Access Constraints

  • Read, Modify, List, Change-access-policy, Delete
  • The server may define its own additional constraints.
  • Behavior of predefined constraints is only suggested. The server determines what to really do.

[Next]