permissions schemes

From: <bbeazley_at_cnsinc.com>
Date: Wed, 20 Dec 95 08:44:36 EST

     Hi,
     
       I've read several notes in this forum regarding user permissions.
     The questions have been various as the responses. Obviously there are
     many security/permission schemes that can be implemented depending
     upon the desired effect and or results. Therefore this is somewhat a
     loaded issue. However, I am interested in how YOU deploy security into
     YOUR environment(s).
     
        I suppose this note could be considered an informal solicitation or
     survey on what criteria/requirements are the impetus for the various
     permission schemes used. Please reply to this note if YOU wish to
     share your ideas on this subject. All information received will be
     shared with the participants of this forum.
     
     
     Regards,
     
     Bob
Received on Wed Dec 20 1995 - 15:14:21 NZDT

This archive was generated by hypermail 2.4.0 : Wed Nov 08 2023 - 11:53:46 NZDT