Browse Prior Art Database

Identification of modifications performed by a person working with elevated privileges

IP.com Disclosure Number: IPCOM000236602D
Publication Date: 2014-May-05
Document File: 1 page(s) / 20K

Publishing Venue

The IP.com Prior Art Database

Abstract

A method for identification of modifications performed by a person working with elevated privileges is disclosed.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 51% of the total text.

Page 01 of 1

Identification of modifications performed by a person working with elevated privileges

Disclosed is a method for identification of modifications performed by a person working with elevated privileges.

Users may become confused when they see that data has been changed by either a person they are unfamiliar with or by a person who does not appear to have the rights to do the change. By clearly identifying that the changes were made by "X as Administrator" users will be able to determine from the application's help resources why the person was able to make changes. In many applications, the person who last made changes to some data or container object is rendered in the user interface. People who normally add or change data are members of the collaboration space.

In some systems some users are given privileges to change data even though they have not been explicitly assigned access to the data. These privileges are granted to users who have been given a particular role - say Administrator - in the application. Typically, this delegation of Administrator privileges is provided so users familiar with the application can make appropriate edits and configuration changes (as they would be more familiar with making these changes than a member of the deployment's administration staff).

Further, when the application is hosted, administrators from the hosting site are given privileges to change data via Administration interfaces, even though they may not have privileges to access the applications through any other interfaces (say via a Web UI). For example, the hosting administrator may invoke a "User...