HP BB118BV - StorageWorks Data Protector Express Package User's Manual & Technical Reference page 266

Data protector express user's guide and technical reference (bb116-90089, september 2008)
Hide thumbs Also See for BB118BV - StorageWorks Data Protector Express Package:
Table of Contents

Advertisement

When Data Protector Express determines the effective permissions a user has to an object, it first looks
to see if the user has direct permission; if not, Data Protector Express then checks to see if the user has
inherited permission.
Effective permissions algorithm
effective permissions:
Does the user have direct permissions to the object? If yes, these are used to calculate the effective
permissions. Data Protector Express does not check to see if the user has inherited permissions.
Does the user have effective permissions to the container that contains the current object (inherited
permissions)? If yes, these permissions are used to calculate the effective permissions. If not, then
the user does not have effective permissions to the object.
Permissions from multiple sources
result of equivalencies or as members of a group. When the direct permissions result from multiple
sources, Data Protector Express uses all of the sources to determine the permissions.
Consider the following example: The Admin user has direct permissions to Read and Write to a folder called
My Backup Folder; Admin is also a member of a group that has direct permissions to Modify to the
folder. As a result, his effective permissions are Read, Write and Modify.
Examples of effective permissions
The following six examples illustrate how effective permissions are calculated. The diagram below
illustrates these six examples.
266
Managing the Storage Domain
Data Protector Express uses the following algorithm to determine
Users can gain direct permissions to objects either as users, as a

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Data protector express

Table of Contents