14.3. User Authorization

14.3.1. User Authorization Model

Red Hat Enterprise Virtualization applies authorization controls based on the combination of the three components:
  • The user performing the action
  • The type of action being performed
  • The object on which the action is being performed