Optiva combines user security with object security
This example shows the interrelationship of security mechanisms.
Optiva compares the object security (owner, group, and role) with the current user, user’s group, and user’s role. Then, the most secure access is granted.
- 15=Read/Copy/Write/Delete
- 7=Read/Copy/Write
- 3=Read/Copy
- 0=No Access
In this example, the
USER
is
MJONES
. This user belongs to the
JUICE
group. The user is not the owner of the object and
does not belong to the
SODA
group. The user’s role security is compared to the
object’s role security. The tightest security applies. Therefore, the user’s
security for this object is 3.