An access list (AL) is a list of permissions used in physical and information technology (IT) security to control who is allowed contact with a corporate asset. The asset can be a building, a room or a computer file.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Different types of access lists include:
Role-based access control: permission is granted to certain individuals whose jobs require them to have access to a particular asset.
Network access control: permission is granted to certain individuals whose clearance certification or computing device complies with a corporate security policy.
Context-aware network access control: permission is granted depending upon the circumstances. For example, access may be granted from the hours of nine to five only.
Integrated access management - combines features from the different types of access lists above to grant permissions.