14.3.1. User Authorization Model
Red Hat Enterprise Virtualization applies authorization controls based on the combination of the three components:
The user performing the action
The type of action being performed
The object on which the action is being performed