VMware, Inc.
ACCESS CONTROL TO GUARDED OBJECTS
Last updated:
Abstract:
In one example, a computer implemented method may include designating a configurable object as a guarded object to restrict access to the configurable object. Further, the method may include receiving a request to access the guarded object and determining whether the request is received from a user having a privilege to access the guarded object. Furthermore, the method may include controlling the access to the guarded object based on the determination.
Status:
Application
Type:
Utility
Filling date:
23 Nov 2020
Issue date:
7 Apr 2022