles available for assignment to identities and teams. Data Owner Approve team membership requests for teams covering highly sensitive data. Approve requests to assign coverage of highly sensitive data
(94) In order to optimize the data maintenance process, administration capabilities may be delegated across the organizational information system user population. Delegated Administrators 302 may be granted full rights to administer those teams within their realm of delegation. The responsibilities of Team Owners 314 are outlined in Table 33.
(95) TABLE-US-00033 TABLE 33 Role Responsibility Delegated Create and maintain groups Administrator (including assigning coverage) within their realm of delegation. Further delegate group administration within their realm of delegation Delegate identity administration to team owners Assign replacements when team owners leave the organization. Delegated Maintain organizational Administrators in groups in reference data each group cost within their cost center. center Further delegate group administration Delegated Maintain organizational Administrators in groups in reference data non-group cost within their cost center centers Further delegate group administration Team Owner For each team in reference data, virtual or organizational, there will need to be two team owners. Approve access to their team Manage their team membership, including coverage. Require additional approval from data owners and line managers when appropriate Line Managers/ Grant an identity access to Officers certain organizational and virtual teams, in addition to or instead of Team Owner approval Relationship Grant an identity Managers (specifically, a client contact) access to certain virtual teams, in addition to or instead of Team Owner approval
(96) Self-maintenance allows for real-time team membership updates. All organizational information system 14 users may have a role in the data maintenance organization as requestors, initiating the team enrollment process as outlined in Table 34.
(97) TABLE-US-00034 Role Responsibility Self Maintenance Add and remove themselves to non-secure virtual teams Requestor Request to be added to coverage groups Request on behalf of someone for that individual to be added to a coverage group.
(98)
(99)
(100) At step 362, the organizational structure is validated to confirm that the structure (including assignment of roles and coverage) conforms to various standards that the organizational data must follow. In one embodiment, steps 360 and 362 can be combined into one operation.
(101) At step 364, a check is made to ensure that applications can use the organizational data that was created at step 360. At step 366, the organizational data is signed off on by, for example, administrators of the system 10, application owners, etc.
(102)
(103) At step 382, Black's identity is added to the firmwide directory 20. At step 384, Black's identity is published to the organizational information system 14 and the identity is added to the organizational information and Black is aligned with her cost center. The update in the organizational information triggers a notification to the delegated administrator that is responsible for the cost center with which Black is associated at step 386. At step 388, the delegated administrator adds Black to the correct organization team (XYZ Group) and her role and coverage capacity are defined.
(104) At step 390, the delegated administrator adds Black to a virtual team that covers clients A-H. As can be seen, admittance to various teams may require approval by an additional approver. At step 392, Black is now a member of client A-H virtual team in the organizational information system 14. In various embodiments, steps 390 and 392 may be repeated as necessary.
(105)
(106) At step 402, upon completion of an identity in the firmwide directory 20, the identity is published to the organizational information system 14. Foley is aligned with the appropriate cost center in the organizational information and is flagged as a consultant. In one embodiment, because Foley is a consultant, his identity in the organizational information system 14 automatically expires after a pre-determined period of time and manual intervention is required to extend residence of the identity in the organizational information system 14.
(107) At step 404, the update in the organizational information system 14 triggers a notification to the delegated administrator that is responsible for the cost center with which Foley is associated. At step 406, the delegated administrator adds Foley to the ABC organizational team in the organizational information system 14. In one embodiment, an expiration date of Foley's membership in the team can be set. At step 408, the delegated administrator adds Foley to the appropriate virtual team (i.e. the XYZ team). As can be seen, admittance to various teams may require approval by an additional approver. At step 410, Foley is now a member of the XYZ project virtual team in the organizational information system 14. In various embodiments, steps 408 and 410 may be repeated as necessary.
(108)
(109) At step 416, the organizational information system 14 is triggered to mark Doe's identity as terminated. At step 418, the central administrator and the delegated administrator responsible for the cost center with which Does is associated are alerted of Doe's termination. In one embodiment, other individuals (e.g., line managers, etc.) are also notified of Doe's termination so that appropriate steps may be taken (e.g., disable Doe's access to certain resources, provide coverage for Doe's former responsibilities, etc.).
(110) At step 420, Doe is disabled with respect to all teams in the organizational information system 14. At step 422, Doe's termination is published to other systems such as, for example, the entitlements engine 16.
(111)
(112) At step 428, notification is sent to Green's line manager requesting approval for Green to be added to the XYZ client team. If, as is the case in
(113) As can be seen in
(114)
(115) At step 444, the delegated administrator of Smith's new cost center and the delegated administrator of Smith's former cost center are sent notifications that Smith will be disassociated with the former cost center. At step 446, Smith has been removed from all teams associated with the former cost center in the organizational information system 14 and, in one embodiment, Smith is notified of his removal from such teams.
(116) At step 446, changes regarding Smith in the organizational information system 14 are published to, for example, downstream and upstream applications and systems that utilize the organizational information system 14. In one embodiment, if a cost center change is updated in the organizational information system 14 before it is updated in the HR database 17, the organizational information system 14 will publish the change to the HR database 17.
(117)
(118) At step 458, the delegated administrator adds Murphy to the ABC Corp. client team in the organizational information system 14. At step 460, the delegated administrator adds Murphy to the ABC Corp. virtual team in the organizational information system 14. At step 462, Murphy is now a member of the ABC Corp. virtual team in the organizational information system 14. In various embodiments, steps 460 and 462 may be repeated as necessary.
(119)
(120) At step 472, Jenkins is removed from all teams in the organizational information system 14. At step 474, the update to the organizational information system 14 is published to downstream systems and applications such as, for example, the entitlements engine 16.
(121)
(122) At step 480, the role standards team confirms that no comparable role already exists and at step 482 approves addition of the new role. At step 484, the role standards team defines various restrictions relating to the new role. At step 486, the role administrator creates the role and at step 488, notification is sent to a global administrative team to alert the team of the existence of the new role. At step 490, the new role is available in the organizational information system 14.
(123)
(124)
(125) A portal 2302 in the system 2301 includes a browser client 2304 that permits a user to, for example, create business entitlement rules, perform entitlement modeling, perform system administrative functions, predict the impact of changing a business entitlement rule before the rule is changed, generate reports, etc. A entitlement generator container 2306 provides a runtime environment for Internet (web) services such as, for example, an entitlements model definition service, a rules authoring service, a reporting and auditing service, a rule generation and deployment service, an authorization and entitlement service, etc. The entitlement generator container 2306 may be, for example, an Apache Tomcat container.
(126) Entitlement generator data 2308 may be meta data that relates to entitlement models. The entitlement generator 2300 may subscribe to events from the organizational information system 14 that are published by a content based publication system 2310 via a transport mechanism 2312. The entitlement generator 2300 may have read only access to various databases, including, but not limited to, the HR data database 17, the contact data database 18, the firm wide directory 20, the account reference data database 22, and other reference databases 23.
(127) The entitlement generator 2300 communicates rules sets 2316 as entitlements information to the entitlements engines 16. In various embodiments the system 2301 may include one entitlements engine 16 and one entitlements data database 32 for each rules set 2316. The entitlement generator 2300 may have read only access to various external systems 2314. The entitlement generator 2300 may use data from the external systems 2314 to obtain data necessary for generating entitlements. Examples of external systems include an LDAP directory 2550, the firm wide directory 20, the contact data database 18, etc.
(128) In various embodiments the entitlement generator 2300 may operate in either batch mode or in real-time mode. In real-time mode, the entitlement generator 2300 “listens” for real-time events that are published by the organizational information system 14. The entitlement generator 2300 communicates the events to all rules sets 2316 that have been deployed. The rules sets 2316 invoke a transformation in the generator 2300 that transforms the events to create entitlements and communicates the entitlements to the entitlements engines 16.
(129) In batch mode, the entitlement generator 2300 retrieves and stores relevant data from the databases 17, 18, 20, 22 and/or 23. Relevant data may include, for example, roles, teams, coverage attributes, etc. The entitlement generator 2300 creates a simulated batch event for each team relationship that was retrieved and stored and communicates the batch events to the relevant rules sets 2316. The rules sets 2316 invoke a transformation in the generator 2300 that creates an image of the entitlements. An entitlements comparator in the entitlement generator 2300 compares the image with actual entitlements and communicates any differences to the entitlements engines 16. The entitlement generator 2300 may operate in batch mode, for example, during an initial load when an application goes on line and entitlements need to be calculated, when a rule is changed, deleted, or added so that the impact of the change, deletion, or addition may be gauged, or during regular backups to make sure that no events are missed when the entitlement generator 2300 is operated in real-time mode.
(130) In various embodiments, the entitlement generator 2300 may utilize three types of rules. Business Entitlement Rules may define what entitlements are to be generated for different domains. The business entitlement rules may be implemented in, for example, the ILog JRules Business Action Language (BAL). Template Rules may define how the entitlements are generated. Template rules may be common across a number of domains and specify low level details such as actions to be taken in response to various source events. The template rules may provide a standard mapping between data from the organizational information system 14 and the entitlements engines 16. Execution Rules are auto-generated instances of template rules, customized with domain specific elements from business entitlement rules. The execution rules are executed by the entitlement generator 2300. The execution rules may be implemented in, for example, the ILog JRules IRL language.
(131) In various embodiments, the business entitlement rules and the execution rules may be expressed in terms of the following constructs:
(132) If <premise> then <consequence> [else <antecedent>]
(133) where,
(134) TABLE-US-00035 Premise Is the rule condition expression. The entitlement generator 2300 may create a decision tree consisting of the various conditions and optimize the evaluation of these conditions. When an object is inserted or removed in the working memory the condition nodes are evaluated to determine their outcome. Consequence Is the action taken if the condition evaluates to true. Consequences may have any kind of sequential statements within them (such as sequence, condition or iteration). These statements do not form further rules for the entitlement generator's 2300 environment but are statements to be executed in, for example, the entitlement generator's 2300 programming language or as Java commands. Antecedent Is the action taken if the condition evaluates to false. Priority Rules have a priority and all things being equal the rules with higher priority get a first chance at rule execution
(135) In various embodiments, rules may be created and deployed using the steps of (1) defining the template rules; (2) defining the business entitlement rules; (3) generating the execution rules; and (4) deploying the execution rules. The following example illustrates the different types of rules:
(136) TABLE-US-00036 Business Entitlement Rule: If the organizational unit has a role of Trade Allocation Risk Manager then the organizational unit may view trade Template Rule: when { ?sourceEvent: ISourceEvent( ); ?ruleResult:RuleResult( ); evaluate(!(?sourceEvent.predicateRemoveEvent( ))); } then { ?ruleResult.setSourceEvent(?sourceEvent); ?transformationService.transform(?sourceEvent, ?ruleResult, ?executionContext); ?context.retract(?sourceEvent); while (?sourceEvent.hasQueuedEvents( )) { ISourceEvent ?queuedEvent = (ISourceEvent) sourceEvent.dequeueExecutionEvent( ); ?context.insert(queuedEvent); } } Execution Rule: when { ?context: IlrContext( ) from ?context; ?sourceEvent: ISourceEvent( ); ?iOrgUnitRule: ISourceEvent( ); evaluate((!(?sourceEvent.predicateRemoveEvent( ))) && ((?iOrgUnitRule.predicateRole(“Trade Allocation Risk Manager”)))); } then { ?iOrgUnitRule.consequenceEntitlementAR(“View”, “Trade”); ?ruleResult.setSourceEvent(?sourceEvent); ?transformationService.transform(?sourceEvent, ?ruleResult, ?executionContext); ?context.retract(?sourceEvent); while (?sourceEvent.hasQueuedEvents( )) { ISourceEvent ?queuedEvent = (ISourceEvent) sourceEvent.dequeueExecutionEvent( ); ?context.insert(queuedEvent); } }
(137)
(138) In the example shown in
(139)
(140) A developer framework 2510 in the entitlement generator container 2306 may be implemented in, for example, Apache Struts. A presentation module 2512 may be, for example, a Java server page module that generates content (e.g., HTML pages, XML pages, etc.) in response to a user request. An authorization and entitlements module 2514 governs user access to various features of the portal 2302. A session management module 2516 keeps track of user activity across relating to the portal 2302. A SOAP framework 2518 is used to allow users to access the external systems 2314.
(141) The entitlement generator 2300 includes an event listener 2520 that acts as a subscriber to the transport mechanism 2312. An event filter 2522 filters out unwanted messages and sends such events to node 2524. An event processor 2526 converts input messages to, for example, a Java SourceEvent object. If the event processing in the event processor 2526 fails, an error handler 2528 may publish an error message to an error queue 2530. Successful execution of an event and successful end of processing for that event is indicated at 2531.
(142) A task router 2532 invokes multiple threads to invoke domain processors 2534 so that parallel execution may be achieved. Transformation services 2536 transform the rulesets 2316 to create entitlements. Event enrichment 2560 gathers additional information about the event that may be useful during execution of the event subsequently. A real-time event factory 2562 constructs, for example, a Java object implementing the ISourceEvent interface. The Java object encapsulates the input event and is used as an input to the rules engines 2590 to evaluate the rules. A batch reader 2564 reads the organizational information database 500 using, for example, a JDBC/stored procedure interface. A task manager 2566 maintains a list of tasks that can be invoked so that when a ruleset is deployed it is registered as a task in the task manager 2566. When it is needed to route the source event Java object the task router 2566 is supplied the list of tasks to which the source event must be routed to by the task manager 2566. An administrative service 2538 is an interface between a net administration client 2540 and the entitlement generator 2300. The service 2538 allows control of the event listener 2520 and allows rules to be deployed on the entitlement generator 2300.
(143)
(144) The team relationship processor 2626 reads more details regarding the team relationships and constructs Java event objects using a batch event factory 2628. The batch event objects also implement the ISourceEvent interface and thus appear, to the rules engines 2590, exactly like the source event objects created during real-time processing. The task router 2532 routes the batch event objects to the various domain processors 2534 which invoke the rules engine 2590 to execute the rules on the batch events
(145) The transformation service 2536 computes an image of entitlements in memory for the batch events. When all the team relationships in sandbox metadata 2592 have been processed an entitlement comparator 2594 compares the computed entitlement image 2596 against the existing entitlements 2598 (if any) read from the entitlement instances. The comparator 2594 then computes any deltas that are aimed to correct any differences in the existing entitlements from the computed entitlements. A delta writer 2597 forms commands to an entitlements API and executes the commands, which serve to correct any differences in the existing entitlements 2598 from the computed entitlements 2596.
(146)
(147) The term “computer-readable medium” as used herein may include, for example, magnetic and optical memory devices such as diskettes, compact discs of both read-only and writeable varieties, optical disk drives, and hard disk drives. A computer-readable medium may also include memory storage that can be physical, virtual, permanent, temporary, semi-permanent and/or semi-temporary. A computer-readable medium may further include one or more data signals transmitted on one or more carrier waves.
(148) The various portions and components of various embodiments of the present invention can be implemented in computer software code using, for example, Visual Basic, C, or C++ computer languages using, for example, object-oriented techniques.
(149) While several embodiments of the invention have been described, it should be apparent, however, that various modifications, alterations and adaptations to those embodiments may occur to individuals skilled in the art with the attainment of some or all of the advantages of the present invention. It is therefore intended to cover all such modifications, alterations and adaptations without departing from the scope and spirit of the present invention as defined by the appended claims.