Access Constraints
Read, Modify, List, Change-access-policy, Delete
The server may define its own additional constraints.
Behavior of predefined constraints is only suggested. The server determines what to really do.
[Next]