Secured Entities - ACS - Reference Guides

ACS Installation and Administration Guide

Product
ACS
AFS_Version
7.11
Category
Reference Guides
language
English
audience
public

In CKS, a security process can be applied on secured entities.

Some resources in CKS require an access control process. The process defines the actions allowed on the resources. The access control depends on three components: rights, profiles, and permissions.

The entities covered by the access control process are secured entities. They mainly involve members and data.

By extension, the web services used to handle secured entities lists (for example users lists or folders lists) are also protected.