Explaining the Hyper-V authorization model, part five

Hyper-V uses a role based authorisation model for access checks. This series of articles takes a look at the model; defines the available primitives; and walks through a couple of examples. (I actually wrote most of this many months ago – only finally found the time to post it up!). Quick links: Part1; Part 2;…