Understanding
the Access List Control based Security Model
With
the Access Control list based security model the users are given access to the
system objects based on the role played by them in the network.
Users
are assigned different roles based on the hierarchy and the level of the user
in a particular organization or a project. Based on this role the permissions
are given for them to access a particular resource. For example the role like
graphic designer might have access to a particular folder in a project
where that user can edit the images and other media files in that folder.
The
other users like developer or coder might have access
only to the folders that have coding files. Such type of access control list based
security model is available in the operating systems like Windows. With an access
control list editor you can edit the roles of a particular user or the permissions
allowed for a particular role. Editing the access control list in the command
line is also possible with the command CACLS.