With the security editor, you can view and edit the Access Control List (ACL) of the associated object. Enterprise Manager uses the security editor in the following three security tabs:
For more information, see Icons used by the security editor and About access rights.
DisplayName (PrincipalName)
.Click Add or Remove to change this list. The icons indicate whether the ACE represents a user or a group, whether it is denied or allowed, and whether it is inherited or not.
Each ACE has an inheritable depth setting that is invoked if the ACE is configured to be inherited by a child object. The inheritable depths are:
When you select a level, two things happen: the rights that comprise the level become selected in the Rights column, and other levels that are included in the selected level are marked with an asterisk. For example, selecting Full Control causes all the other levels to be marked with an asterisk.
All objects include a Custom level, which is automatically selected if you choose a collection of rights that is not exactly mapped to one of the predefined levels.