Access control policies (e.g., identity-based policies, role-based policies, attribute-based policies) and access enforcement mechanisms (e.g., access control lists, access control matrices, cryptography) are employed by organizations to control access between users (or processes acting on behalf of users) and objects (e.g., devices, files, records, processes, programs, domains) in the operating system. Permanent not a finding - UID/roles are natively supported. Additional AD accounts are also administrator accounts with roles, ie: full access, read-only access, or no access. ESXi does not have/use/support file ACLs. |