Abstract:
In one aspect, just-in-time authentication is provided to assist an administrator or staff of an IT service end user to invoke a function call to a service. The just-time-authentication can provide on-the-fly authentication to the service. In another aspect, granular permissions in executing a task or tasks for a service is enabled for a given administrator or staff of an IT service end user. In some embodiments, the granular permission involves assigning permissions to users either directly or indirectly via a mediating abstraction (such as groups, roles, etc.). Still in another aspect, stateful execution of a command/function call to a service is provided. In the stateful execution, the command/function call to the service is associated with a key, which can comprise a session id, a function name, a count of function executions for current session, and hash of input parameters for the command/function call, and/or any other information.
Abstract:
Systems, methods, and apparatuses can provide staged migration from one or more user accounts from a source system to a destination system using an application local to the source systems. The automated staged data migration can provide coordinated staged data migration of large amounts of data in a single automated process. The system can provide automated and remotely controlled staged migrations of data that may perform source system type detection and work with multiple types of systems.
Abstract:
In one aspect, just-in-time authentication is provided to assist an administrator or staff of an IT service end user to invoke a function call to a service. The just-time-authentication can provide on-the-fly authentication to the service. In another aspect, granular permissions in executing a task or tasks for a service is enabled for a given administrator or staff of an IT service end user. In some embodiments, the granular permission involves assigning permissions to users either directly or indirectly via a mediating abstraction (such as groups, roles, etc.). Still in another aspect, stateful execution of a command/function call to a service is provided. In the stateful execution, the command/function call to the service is associated with a key, which can comprise a session id, a function name, a count of function executions for current session, and hash of input parameters for the command/function call, and/or any other information.
Abstract:
Systems and methods are provided for automatically configuring an email client during a migration process. An client-side assistant can be deployed to an end-user's computer via a migration platform. After being deployed to a particular client computer, the client-side assistant can be configured to obtain user information to identify the end-user associated with the client computer. After identifying the end-user, destination system information regarding the end-user can be pushed to client computer for inclusion in new configuration information for the email client. Before generating the new configuration information, user credential for logging into the source system can be obtained. The client-side assistant can be configured to cause the destination system to confirm this credential. After generating the new configuration information, the client-side assistant can instruct the client-side assistant to use the new configuration information to at a specific time and date.
Abstract:
Systems, methods, and apparatuses can provide staged migration from one or more user accounts from a source system to a destination system using an application local to the source systems. The automated staged data migration can provide coordinated staged data migration of large amounts of data in a single automated process. The system can provide automated and remotely controlled staged migrations of data that may perform source system type detection and work with multiple types of systems.
Abstract:
Systems, methods, and apparatuses can provide staged migration from one or more user accounts from a source system to a destination system using an application local to the source systems. The automated staged data migration can provide coordinated staged data migration of large amounts of data in a single automated process. The system can provide automated and remotely controlled staged migrations of data that may perform source system type detection and work with multiple types of systems.
Abstract:
In one aspect of the present disclosure, activities of users within an IT service end user are recorded. A given record of a user activity may include an output of a command executed by the user, and execution information, input parameter(s) to the command, output of the command, and/or any other type of execution information. In implementations, intelligence may be built into a proxy module corresponding to the command to track an execution of the command started by the user. The execution of the command is captured and stored in a buffer such that another user within the IT service end user can review the execution of the command. In another aspect, user interfaces are provided to facilitate a user within an IT service end user to review activities in administering IT services by another user within the IT service end user.
Abstract:
An information retrieval method for cloud service administration is provided. The method may include establishing a connection with a semantic database. In some embodiments, the semantic database is configured to store information for different cloud services, and the information includes information regarding a first cloud service and information regarding a second cloud service. In some embodiments, the information regarding the first cloud service includes a first entity information and the information regarding the second cloud service includes a second entity information. The method further includes transmitting to the semantic database a request to obtain information regarding an asset. Then the method may include receiving from the semantic database an indication that first entity information and the second entity information being linked and being both related to the asset.
Abstract:
A backup, search, and restore service is provided. The service can be achieved through a backup system, and a search and restore server. A user can be enabled to initiate a search request for one or more data items. A search can be performed by the search and restore server using metadata for the data items backed up by the backup system to return the one or more data items. The metadata for the data items can be generated by the backup system when data items are backed up by the backup system. The backup system may back up the data items on an incremental basis. The user can be enabled to select a data item in the one or more data items for restoration on the data system. Header information of the selected data item can be obtained from the data system to determine whether the restoration is necessary.
Abstract:
In one aspect of the present disclosure, activities of users within an IT service end user are recorded. A given record of a user activity may include an output of a command executed by the user, and execution information, input parameter(s) to the command, output of the command, and/or any other type of execution information. In implementations, intelligence may be built into a proxy module corresponding to the command to track an execution of the command started by the user. The execution of the command is captured and stored in a buffer such that another user within the IT service end user can review the execution of the command. In another aspect, user interfaces are provided to facilitate a user within an IT service end user to review activities in administering IT services by another user within the IT service end user.