Access control specifies who receives access to protected information resources. The operating system allows for need-to-know or discretionary security. The owner of an information resource can grant other users read or write access rights for that resource.
Access control lists increase the quality of file access controls assigned to individuals and groups.
Configure and manage users on the operating system. Define users and groups on the system and associate them with log-in controls.