Access control policies (e.g., identity-based policies, role-based policies, attribute-based policies) and access enforcement mechanisms (e.g., access control lists, access control matrices, cryptography) are employed to control access between users (or processes acting on behalf of users) and objects (e.g., devices, files, records, processes, programs, domains).
Rationale for non-applicability: This control primarily applies to the discretionary sharing of information resources by data owners. This type of service is unrelated to MDM server functionality. |