Security Model
All named objects in Windows NT, and some unnamed objects, can be secured. The
security attributes of each securable object in Windows are described by a
security descriptor, which contains information about the owner of the object, and by an
access-control list (ACL) identifying the users and groups allowed or denied access to the
object. An ACL contains an entry for each user, global group, or local group (alias)
being allowed or denied access to the object. Each of these entries is an
access-control entry (ACE).
At logon, a user is assigned an
access token containing identifiers that represent the user and any groups to which the
user belongs. Every process run on behalf of this user will have a copy of this
particular access token. When a process attempts to use an object, the system
compares the security attributes listed in the access token with the ACEs in the
object's ACL. The system compares the access token with each ACE until access
is either granted or denied or until there are no more ACEs to check.
Conceivably, several ACEs could apply to a token. And, if this occurs, the
access rights granted by each ACE accumulate. For example, if one ACE grants read access to
a group in an access token and another ACE grants write access to the user,
who is also a member of the group, the user will have both read and write access
to the object when the access check is complete.
The following illustration shows the relationship between these blocks of
security information:
Typically, the application protecting an object is a server in that it defines
the users and groups with access to the object. The application interacts with
clients when they attempt to gain access to the object. Users and groups are
identified by
security identifiers (SIDs). An SID is a structure of variable length that uniquely identifies a user or
group. SIDs are stored in a security database that an application can query by
calling Win32 functions. With one exception, an SID is used to identify a user
or group is never reassigned to another user or group. For a given account, the
only SID that will not be the same from logon to logon is the logon-identifier
SID. In the model represented by the preceding illustration, SIDs would be
used to identify the following:
- The owner and group in the security descriptor
- The recipient of the access being granted by each ACE
- The user and groups in the access token
Security descriptors, SIDs, and ACLs are treated by applications as opaque
structures and are intended to be manipulated only by using Win32 functions. This
helps ensure that these structures remain syntactically accurate and prevents
future enhancements to the security system from breaking existing code.
Pointers to doubleword values or structures must be aligned on doubleword
boundaries. However, the exception is strings, for which alignment is not critical.
All Win32 memory-allocation functions return handles of doubleword-aligned
memory objects.
- Software for developers
-
Delphi Components
.Net Components
Software for Android Developers
- More information resources
-
MegaDetailed.Net
Unix Manual Pages
Delphi Examples
- Databases for Amazon shops developers
-
Amazon Categories Database
Browse Nodes Database