What is the approach token?
In computer operating systems and other software frames, the access token is any data structure that contains the safety information necessary for access to a secure object or other process that requires authorization. Secured objects are usually data in the file system with defined read and write permissions, and the process is any other program or service that requires authorization to access its functions. While the access token is simply a container capable of holding any information, it is usually used to store user permissions.
The access token concept was primarily conceived and used by Microsoft® operating systems, but their usefulness has transferred them elsewhere. The Application Programming Interface (API) for Google describes the method for using access tokens when programming applications that need access to data associated with Google Account. Some of the large platforms of social networks also usedAccess tokens in their API. Any processes - such as applications, programs or services - that the user bases, will bring the access token with it. Thus, the access token must store several bits of data checking another program or objects against accessing access.
Access tokens contain security identifiers (SID), usually numerical codes, for users, any groups of users to which the user belongs, and the current login session. The token also contains a list of all permissions that the user or group is allowed. There are several different types of access tokens, so the token must also identify its type, soalready primary or pretense. The approach access token is a standard type used, but can also be created a preliminary token to act on the user's name.
When the access token is called to perform its work, it encounters a security reference monitor (SRM), a service that monitors access to objects and processes in the system. SRM pulls out the object security descriptor or process for comparison with the access token. The security descriptor contains a list of access control (ACL) where each access control (ACE) defines certain permissions for this object or process. For example, in the case in the system, the system contains a security description of information on which users or groups have permission to read or write to the file. If the access token requiring access to opening or editing, the file does not correspond to the permissions in the Security descriptor, fails to access and the user is denied access to the file.