Surmounting Access Control Obstacles — Part II