<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url><loc>https://learn.peios.org/</loc></url>
  <url><loc>https://learn.peios.org/architecture/</loc></url>
  <url><loc>https://learn.peios.org/identity/</loc></url>
  <url><loc>https://learn.peios.org/access-control/</loc></url>
  <url><loc>https://learn.peios.org/integrity/</loc></url>
  <url><loc>https://learn.peios.org/pip/</loc></url>
  <url><loc>https://learn.peios.org/privileges/</loc></url>
  <url><loc>https://learn.peios.org/impersonation/</loc></url>
  <url><loc>https://learn.peios.org/confinement/</loc></url>
  <url><loc>https://learn.peios.org/token-restriction/</loc></url>
  <url><loc>https://learn.peios.org/conditional-access/</loc></url>
  <url><loc>https://learn.peios.org/central-access-policy/</loc></url>
  <url><loc>https://learn.peios.org/auditing/</loc></url>
  <url><loc>https://learn.peios.org/process-security/</loc></url>
  <url><loc>https://learn.peios.org/linux-compat/</loc></url>
  <url><loc>https://learn.peios.org/reference/</loc></url>
  <url><loc>https://learn.peios.org/troubleshooting/</loc></url>
  <url><loc>https://learn.peios.org/getting-started/</loc></url>
  <url><loc>https://learn.peios.org/content-authoring/</loc></url>
  <url><loc>https://learn.peios.org/configuration/</loc></url>
  <url><loc>https://learn.peios.org/features/</loc></url>
  <url><loc>https://learn.peios.org/reference/</loc></url>
  <url><loc>https://learn.peios.org/getting-started/</loc></url>
  <url><loc>https://learn.peios.org/writing-tests/</loc></url>
  <url><loc>https://learn.peios.org/kernel-testing/</loc></url>
  <url><loc>https://learn.peios.org/configuration/</loc></url>
  <url><loc>https://learn.peios.org/architecture/</loc></url>
  <url><loc>https://learn.peios.org/reference/</loc></url>
  <url><loc>https://learn.peios.org/getting-started/</loc></url>
  <url><loc>https://learn.peios.org/cli/</loc></url>
  <url><loc>https://learn.peios.org/web-board/</loc></url>
  <url><loc>https://learn.peios.org/configuration/</loc></url>
  <url><loc>https://learn.peios.org/reference/</loc></url>
  <url><loc>https://learn.peios.org/introduction/</loc></url>
  <url><loc>https://learn.peios.org/sids/</loc></url>
  <url><loc>https://learn.peios.org/tokens/</loc></url>
  <url><loc>https://learn.peios.org/psb/</loc></url>
  <url><loc>https://learn.peios.org/security-descriptors/</loc></url>
  <url><loc>https://learn.peios.org/privileges/</loc></url>
  <url><loc>https://learn.peios.org/access-check/</loc></url>
  <url><loc>https://learn.peios.org/impersonation/</loc></url>
  <url><loc>https://learn.peios.org/pip/</loc></url>
  <url><loc>https://learn.peios.org/facs/</loc></url>
  <url><loc>https://learn.peios.org/linux-credential-model/</loc></url>
  <url><loc>https://learn.peios.org/appendix-a/</loc></url>
  <url><loc>https://learn.peios.org/appendix-b/</loc></url>
  <url><loc>https://learn.peios.org/peios/access-control/access-control-lists/</loc></url>
  <url><loc>https://learn.peios.org/peios/access-control/access-masks-and-rights/</loc></url>
  <url><loc>https://learn.peios.org/peios/access-control/accesscheck-pseudocode/</loc></url>
  <url><loc>https://learn.peios.org/peios/access-control/ace-ordering/</loc></url>
  <url><loc>https://learn.peios.org/peios/access-control/adding-allow-and-deny-rules/</loc></url>
  <url><loc>https://learn.peios.org/peios/access-control/breaking-inheritance/</loc></url>
  <url><loc>https://learn.peios.org/peios/access-control/check-at-open-model/</loc></url>
  <url><loc>https://learn.peios.org/peios/access-control/file-access-rights-reference/</loc></url>
  <url><loc>https://learn.peios.org/peios/access-control/file-sds-and-extended-attributes/</loc></url>
  <url><loc>https://learn.peios.org/peios/access-control/how-accesscheck-works/</loc></url>
  <url><loc>https://learn.peios.org/peios/access-control/how-security-descriptors-work/</loc></url>
  <url><loc>https://learn.peios.org/peios/access-control/null-vs-empty-dacl/</loc></url>
  <url><loc>https://learn.peios.org/peios/access-control/ownership-and-owner-rights/</loc></url>
  <url><loc>https://learn.peios.org/peios/access-control/reading-security-descriptor/</loc></url>
  <url><loc>https://learn.peios.org/peios/access-control/sd-inheritance/</loc></url>
  <url><loc>https://learn.peios.org/peios/access-control/setting-a-dacl/</loc></url>
  <url><loc>https://learn.peios.org/peios/access-control/transferring-ownership/</loc></url>
  <url><loc>https://learn.peios.org/peios/access-control/understanding-access-control/</loc></url>
  <url><loc>https://learn.peios.org/peios/access-control/understanding-access-decisions/</loc></url>
  <url><loc>https://learn.peios.org/peios/access-control/using-owner-rights/</loc></url>
  <url><loc>https://learn.peios.org/peios/architecture/how-peios-security-works/</loc></url>
  <url><loc>https://learn.peios.org/peios/auditing/understanding-auditing/</loc></url>
  <url><loc>https://learn.peios.org/peios/auditing/working-with-auditing/</loc></url>
  <url><loc>https://learn.peios.org/peios/central-access-policy/understanding-central-access-policy/</loc></url>
  <url><loc>https://learn.peios.org/peios/central-access-policy/working-with-central-access-policy/</loc></url>
  <url><loc>https://learn.peios.org/peios/conditional-access/attribute-based-access-control/</loc></url>
  <url><loc>https://learn.peios.org/peios/conditional-access/claims-and-attributes/</loc></url>
  <url><loc>https://learn.peios.org/peios/conditional-access/understanding-conditional-aces/</loc></url>
  <url><loc>https://learn.peios.org/peios/conditional-access/writing-conditional-aces/</loc></url>
  <url><loc>https://learn.peios.org/peios/confinement/understanding-confinement/</loc></url>
  <url><loc>https://learn.peios.org/peios/confinement/working-with-confinement/</loc></url>
  <url><loc>https://learn.peios.org/peios/identity/comparing-tokens/</loc></url>
  <url><loc>https://learn.peios.org/peios/identity/how-tokens-work/</loc></url>
  <url><loc>https://learn.peios.org/peios/identity/inspecting-impersonation-state/</loc></url>
  <url><loc>https://learn.peios.org/peios/identity/inspecting-process-identity/</loc></url>
  <url><loc>https://learn.peios.org/peios/identity/linked-tokens-and-elevation/</loc></url>
  <url><loc>https://learn.peios.org/peios/identity/machine-identity/</loc></url>
  <url><loc>https://learn.peios.org/peios/identity/primary-vs-impersonation-tokens/</loc></url>
  <url><loc>https://learn.peios.org/peios/identity/querying-token-information/</loc></url>
  <url><loc>https://learn.peios.org/peios/identity/service-identities/</loc></url>
  <url><loc>https://learn.peios.org/peios/identity/understanding-identity/</loc></url>
  <url><loc>https://learn.peios.org/peios/identity/understanding-logon-sessions/</loc></url>
  <url><loc>https://learn.peios.org/peios/identity/well-known-sids-reference/</loc></url>
  <url><loc>https://learn.peios.org/peios/identity/what-are-sids/</loc></url>
  <url><loc>https://learn.peios.org/peios/identity/working-with-elevation/</loc></url>
  <url><loc>https://learn.peios.org/peios/impersonation/identity-cascading/</loc></url>
  <url><loc>https://learn.peios.org/peios/impersonation/impersonating-a-client/</loc></url>
  <url><loc>https://learn.peios.org/peios/impersonation/impersonation-levels/</loc></url>
  <url><loc>https://learn.peios.org/peios/impersonation/reverting-to-service-identity/</loc></url>
  <url><loc>https://learn.peios.org/peios/impersonation/setting-impersonation-level/</loc></url>
  <url><loc>https://learn.peios.org/peios/impersonation/testing-with-anonymous/</loc></url>
  <url><loc>https://learn.peios.org/peios/impersonation/understanding-impersonation/</loc></url>
  <url><loc>https://learn.peios.org/peios/integrity/integrity-levels-explained/</loc></url>
  <url><loc>https://learn.peios.org/peios/integrity/setting-mandatory-labels/</loc></url>
  <url><loc>https://learn.peios.org/peios/integrity/understanding-mic/</loc></url>
  <url><loc>https://learn.peios.org/peios/linux-compat/how-peios-eliminates-root/</loc></url>
  <url><loc>https://learn.peios.org/peios/linux-compat/understanding-linux-compatibility/</loc></url>
  <url><loc>https://learn.peios.org/peios/linux-compat/working-with-linux-applications/</loc></url>
  <url><loc>https://learn.peios.org/peios/pip/binary-signing-and-pip/</loc></url>
  <url><loc>https://learn.peios.org/peios/pip/pip-object-protection/</loc></url>
  <url><loc>https://learn.peios.org/peios/pip/understanding-pip/</loc></url>
  <url><loc>https://learn.peios.org/peios/pip/working-with-pip/</loc></url>
  <url><loc>https://learn.peios.org/peios/privileges/managing-privileges/</loc></url>
  <url><loc>https://learn.peios.org/peios/privileges/privilege-reference/</loc></url>
  <url><loc>https://learn.peios.org/peios/privileges/understanding-privileges/</loc></url>
  <url><loc>https://learn.peios.org/peios/process-security/process-mitigations/</loc></url>
  <url><loc>https://learn.peios.org/peios/process-security/understanding-process-security/</loc></url>
  <url><loc>https://learn.peios.org/peios/process-security/working-with-process-security/</loc></url>
  <url><loc>https://learn.peios.org/peios/reference/faq/</loc></url>
  <url><loc>https://learn.peios.org/peios/reference/glossary/</loc></url>
  <url><loc>https://learn.peios.org/peios/token-restriction/creating-restricted-tokens/</loc></url>
  <url><loc>https://learn.peios.org/peios/token-restriction/understanding-restricted-tokens/</loc></url>
  <url><loc>https://learn.peios.org/peios/troubleshooting/access-denied-errors/</loc></url>
  <url><loc>https://learn.peios.org/peios/troubleshooting/common-issues/</loc></url>
  <url><loc>https://learn.peios.org/trail/configuration/multi-product/</loc></url>
  <url><loc>https://learn.peios.org/trail/configuration/nav-and-theme/</loc></url>
  <url><loc>https://learn.peios.org/trail/configuration/trail-toml/</loc></url>
  <url><loc>https://learn.peios.org/trail/content-authoring/admonitions/</loc></url>
  <url><loc>https://learn.peios.org/trail/content-authoring/code-blocks/</loc></url>
  <url><loc>https://learn.peios.org/trail/content-authoring/diagrams/</loc></url>
  <url><loc>https://learn.peios.org/trail/content-authoring/inter-page-links/</loc></url>
  <url><loc>https://learn.peios.org/trail/content-authoring/pages-and-frontmatter/</loc></url>
  <url><loc>https://learn.peios.org/trail/content-authoring/pathways/</loc></url>
  <url><loc>https://learn.peios.org/trail/content-authoring/tab-groups/</loc></url>
  <url><loc>https://learn.peios.org/trail/features/dark-mode/</loc></url>
  <url><loc>https://learn.peios.org/trail/features/dev-server/</loc></url>
  <url><loc>https://learn.peios.org/trail/features/search/</loc></url>
  <url><loc>https://learn.peios.org/trail/features/seo/</loc></url>
  <url><loc>https://learn.peios.org/trail/getting-started/project-structure/</loc></url>
  <url><loc>https://learn.peios.org/trail/getting-started/quick-start/</loc></url>
  <url><loc>https://learn.peios.org/trail/getting-started/what-is-trail/</loc></url>
  <url><loc>https://learn.peios.org/trail/reference/cli/</loc></url>
  <url><loc>https://learn.peios.org/trail/reference/frontmatter/</loc></url>
  <url><loc>https://learn.peios.org/trail/reference/template-override/</loc></url>
  <url><loc>https://learn.peios.org/provium/architecture/guest-agent/</loc></url>
  <url><loc>https://learn.peios.org/provium/architecture/how-provium-works/</loc></url>
  <url><loc>https://learn.peios.org/provium/architecture/snapshots/</loc></url>
  <url><loc>https://learn.peios.org/provium/architecture/wire-protocol/</loc></url>
  <url><loc>https://learn.peios.org/provium/configuration/cli-reference/</loc></url>
  <url><loc>https://learn.peios.org/provium/configuration/provium-toml/</loc></url>
  <url><loc>https://learn.peios.org/provium/configuration/resource-management/</loc></url>
  <url><loc>https://learn.peios.org/provium/getting-started/project-structure/</loc></url>
  <url><loc>https://learn.peios.org/provium/getting-started/quick-start/</loc></url>
  <url><loc>https://learn.peios.org/provium/getting-started/what-is-provium/</loc></url>
  <url><loc>https://learn.peios.org/provium/kernel-testing/binary-packing/</loc></url>
  <url><loc>https://learn.peios.org/provium/kernel-testing/ioctl/</loc></url>
  <url><loc>https://learn.peios.org/provium/kernel-testing/pointer-patching/</loc></url>
  <url><loc>https://learn.peios.org/provium/kernel-testing/raw-syscalls/</loc></url>
  <url><loc>https://learn.peios.org/provium/reference/faq/</loc></url>
  <url><loc>https://learn.peios.org/provium/reference/lua-api/</loc></url>
  <url><loc>https://learn.peios.org/provium/writing-tests/assertions-and-subtests/</loc></url>
  <url><loc>https://learn.peios.org/provium/writing-tests/background-jobs/</loc></url>
  <url><loc>https://learn.peios.org/provium/writing-tests/fixtures/</loc></url>
  <url><loc>https://learn.peios.org/provium/writing-tests/running-commands/</loc></url>
  <url><loc>https://learn.peios.org/provium/writing-tests/vm-lifecycle/</loc></url>
  <url><loc>https://learn.peios.org/provium/writing-tests/workers/</loc></url>
  <url><loc>https://learn.peios.org/cairn/cli/commands/</loc></url>
  <url><loc>https://learn.peios.org/cairn/configuration/data-model/</loc></url>
  <url><loc>https://learn.peios.org/cairn/getting-started/project-structure/</loc></url>
  <url><loc>https://learn.peios.org/cairn/getting-started/quick-start/</loc></url>
  <url><loc>https://learn.peios.org/cairn/getting-started/what-is-cairn/</loc></url>
  <url><loc>https://learn.peios.org/cairn/reference/meta-toml/</loc></url>
  <url><loc>https://learn.peios.org/cairn/web-board/overview/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/access-check/algorithm/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/access-check/auditing/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/access-check/central-access-policy/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/access-check/confinement/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/access-check/dacl-walk/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/access-check/integrity/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/access-check/object-aces/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/access-check/overview/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/access-check/pip/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/access-check/restricted-tokens/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/appendix-a/blobs/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/appendix-a/boot/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/appendix-a/inspection/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/appendix-a/ioctls/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/appendix-a/syscalls/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/appendix-b/build-config/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/appendix-b/hooks/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/appendix-b/patches/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/facs/handle-model/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/facs/legacy-open/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/facs/native-open/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/facs/sd-storage/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/facs/set-security/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/facs/use-time/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/impersonation/gates/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/impersonation/levels/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/impersonation/lifecycle/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/introduction/conventions/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/introduction/parity/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/introduction/scope/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/introduction/terminology/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/linux-credential-model/credential-projection/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/linux-credential-model/dac-neutralization/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/linux-credential-model/setuid/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/pip/enforcement-points/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/pip/limitations/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/pip/process-protection/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/privileges/catalog/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/privileges/model/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/psb/fields/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/psb/lifecycle/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/psb/overview/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/psb/process-sd/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/security-descriptors/access-masks/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/security-descriptors/ace-ordering/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/security-descriptors/ace-types/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/security-descriptors/conditional-aces/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/security-descriptors/inheritance/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/security-descriptors/ownership/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/security-descriptors/resource-attributes/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/security-descriptors/storage/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/security-descriptors/structure/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/sids/format/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/sids/well-known/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/tokens/access-rights/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/tokens/adjustment/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/tokens/creation/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/tokens/elevation/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/tokens/lifecycle/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/tokens/overview/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/tokens/sessions/</loc></url>
  <url><loc>https://learn.peios.org/spec/kacs/v0.20/tokens/structure/</loc></url>
</urlset>
