The Access Control Process

Now that you are familiar with users, groups, and permissions, take another look at the access control process. The access control process examines a request for access and grants or denies access. The following steps take place:

1.
Resource access is requested.
2.
The Security Reference Monitor compares the contents in the access token one at a time to see if there is any match between the SIDs in the token and those in the ACL on the object. Access is allowed or denied based on the results.
3.
If a match is found, the Allow or Deny information in this access control entry is compared to the requested access. If there is an Allow match, then the access is granted.
4.
If there is a Deny match, then access is denied, and ...

Get Windows Server 2003 Security: A Technical Reference now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.