Skip to Content
VMware® Infrastructure 3 FOR DUMMIES®
book

VMware® Infrastructure 3 FOR DUMMIES®

by William Lowe
September 2008
Beginner to intermediate content levelBeginner to intermediate
360 pages
6h 58m
English
For Dummies
Content preview from VMware® Infrastructure 3 FOR DUMMIES®

Chapter 13. Securing Your System

All systems need some sort of security model to prevent everyone from doing everything. Security models are usually made up of three things:

  • Users and groups

  • Rights and privileges

  • Objects to which those rights and privileges apply

This is true in the physical world as well as the virtual computer world.

Take the simple example of a restaurant — say, Gordon Ramsay's The London in Manhattan (a fantastic restaurant where my friends and I actually met Gordon Ramsay after having dinner). There are three primary groups: the owners, the employees, and the customers.

The owners have the rights and privileges to go anywhere they want in the restaurant, can hire and fire employees, and most likely have the combination to the safe. They are the administrators and have rights to all objects: the restaurant, the bar, the kitchen, and the store rooms.

The employees are another group with more restricted rights. All employees likely have the rights to access the kitchen object. Waiters have the rights to the restaurant floor object. Bartenders have the rights to the employee-side-of-the-bar object. The maître d' has the rights to all the aforementioned objects. Yet, if you saw a waiter behind the bar, that might raise some questions, especially if he were having a drink!

Customers, on the other hand, have the most restricted set of rights. They have access only to their table object (reservations are recommended), the customer-side-of-the-bar object, and the restroom objects. ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Storage Area Networks For Dummies®

Storage Area Networks For Dummies®

Christopher Poelker, Alex Nikitin
IBM Tivoli Storage Manager as a Data Protection Solution

IBM Tivoli Storage Manager as a Data Protection Solution

Mary Lovelace, Gerd Becker, Rosane Langnor, Mikael Lindstrom, Pia Nymann, Felipe Peres, Norbert Pott, Julien Sauvanet, Gokhan Yildirim
IBM ProtecTIER Implementation and Best Practices Guide

IBM ProtecTIER Implementation and Best Practices Guide

Karen Orlando, Mathias Defiebre, Daniel Riedel, Daniel Wendler
Learning PowerCLI - Second Edition

Learning PowerCLI - Second Edition

Robert van den Nieuwendijk

Publisher Resources

ISBN: 9780470277935Purchase book