CUSTOMIZABLE SECONDARY VERIFICATION IN A MULTI-TENANT SYSTEM
Techniques are disclosed relating to verifying access to functions in a multi-tenant computer system. In various embodiments, a multi-tenant computer system may store code that is executable to perform a plurality of functions, where at least one of the plurality of functions may be a restricted fun...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Techniques are disclosed relating to verifying access to functions in a multi-tenant computer system. In various embodiments, a multi-tenant computer system may store code that is executable to perform a plurality of functions, where at least one of the plurality of functions may be a restricted function. The multi-tenant computer system may further store first and second tenant-specific definitions for the restricted function that specify different secondary verification procedures. In various embodiments, the disclosed systems and methods may facilitate verifying access to the restricted function in the multi-tenant computer system. For example, in some embodiments, the multi-tenant computer system may perform an initial verification procedure and cause initiation of a secondary verification procedure specified by the first tenant in response to an attempt by a user of the first tenant to access the restricted function. |
---|