Access Control Type Explained

Access control is a mechanism that controls who can access securable objects and what actions they can perform on them. A securable object is an object whose access can be defined, controlled, and monitored by the operating system.

An operating system uses access control to define the following things:-

  • How users, services, and applications interact with the operating system
  • What does a specific user, group member, or application do when interacting with the operating system
  • How users access a file or directory and what they do after accessing it
  • How users use and access the operating system and its services
  • Who accesses specific data, apps, and resources, and under what circumstances

Access control keeps confidential data and information secure. On an operating system, it secures the following objects.

  • Kernel objects such as processes, threads, mutexes, jobs, named pipes, semaphores, events, and access tokens
  • File system objects such as files and directories
  • Installed services
  • Printers and print jobs
  • Registry keys
  • Shared folders and devices

Access control types

There are four types of access control: DAC, MAC, RBAC, and ABAC. Each defines a unique way to secure objects. Administrators can select and implement any model based on their requirements.

DAC (Discretionary access control)

This model is user-centric. In this model, users are responsible for defining access rules for their objects. Every object has an owner. Owners define access rules for their objects at their discretion.

MAC (Mandatory access control)

In this model, a central authority defines, monitors, and regulates access rules for all users in the organization. Usually, the authority categorizes access rules into tiers. This model is mainly used in government and military contexts.

RBAC (Role-based access control)

In this model, access rules are defined based on business requirements. The main objective of this model is to provide users only what they need to perform their jobs.

ABAC (Attribute-based access control)

In this model, access rules are defined based on a combination of attributes and environmental conditions, such as location and time. It is the most complex and granular access control model. It is mainly used in computer networks.

How access control works

Access control uses credentials to identify users. Passwords, pins, security tokens, and biometric scans are commonly used credentials.

Credentials can be categorized into two types: single-factor and multifactor. In single-factor authentication, the user needs to authenticate only one time. In multifactor authentication, the user needs to authenticate two or more times. After authorization, access control provides appropriate access to the user on the protected object.

Usually, an administrator or owner defines access control rules for objects. If access control rules are associated with users, files, and directories, they are known as access rights, access privileges, trustee rights, or permissions. If they are associated with files and directories, they are known as attributes or flags.

Conclusion

Learning access control types is essential for a network or system administrator. This tutorial explained access control types on computer networks. It also explained what they are and how they work.

ComputerNetworkingNotes Networking Tutorials Access Control Type Explained

We do not accept any kind of Guest Post. Except Guest post submission, for any other query (such as adverting opportunity, product advertisement, feedback, suggestion, error reporting and technical issue) or simply just say to hello mail us [email protected]