Hi,
I've read several notes in this forum regarding user permissions.
The questions have been various as the responses. Obviously there are
many security/permission schemes that can be implemented depending
upon the desired effect and or results. Therefore this is somewhat a
loaded issue. However, I am interested in how YOU deploy security into
YOUR environment(s).
I suppose this note could be considered an informal solicitation or
survey on what criteria/requirements are the impetus for the various
permission schemes used. Please reply to this note if YOU wish to
share your ideas on this subject. All information received will be
shared with the participants of this forum.
Regards,
Bob
Received on Wed Dec 20 1995 - 15:14:21 NZDT