The aim of this module is to put into practice the concepts seen in F2R403B "Security policies for information systems". It proposes practical work which will illustrate the deployment of a policy of access control in an exploitation system and data base. I