What is a list of access management?

Access control list (ACL) is an attachment to a file, directory, or other object that provides information about the rights associated with the object. If there is no list of access management, someone can communicate with the object and do something about it. However, if the list is present, access and activities are limited to people on the list and the capabilities of individual users can be limited to different levels.

The list can specify users, roles or groups. Users are individual users who are registered in the system such as an office network. The roles are titles that are assigned to people. For example, the user may have the role of a "system manager". When the access list of access limits access to certain roles, only people in these roles will be able to manipulate the object. Groups are collections of users registered together, such as the "Secretarial Fund". This can be myna security level and can also prevent mistakes. For example, system administrators can limit access toKey system files so that people who are not experienced do not change these files randomly, remove or move and cause a problem. Similarly, the file could only be read except for one user to ensure that if other people in the network approach the file, they cannot make changes to it.

Using a security control list for security is part of security based on abilities in which the security layers are provided by tokens provided by the system users. The token provides information about the user authority and is associated with permissions to determine whether the user is entitled to make the option. This security method allows security at a highly flexible level, as individual files and directory may have different permissions.

Access control list is only as good as security of individual identities in the network. If people do not use hEsla or do not use weak passwords, can be carried away by their identity and used in the system. If the system is penetrated with keyboard logger or similar malware, it can also be endangered and allows the unauthorized person to enter the system. Therefore, security is organized in layers, so weakness in one area does not reduce the entire system.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?