Page created: 22 Jul 2020
|
Page updated: 12 Dec 2022
This section provides a set of examples that demonstrate access controls that are commonly
used in your environment. Note that to be able to alter access control definitions in the
server, a user must have the modify-acl
privilege as discussed later in
this chapter.