39390: Acronis Access Connect: Security Overview: ACLs and Unix Permissions

Also read in:

Translate to:

While Windows uses access control lists (ACLs) exclusively to enforce security, the Macintosh uses any one of three different schemes: Mac-style folder permissions, UNIX permissions, or ACLs. Regardless of what scheme the Mac is using, Acronis Access Connect (formerly ExtremeZ-IP) must map the Windows ACL to each of these Macintosh schemes in order to provide the necessary file and folder security expected by the user and/or application.

As of Acronis Access Connect 5.2 and later, all security models on Macintosh are now supported. The attached document discusses the different models and how they're implemented in Acronis Access Connect.

It is assumed that the reader has a basic knowledge of security principles and the terminology used in Windows and Mac security models. A brief glossary is provided at the end of the document.

Acronis Access Connect-Security-Discussion.pdf


You are reporting a typo in the following text:
Simply click the "Send typo report" button to complete the report. You can also include a comment.
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.
10 + 3 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.