2.5 Use Cases
The following table lists the use cases that span the functionality of the authorization protocols. The use cases were grouped based on authorization models.
Use case group |
Use cases |
---|---|
DAC model: File server |
Check Simple Access (section 2.5.1.1.2) Check ACL Inheritance Access (section 2.5.1.1.3) Check Conditional ACEs-Based Access (section 2.5.1.1.4) Check Claims-Based Access (section 2.5.1.1.5) |
DAC model: Active Directory |
Check Simple Access (section 2.5.1.2.2) Check Object-Specific Access (section 2.5.1.2.3) Control Access Right-Based Access (section 2.5.1.2.4) Control Validated Write-Based Access (section 2.5.1.2.5) Check Object Visibility (section 2.5.1.2.6) |
AzMan RBAC model |
Verify Authorization (section 2.5.2.1) |