Access
control
rules
(typically
for
an
administratively-imposed
policy
category)
can
be
enforced
centrally
from
the
security
management
console.
Access
to
resources
can
be
granted
on
a
need-to-know
basis
based
on
the
workgroup
a
subject
is
a
member
off
(i.e. an
identity-based
policy
class).
When
the
subject
changes
to
a
different
workgroup,
his
access
rights
are
automatically
updated.
Attempts
to
access
restricted
resources
are
monitored
and
logged.
In
ISO
10181-3
speak,
an
initiator
would
submit
an
access
request
to
the
access
control
enforcement
function
(AEF)
which
ensures
that
only
allowable
accesses,
as
defined
by
the
access
control
decision
function
(ADF)
are
performed
by
the
initiator
on
the
target
[ISO94].