When access zones are configured, a root-based path must be defined to segment data into the appropriate access zone and enable the data to be compartmentalized. Access zones carve out access to a PowerScale cluster creating boundaries for multitenancy or multiprotocol. They permit or deny access to areas of the cluster. At the access zone level, authentication providers are also provisioned.