Optiva combines user security with object security
This example shows the interrelationship of security mechanisms.

Optiva compares the object security (owner, group, and role) with the current user, user’s group, and user’s role. Then, the most secure access is granted.
- 15=Read/Copy/Write/Delete
- 7=Read/Copy/Write
- 3=Read/Copy
- 0=No Access
In this example, the USER
is MJONES
. This user belongs to the JUICE
group. The user is not the owner of the object and does not belong to the SODA
group. The user’s role security is compared to the object’s role security. The tightest security applies. Therefore, the user’s security for this object is 3.
