Effective Permissions - HP BB118BV - StorageWorks Data Protector Express Package User's Manual & Technical Reference

Data protector express user's guide and technical reference (bb116-90089, september 2008)
Hide thumbs Also See for BB118BV - StorageWorks Data Protector Express Package:
Table of Contents

Advertisement

NOTE:
The permissions granted from this page, like all permissions, are reciprocal. Changes made on this page
appear on the property pages of the corresponding object.
For example, if you grant permission to a folder to a group, the Permissions page of that folder will list the
group, along with the appropriate corresponding permissions.

Effective Permissions

Data Protector Express ensures the security of the catalog and network by calculating the effective
permissions a user has to an object and using these permissions to determine what actions that user
can perform.
The current user's effective permissions to an object are displayed on the General page of the object's
property page. The Effective permissions box shows the current user's effective permissions to the object.
Calculating effective permissions
A user is assigned effective permissions to an object in one of two ways, either through direct permissions
or through inherited permissions.
A user has direct permissions to an object if they are listed on the Permissions page of the object, if they
are equivalent to a user who has direct permissions to the object; or if they are a member of a group that
is listed on the Permissions page of that object.
NOTE:
A user can gain permissions from any combination of these.
A user has inherited permissions to an object if (1) they do not have direct permission and (2) they have
effective permissions to the container that contains the object. This means that, if you do not have direct
permissions to an object, you must have effective permissions to the container in which the object is stored.
NOTE:
Your effective permissions to the container object can be either direct or inherited permissions. All that
matters is that you have effective permissions to the container.
Figure 160 Effective permissions
User's Guide and Technical Reference
265

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Data protector express

Table of Contents