This section describes the most important differences in access control evaluation between Oracle and the Server. Related linksOverview of access controlAccess token validatorsWorking with targetsExamples of common access control rulesValidating ACIs before migrating dataWorking with privileges