While Windows uses access control lists (ACLs) exclusively to enforce security, the Macintosh uses any one of three different schemes: Mac-style folder permissions, UNIX permissions, or ACLs. Regardless of what scheme the Mac is using, Acronis Access Connect (formerly ExtremeZ-IP) must map the Windows ACL to each of these Macintosh schemes in order to provide the necessary file and folder security expected by the user and/or application.
As of Acronis Access Connect 5.2 and later, all security models on Macintosh are now supported. The attached document discusses the different models and how they're implemented in Acronis Access Connect.
It is assumed that the reader has a basic knowledge of security principles and the terminology used in Windows and Mac security models. A brief glossary is provided at the end of the document.