Access control list (ACL) is used to map the permissions of the objects against the users of an application. ACL will have the access grants for users and system process in order to access and perform operations on particular objects. Typically, ACL stores the operation against an object by a user. In Java programming, you can assume an entry in ACL, such as Admin: Create
or User: Read
, for a given screen or entity that would give permission to the Admin
to create an entity and the User
to read the same. The implementation of ACL using SQL and File System may also vary for different technologies.
Advanced SQL-based ACL implementations follow role-based access control (RBAC) models. The RBAC model is widely used in security applications that have complex security requirements, such as role-based data segregation. In SQL implementation, ACLs are used to manage groups, subgroups, and hierarchy of groups. The flexibility, in terms of creating and managing...