If The Product Supports Access Control Based On Defined Rules What Is The Granul

If the product supports access control based on defined rules, what is the granularity of the rules supported: access control per user, group, or role? What attributes or conditions of access are supported (e.g., type of transaction performed, time frame/frequency of transaction type, or physical/IP address origination)? Can the product limit specific transaction types (execution, creation, reading, writing, deletion and renaming) for a particular file or device types system wide or on selected components? Where is integration requiredfor example, types of applications, operating systems, etc.?

Leave a Reply

Your email address will not be published. Required fields are marked *