Page created: 6 Nov 2019
|
Page updated: 25 Mar 2020
This section provides a set of examples that demonstrate access controls that are commonly
used in your environment. Note that to be able to alter access control definitions in the
server, a user must have the modify-acl
privilege as discussed later in this
chapter.