This content has moved to /doc/book/security/access-control/#permissions