ERROR OCURRED

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, January 28, 2008

Access control list

Posted on 1:32 AM by Unknown
An access control list (ACL) is a list of permissions attached to an object. The list specifies who or what is allowed to access the object and what operations are allowed to be performed on the object. In a typical ACL, each entry in the list specifies a subject and an operation: for example, the entry (Alice, delete) on the ACL for file XYZ gives Alice permission to delete file XYZ.
In an ACL-based security model, when a subject requests to perform an operation on an object, the system first checks the list for an applicable entry in order to decide whether or not to proceed with the operation.



Definitions

User class The conventional POSIX permission concept uses three classes of
users for assigning permissions in the le system: the owner, the owning
group, and other users. Three permission bits can be set for each user
class, giving permission to read (r), write (w), and execute (x). An introduction
to the user concept in Linux is provided in the User Guide in the
section Users and Access Permissions.

Access ACL The user and group access permissions for all kinds of le system
objects (les and directories) are determined by means of access ACLs.

Default ACL Default ACLs can only be applied to directories. They determine
the permissions a le system object inherits from its parent directory
when it is created.

ACL entry Each ACL consists of a set of ACL entries. An ACL entry contains a
type (see Table B.1 on the following page), a qualier for the user or group
to which the entry refers, and a set of permissions. For some entry types,
the qualier for the group or users is undened.

*For more information go through with following link:-

http://www.suse.de/~agruen/acl/chapter/fs_acl-en.pdf
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • No package 'lua5.1' found
    hecking for LUA51... no checking for LUA51... configure: error: Package requirements (lua5.1 >= 5.1) were not met: No package 'lua5.1...
  • response to SOA query was unsuccessful: solved
    check your zone file [root@inf1sysadm1 data]# pwd /var/named/data # cat ind.raman.com.zone $ORIGIN . $TTL 3600 ; 1 hour ind.raman.com IN SO...
  • can't locate your x11 installation Fedora
    While install Conky, system through this error. Solution:- You need to install X11 Software Dev Package. Login on system with root user ...
  • Qmail Installation & Configuration step by step
    Tested under CentOS 5.8  64bit machine. 1)Packges which i installed for Qmail. httpd-2.2.3-76 php-5.1.6-39 perl-5.8.8 -38 gcc-4.1.2 mysql-5....
  • Dell MD3200 SAS Cabling With Diagram
    I have 2 MD3200 with SAS Ports + 2 Power Edge720. Task to connect Both DAS with Both server and make sure Both server showing  all DAS Parti...
  • It is safe to clean windows prefetch folder and registry folder ?
     It is safe to clean windows prefetch folder and registry folder ? Will this boost Windows operating system capabilities ? Many of you hav...
  • Windows 7 & Windows 8 fail to start
    Windows 7 fail to boot, what should I do? Is Windows 7 failing to boot after you installed the loader or after you just installed a fresh ne...
  • Steps how to change VolStatus in Bacula through bonsole.
    In my example MediaId=4 or Volumename=000018L4 shows volstatus is Purged. *list volumes Pool: Default +---------+------------+-----------+--...
  • Adobe Photoshop CS5 Error 16 , Adobe Photoshop CS5 Error 7
    When you install Adobe Photoshop CS5 you might get some errors. In case you get one you will see a code and a little description. Is very im...
  • X connection to localhost:10.0 broken (explicit kill or server shutdown).
    Solution:- With Xhost, you can solve this issue.

Categories

  • Adobe
  • Players
  • Reviews
  • Windows

Blog Archive

  • ►  2013 (27)
    • ►  October (3)
    • ►  August (1)
    • ►  June (1)
    • ►  April (3)
    • ►  February (10)
    • ►  January (9)
  • ►  2012 (29)
    • ►  December (2)
    • ►  November (7)
    • ►  October (10)
    • ►  September (4)
    • ►  August (1)
    • ►  June (2)
    • ►  April (1)
    • ►  March (1)
    • ►  January (1)
  • ►  2011 (36)
    • ►  December (3)
    • ►  November (3)
    • ►  October (1)
    • ►  September (5)
    • ►  August (4)
    • ►  May (2)
    • ►  April (4)
    • ►  March (5)
    • ►  February (2)
    • ►  January (7)
  • ►  2010 (24)
    • ►  December (1)
    • ►  November (1)
    • ►  October (4)
    • ►  August (1)
    • ►  May (1)
    • ►  April (1)
    • ►  March (2)
    • ►  February (5)
    • ►  January (8)
  • ►  2009 (18)
    • ►  December (6)
    • ►  November (3)
    • ►  August (1)
    • ►  July (2)
    • ►  June (1)
    • ►  May (1)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (1)
  • ▼  2008 (16)
    • ►  December (1)
    • ►  October (1)
    • ►  August (1)
    • ►  July (5)
    • ►  April (2)
    • ►  February (1)
    • ▼  January (5)
      • Using TCP Wrappers to secure Linux
      • Password, Shadow and Group files Description in Linux
      • How do I telnet as the root user
      • Linux file Types
      • Access control list
  • ►  2007 (4)
    • ►  July (3)
    • ►  June (1)
Powered by Blogger.

About Me

Unknown
View my complete profile