+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Red Hat identity and access management vision, solution, and roadmap - YouTube
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Defining Host-Based Access Control Rules
Defining Host-Based Access Control Rules
Access controls, at a high level, define who has access to what. The who is an IdM user, and the what can be either a host (target host), service, or service group, or a combination of the three.