How can you use role-based security in a virtualized environment? Provide an example of role-based security.
What will be an ideal response?
In addition to file-based security permissions, virtualization requires a new approach called role-based security that provides finer control over permissions in a virtualized environment. In this approach, groups of virtual machine instances determine which machines are available for particular user tasks. Administrators specify the operations that a user can perform for a group in which the user has membership. For example, when a user starts a virtual machine, a check is made to verify that the user has permission to do so.
For a specific example of role-based security, consider the self-service user role. Members of this role can manage their virtual machines under certain controls. The user is given a simplified view of his virtual machines and the tasks he can execute with them. These operations might include creating virtual machines that use particular templates and ISO image files. The role also can be used with a quota to limit the number of virtual machines that are available to a user.
You might also like to view...
By clicking the ____ button, we can test a program to see if it produces the desired result.
A. Run B. Create C. Build D. Assemble
The ____ of Visual Studio 2010 contains buttons for commands that are frequently used, such as Open Project, Save, Cut, Copy, Paste, and Undo.
A. menu bar B. Standard toolbar C. Toolbox D. Properties window
When you delete a shortcut, you delete the actual document or app as well.?
Answer the following statement true (T) or false (F)
The _______________ is a comprehensive software package that allows everyone to publish content on tablet devices.
Fill in the blank(s) with the appropriate word(s).