Page created: 4 Feb 2020
|
Page updated: 22 Jul 2020
This section provides a set of examples that demonstrate access controls that are commonly
used in your environment. Note that to be able to alter access control definitions in the
server, a user must have the modify-acl
privilege as discussed later in this
chapter.