VMware, Inc.
ACCESS CONTROL TO GUARDED OBJECTS

Last updated:

Abstract:

In one example, a computer implemented method may include designating a configurable object as a guarded object to restrict access to the configurable object. Further, the method may include receiving a request to access the guarded object and determining whether the request is received from a user having a privilege to access the guarded object. Furthermore, the method may include controlling the access to the guarded object based on the determination.

Status:
Application
Type:

Utility

Filling date:

23 Nov 2020

Issue date:

7 Apr 2022