Most of the functionality useable for security is part of a data store implementation to limit access to data and manage the information in the ACL. The different interfaces and components between an application and the data store may pass security information from the application to the data store, such as the user name and password, and may pass information about access rights for new data objec