Access Control

  • In this HowTo, we take a closer look at the visibility parameters of the shared resources:

    what they are how to enable them and a few use cases Cells ownership



  • This chapter presents some real-life use cases of the ACL feature. At the bottom of the page, you can find a more complete glossary.

    For a deeper understanding on how Security Policy work you might also refer to the corresponding section...