This chapter describes how you design user groups and provide
users with the identification (UICs, identifiers, privileges) they
need to do their work. As part of the discussion, the chapter shows
how to assign proper protection codes and ACLs to objects so that
the user can work efficiently while, at the same time, system data
and resources are properly protected. The chapter assumes you are
familiar with the material in
Protecting DataChapter 4 and
Descriptions of Object ClassesChapter 5.