Implementation of a network security policy
Controlling user and group participation in the domain and applying rules to resources that require protection determine the security policy for a domain. These rules are defined by access control lists (ACLs), protected object policies (POPs), and authorization rules.
The authorization service enforces these policies by matching the credentials of a user with the permissions in the policy assigned to the requested resource. The resulting recommendation is passed to the resource manager, which completes the response to the original request.
- Define and apply security policy
We can protect system resources by defining a security policy. You define a security policy with access control lists (ACLs), protected object policies (POPs), and authorization rules. You apply the security policy to the object representations of those resources in the object space.- The authorization process: step-by-step
This example illustrates how the authorization process works.
Parent topic: Security Verify Access overview