2.5 Use Cases

The following table lists the use cases that span the functionality of the authorization protocols. The use cases were grouped based on authorization models.

Use case group

Use cases

DAC model: File server

Check Simple Access (section 2.5.1.1.2)

Check ACL Inheritance Access (section 2.5.1.1.3)

Check Conditional ACEs-Based Access (section 2.5.1.1.4)

Check Claims-Based Access (section 2.5.1.1.5)

DAC model: Active Directory

Check Simple Access (section 2.5.1.2.2)

Check Object-Specific Access (section 2.5.1.2.3)

Control Access Right-Based Access (section 2.5.1.2.4)

Control Validated Write-Based Access (section 2.5.1.2.5)

Check Object Visibility (section 2.5.1.2.6)

AzMan RBAC model

Verify Authorization (section 2.5.2.1)