Various mechanisms exist to manage folder access control. These approaches can be implemented at the operating system. Typical examples include permission matrices that grant who has R, W, X for a folder. Identity and Access Management (IAM) systems can further refine access by assigning user groups to users, determining their permissions vías de