Previous Topic: Defining Access Permissions]Next Topic: Rule Evaluation


Access Determination

When a user attempts to access an asset, Security Management looks at all rules associated with the user to find the ones that apply to the access in question. Security Management only considers rules that match the asset type, asset name, asset node, access mode, and any conditions determined by a calendar or criteria profile. If several permission rules match an asset name, the rule with the best fit (closest match to asset name) is used, and an access type DENY overrides LOG, which overrides PERMIT.

For step‑by‑step procedures to define your access permissions, see the following topics in the online CA Procedures: