Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Detailed explanation of ACL usage

2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

ACL: access control list, mainly used to set permissions for files or directories

How to use:

Getfacl [FILE]: view this file acl permissions

Setfacl [- bkndRLPvh] [{- m |-x} acl_spec] [{- M |-X} acl_file] file.

Special permissions:

Mask permission: this permission is the maximum valid permission. When the permission set for the user or group has the same permission as the mask permission, it is the final permission.

Common options:

-m: create a new acl permission

-x: removes the specified acl permission

-b: remove all acl permissions

-d: set default acl permissions

-k: delete the default acl permission

-R: set acl permissions recursively

View the acl permissions of the current file or directory:

# getfacl test

Set acl permissions on the user:

# setfacl-m u:liu:rwx test

Set acl permissions on the group:

# setfacl-m g:tgroup:rx test

Set the maximum valid permission mask:

# setfacl-m m:rx test previously set the permission for the user liu to rwx. After setting the mask permission, the final valid permission is rx.

Remove user permissions:

# setfacl-x u:liu test can see that the permissions previously set for user liu are gone

Delete group permissions:

# setfacl-x g:tgroup test can see that the permissions previously set for the group tgroup are gone

Set recursive permissions:

# setfacl-R-m u:liu:rx test all files or directories in this directory, user liu has only rx permission

Remove all permissions:

# setfacl-b test

Set the default permissions:

# setfacl-m d:u:liu:rx test

Delete default permissions:

# setfacl-k test

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report