answersLogoWhite

0

You can control an ASPnet page to where only users can access it by going to the white list. This regulates the access to only users assigned by the administrator.

User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

You are designing network access control so that remote users are limited to accessing the network during normal business hours only. Policies regarding user access apply to all users.?

Rule-based Access Control


What is RBACL?

RBACL stands for a role-based access control list. It is a way to restrict access to a system or computer network to authorized users only. You can assign users specific roles using RBACL.


What is identity and access management used for?

Identity and Access Management (IAM) helps businesses control who can access their systems and data. It allows organizations to set permissions for individual users, deciding what information they can see and what actions they can perform with it—enhancing security and reducing risks.


Which type of permission should you set to control access to files and folders by local and network users?

NTFS on NTFS volumes only


Which of th following is a type of access control that provides access rights assigned to roles and then accounts assigned to these roles?

The type of access control you are referring to is Role-Based Access Control (RBAC). In RBAC, permissions are assigned to roles rather than individual users, allowing accounts to inherit access rights based on their assigned roles. This approach simplifies management and enhances security by ensuring that users only have access to the information necessary for their job functions.


Which characteristic of information is guarded by access control?

Access control primarily guards the confidentiality of information. It ensures that only authorized individuals have the ability to view or access sensitive data, protecting it from unauthorized disclosure. Additionally, access control can also support integrity and availability by regulating who can modify or delete information and ensuring that resources are available only to legitimate users.


Which group has read-write access only on its own folders read-only access to most system folders and no access to other users data?

Limited Users


What are some ways to implement controlled access?

Implementing access control is a very important aspect for any system. It will insure that only authorized users can access the system. To do it you must go through authorization and authentication.


What is access control entity?

An access control entity refers to any component within a system that manages and enforces policies regarding who can access specific resources or data. This can include users, groups, roles, and permissions that define the level of access granted. Access control entities work together to ensure that only authorized individuals can interact with sensitive information or systems, thereby enhancing security and compliance.


Categories of users of DBMS?

In DBMS you can have users who have only select access or with only select+update+insert access or with select+update+insert+delete access. These users may or may not be granted permissions to alter the table schema. Also you can have administrators who can create/modify/delete tables


What Preventing a system from providing resources or services to the intended authorized clients is a definition for and?

The definition refers to "Access Control," which is a security measure that restricts access to resources and services to only those users who have the necessary permissions. It ensures that unauthorized users cannot obtain or manipulate sensitive information, thereby protecting the integrity and confidentiality of the system. Access control mechanisms include authentication, authorization, and auditing processes to enforce these restrictions.


How do you identify the ways could authorize users on a system?

allowing a resources owner to add new users to an ACL assigning credential levels to users and resources to ensure only users with appropriate credentials can access a resource assigning roles to users that determine the resources they can access