Static Inheritance (cont.)
Static inheritance from user or group identity?
Static inheritance from other access control mechanisms?
If static inheritance from multiple sources is supported, how are conflicts avoided or resolved?
Previous slide
Next slide
Back to first slide
View graphic version