Using authorization lists offers many advantages for those people charged with maintaining system and data security.
By Rafael Victória-Pereira
A well-structured authorization scheme that includes both user groups and authorization lists by application or library type allows for better control over the whole system, thus preventing unpleasant surprises and reducing the unauthorized-access risk.