what are Acls

Answer Posted / harshvir singh

An ACL controls access to packages, folders, and other
elements (such as services, IS document types, and
specifications) at the group level. An ACL identifies
groups of users that are allowed to access an element
(Allowed Groups) and/or groups that are not allowed to
access an element (Denied Groups). When identifying Allowed
Groups and Denied Groups, you select from groups that you
have defined previously.

There are four different kinds of access: List, Read, Write
and Execute.
List
-> List controls whether a user sees the existence of an
element and its metadata; that is, its input and output,
settings, and ACL permissions. The element will be
displayed on screens in the Developer and the Integration
Server Administrator.
Read
-> Read controls whether a user can view the source code
and metadata of an element.
Write
-> Write controls whether a user can update an element.
This access also controls whether a user can lock, rename
or delte an element or assign an ACL to it.
Execute
-> Execute controls whether a user can execute a service.

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

what are different phase of SDLC in a banking domain development ?

5186


Anybody can suggest me How to Delete our a/c details in Naukri.com completely..... Thanks in advance

2842


What are the benefits of pub sub model?

2539


where is the document stored when u recieve from the client

1800


How to create a directory using external command activity in bw? Can you please tell the cmd?

637






How to delete Local Area Network Connection #2

3221


What is the differnce between loop and repeat

1923


Explain me about the most complex scenario you have faced in in sap xi.? can any one give me the answer for this type of questions.

2944


what is Negotiation?

2049


How to delete session logs on is?

649


what are the dis advantages of pub sub model

5463


Sir, we are using Linux fedora core 5 as Proxy server in our Engineering college we have proble with IP conflict There are 200 windows 2000 OS Clients in our network at diffrent places.Now we want to assign internet using MAC Address of these systems for windows Clients and theres. Please give me a full details of that matter with some more websites concerned to that. Abdul Hadi Gudlavalleru Engineering Collge Krishna Dt. A.P India Cell:9393922382

1963


How can try and catch block can be implemented using web methods developer?

628


Plz send me RECRUITMENT OF NALCO GET-2007 sample questions and answers

1771


what kind of interview questions are asked for BA IT banking Domain ??

8241