Understanding the Access List Control based Security Model

With the Access Control list based security model the users are given access to the system objects based on the role played by them in the network.

Users are assigned different roles based on the hierarchy and the level of the user in a particular organization or a project. Based on this role the permissions are given for them to access a particular resource. For example the role like ‘graphic designer’ might have access to a particular folder in a project where that user can edit the images and other media files in that folder.

The other users like ‘developer’ or ‘coder’ might have access only to the folders that have coding files. Such type of access control list based security model is available in the operating systems like Windows. With an access control list editor you can edit the roles of a particular user or the permissions allowed for a particular role. Editing the access control list in the command line is also possible with the command CACLS.


Recommended Resource

| What is an Access Control List?| Access Denied by Access Control List' error message | Understanding Access Control List (ACL) | Editing Access Control List (ACL) | Understanding the Access List Control based Security Model | Tutorial on using Access Control List | Understanding Access Control List with some Examples | Understanding Squid Access Control List | What is the use of an Access Control List | Understanding Java Access Control List ( Java ACL ) |


“Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates.”

| Privacy Policy for www.dotnet-guide.com | Disclosure | Contact |

Copyright - © 2004 - 2024 - All Rights Reserved.