Patent application number | Description | Published |
20120042010 | MANAGEMENT OF COLLECTIONS OF WEBSITES - This disclosure describes techniques that enable a subscriber of a data center to manage a site collection group hosted by the data center. A site collection group is a set of site collections that belong to a single subscriber. A site collection is a collection of websites. A website is a collection of related resources. Each of the site collections is associated with an “owner”. As described herein, the data center presents management interfaces that enable owners of site collections to manage the site collections. In addition, the data center presents management interfaces that enable subscribers to manage architectural aspects of their site collection groups. | 02-16-2012 |
20120159601 | Transition from WS-Federation Passive Profile to Active Profile - A server system sends a first credential request to a passive requestor at a client device. After sending the first credential request, the server system receives a credential for a user of the client device. If the credential is valid, the server system can provide the passive requestor with access to a resource provided by the server system. After providing the passive requestor with access to the resource, the server system provides an active requestor at the client device with access to the resource without sending a second credential request to the active requestor. Consequently, it may not be necessary for a user of the client device to provide credentials twice in order for the passive requestor and the active requestor to access the resource. | 06-21-2012 |
20120291009 | Web Service Proxy Interface Augmentation - In a web application platform context, web service proxy interface augmentation is provided without undue loss of customization capabilities. After obtaining an address of a web service endpoint, sending a metadata query to the endpoint, and extracting operational information from the response, a contract is generated in the form of an interface. The interface does not rely on non-contract programming constructs. A file containing the interface is added to a project in an integrated development environment (IDE). From a developer perspective, the IDE displays service application(s) of a server farm identified by the developer. The developer selects a service application and receives a list of web service endpoint(s). After choosing an endpoint, the developer receives an automatically generated interface containing operational information for an operation exposed by the web service endpoint. The developer also creates in the IDE a web proxy project item that includes the interface. | 11-15-2012 |
20130145427 | AUTHORIZING APPLICATION ACCESS TO SECURE RESOURCES - An application submits a permission request to a resource server. In response to receiving the request, the resource server generates a user interface that asks the user to grant or deny the requested permissions. If the permissions are granted, data is stored indicating that the application has the requested permissions. When a runtime request for a resource is received, the resource server determines whether the request has been made by a user, by an application, or by an application on behalf of a user. If the request is made by an application only, the request is granted only if the application has permission to access the resource by way of a direct call not on behalf of a user. If the request is made by an application on behalf of a user, the request is granted only if both the user and the application have sufficient permission. | 06-06-2013 |
20140373101 | SENDING SESSION TOKENS THROUGH PASSIVE CLIENTS - A session token can be requested to be sent to a first computing service from a second computing service, and a first computing service can receive the requested session token from the second computing service. The first computing service can send a message that includes the session token through a passive client to the second computing service. The second computing service can receive the message that includes the session token from the passive client, and the second computing service can verify that the message is valid. This verification of the validity of the message can include verifying that the session token received back from the passive client matches the session token the second computing service sent to the first computing service. | 12-18-2014 |
20160140139 | LOCAL REPRESENTATION OF SHARED FILES IN DISPARATE LOCATIONS - A mount point folder in a collaborative service library may reference contents of a mounted folder that resides elsewhere and includes actual files. File operations may be performed on files inside the mounted folder that may actually live across domains and changes to the contents of either folder may appear in the other. The mount point folder may be represented on the server as a file with .url extensions but in the client user experience, it may be represented as a folder. Mount point folders may be created at a root of a document library or within any other folder of the document library. | 05-19-2016 |