permission
superadministrator
account
access modifier
impersonate
DCS
user control
penetration test
treelist
group
walk off
paywall
interuser
security system
digital rights management
gatekeep
wald
blockade
gatekeeper
hijack
control panel
picker
userlist
permablock
NOC
bureaucrat
manager
selection
OSI layer 8
accessively
nonadministrator
atomic authorization
admit
buttonology
block off
information security
hot spot
open door
independent
in hand
dropdown list
fieldset
tab control
harnessed
Twitter
toggle switch
takeover attempt
own
encomienda
trust
audit
clutches
capability
rootless
spyware
sunshine
dock
role-based
perm
permish
preserve
freedom
buy up
tab order
take the reins
two-factor authentication
take over
sudoer
wheel war
social pattern
buy out
accessive
surrender
give up
cede
command
close
side-channel
superuser
deliver
shellbag
net
get at
unguided
usermode
privilege escalation
clan control
authorization
rootkit
autokill
open the door
adaptive-control function
segregated
leave
adaptive control
subscript
guest