Several
predefined ACTs are provided. To further centralize access management,
create an ACT for each access pattern that you use multiple times.
This list outlines common patterns and provides tips:
-
It is often useful to create ACTs
to manage read access for different business units.
-
It is often useful to create an
ACT that manages write access for a functional group that includes
users from multiple business units.
-
You don't have to capture all of
an item's protections in one ACT. You can use combinations of ACTs,
explicit settings, and inherited settings to define access to an item.