A predefined set of permissions and rights assigned to user accounts is often called the terms of service or service terms. Although they are virtually everywhere they are largely ignored.
User Group
fqon
Administrator
Security groups Used with care, security groups provide an efficient way to assign access to resources on your network. Using security groups, you can: Assign user rights to security groups in Active Directory User rights are assigned to security groups to determine what members of that group can do within the scope of a domain (or forest). User rights are automatically assigned to some security groups at the time Active Directory is installed to help administrators define a person's administrative role in the domain. For example, a user who is added to the Backup Operators group in Active Directory has the ability to backup and restore files and directories located on each domain controller in the domain. This is possible because by default, the user rights Back up files and directories and Restore files and directories are automatically assigned to the Backup Operators group. Therefore, members of this group inherit the user rights assigned to that group. For more information about user rights, see User rights. For more information about the user rights assigned to security groups, see Default groups. You can assign user rights to security groups, using Group Policy, to help delegate specific tasks. You should always use discretion when assigning delegated tasks because an untrained user assigned too many rights on a security group can potentially cause significant harm to your network. For more information, see Delegating administration. For more information about assigning user rights to groups, see Assign user rights to a group in Active Directory. Assign permissions to security groups on resources Permissions should not be confused with user rights. Permissions are assigned to the security group on the shared resource. Permissions determine who can access the resource and the level of access, such as Full Control. Some permissions set on domain objects are automatically assigned to allow various levels of access to default security groups such as the Account Operators group or the Domain Admins group. For more information about permissions, see Access control in Active Directory. Security groups are listed in DACLs that define permissions on resources and objects. When assigning permissions for resources (file shares, printers, and so on), administrators should assign those permissions to a security group rather than to individual users. The permissions are assigned once to the group, instead of several times to each individual user. Each account added to a group receives the rights assigned to that group in Active Directory and the permissions defined for that group at the resource. Like distribution groups, security groups can also be used as an e-mail entity. Sending an e-mail message to the group sends the message to all the members of the group.
Rights has have been Assigned assigned.
In a data dictionary, elements used for user permissions typically include roles, groups, or individual users. Each element is assigned specific access rights to data or functionality based on their role or permissions level, enabling control over who can view, edit, or delete data within the system. These elements help ensure proper data security and adherence to permissions policies across an organization.
security tab
CSA
A UID (User ID) number is a unique numerical identifier assigned to each user in a Unix-based operating system. It is used by the system to distinguish between different users and manage their permissions and access rights. Each user on the system is assigned a unique UID number.
When you are assigning a user's rights, it is dependent upon their job needs.Reference:CompTIA A+ Guide to Managing and Maintaining Your PC Seventh edition p994
Least privilege
Technically, there is none. Different groups for accounts can be created based on the type of permissions they have. User accounts are then assigned to one or more of these accounts based on what permissions the system administrator wants them to have. There is a group called "admin", but it does not work in the same way as the Administrator group. People sometimes cite that the "root" account is the equivalent, but this is incorrect. The root account is never used directly on a properly-designed Linux system. Users in the "admin" group can perform tasks with root permissions, but they must enter credentials whenever they need to do so; Administrators in Windows do not.