Effective Permissions; Calculating Effective Permissions; Effective Permissions Algorithm - HP BB118BV - StorageWorks Data Protector Express Package User Manual

Hp data protector express user's guide and technical reference (bb116-90040, february 2007)
Hide thumbs Also See for BB118BV - StorageWorks Data Protector Express Package:
Table of Contents

Advertisement

Effective Permissions

Data Protector Express ensures the security of the catalog and network by calculating the effective
permissions a user has to an object and using these permissions to determine what actions that user can
perform.
The current user's effective permissions to an object are displayed on the General page of the object's
property page. The Effective permissions box shows the current user's effective permissions to the
object.
A user is assigned effective permissions to an object in one of two ways, either through direct
permissions or through inherited permissions.
A user has direct permissions to an object if they are listed on the Permissions page of the object, if they
are equivalent to a user who has direct permissions to the object; or if they are a member of a group that is
listed on the Permissions page of that object. Note that a user can gain permissions from any combination
of these.
A user has inherited permissions to an object if (1) they do not have direct permission and (2) they have
effective permissions to the container that contains the object. This means that, if you do not have direct
permissions to an object, you must have effective permissions to the container in which the object is
stored.
Your effective permissions to the container object can be either direct or inherited permissions. All
that matters is that you have effective permissions to the container.
When Data Protector Express determines the effective permissions a user has to an object, it first looks to
see if the user has direct permission; if not, Data Protector Express then checks to see if the user has
inherited permission.
Data Protector Express uses the following algorithm to determine effective permissions:
Does the user have direct permissions to the object? If yes, these are used to calculate the effective
permissions. Data Protector Express does not check to see if the user has inherited permissions.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Storageworks data protector express

Table of Contents