Various techniques exist to manage folder access control. These approaches can be configured at the file system. Common examples include access lists that define who has R, W, X for a folder. Role-based access control (RBAC) systems can granulate access by assigning user groups to users, dictating their permissions based on assigned duties. Imple