Broad Access (Erl, Naserpour)
How can cloud services be made accessible to a diverse range of cloud service consumers?
ProblemCloud consumers may require access to a cloud service via cloud service consumer devices, protocols or data formats that the cloud service is not designed to support.
SolutionRuntime mapping logic is incorporated to transform data exchanges between the cloud service and different cloud service consumers.
ApplicationThe mapping logic is added to the cloud service logic or positioned separately, within a multi-device broker mechanism that transforms data exchanged between the cloud service consumer and the cloud service.
Compound PatternsBurst In, Burst Out to Private Cloud, Burst Out to Public Cloud, Cloud Authentication and Access Management, Elastic Environment, Infrastructure-as-a-Service (IaaS), Multitenant Environment, Platform-as-a-Service (PaaS), Private Cloud, Public Cloud, Resilient Environment, Secure Burst Out to Private Cloud/Public Cloud, Software-as-a-Service (SaaS)
A cloud service containing runtime mapping logic is implemented (1) and made available to different kinds of cloud service consumer devices (2).
NIST Reference Architecture Mapping
This pattern relates to the highlighted parts of the NIST reference architecture, as follows: