The access lists are used in the Allow, Deny and Require options. They define what is allowed, what is denied, and what is required. Default is to allow all, but the current running euid etc sets restrictions as well of course. Require only works with encrypted and signed, it will ignore the others. Valid things to toggle are:
search Is the user allowed to enter here. If you deny search permission, you deny everything. readFile Reading files. listing Listing directories. createFile Creating files (and writing into them). createDir Creating directories. append Appending to files. overwrite Overwriting files, either completely or partially. delete Deleting files and directories. rename Renaming files and directories. encrypted Encrypted data connections (excluding list). signed Certified data connections (excluding list). Note that these two require a secure connection. If you require them, nonsecured won't be able to read or write to files this directory. reading Alias for search, readFile and listing. writing Alias for createFile, createDir, append, overwrite and delete. storing Alias for createFile, createDir and append. all Alias for all the above.Example:
Deny all; Allow reading, signed; Require encrypted;