Several predefined ACTs
are provided. To further centralize access management, create an ACT
for each access pattern that you use multiple times. This list outlines
common patterns and provides tips:
-
It is often useful to create ACTs
to manage read access for different business units.
-
It is often useful to create an
ACT that manages write access for a functional group that includes
users from multiple business units.
-
You do not have to capture all
of an item's protections in one ACT. You can use combinations of ACTs,
explicit settings, and inherited settings to define access to an item.