Previous Topic: Cache Tables

Next Topic: Bypass Tables

Protected Resource Tables

When CA Access Control intercepts an authorization request, it checks if the resource to which access is requested is listed in the protected resource tables in the kernel.

If the resource is listed in the protected resource tables, CA Access Control always sends an authorization request to the CA Access Control engine. If the resource is not listed in the protected resource table, CA Access Control may not send an authorization request to the engine but instead resolve the access request in the kernel.