Identify the appropriate access rights response to the security directives. This includes providing or revoking access to specific users or roles or carrying out other actions.
©Copyright IBM Corp. 2005, 2008. All Rights Reserved.