Peios
The operating system — identity, access control, integrity, auditing, and everything in between.
Learning Pathways
View all →Getting Started
The core security model — start here. Understand how identity and access control work on Peios.
8 articlesComing from Linux
How Peios relates to Linux identity and access control — UIDs, root, capabilities, and compatibility.
3 articlesTroubleshooting
Diagnosing access denials, broken inheritance, missing audit events, and other common issues.
3 articlesBrowse by Topic
Architecture
Identity
See all 14 articles →Access control
- Understanding Access Control on Peios
- How Security Descriptors Work
- What Are Access Control Lists (DACLs and SACLs)
Integrity
Pip
- Understanding Process Integrity Protection (PIP)
- How PIP Protects Objects
- How Binary Signing Determines PIP Level
Impersonation
- Understanding Impersonation
- Impersonation Levels Explained
- How Identity Cascades Across Local Services
Token restriction
Conditional access
- Understanding Conditional ACEs
- User Claims, Device Claims, and Resource Attributes
- How Attribute-Based Access Control Works