Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to analyze the privilege Control of Linux system

2025-01-17 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Development >

Share

Shulou(Shulou.com)06/01 Report--

How to analyze the Linux system access control, many novices are not very clear about this, in order to help you solve this problem, the following editor will explain for you in detail, people with this need can come to learn, I hope you can gain something.

At present, the traditional Linux file system access control can not achieve complex control requirements, but the emergence of ACL brings a more powerful function for Linux system file access control, which can assign rights to any user or user group.

Type is assigned to the file owner

Assign to the group to which the file belongs

For additional users

Allocation for additional groups

Other user assignment

Maximum access

View ACL getfacl [- option] [file | dic] optional parameter:-a-d-c-e-E-s-R-t-n output example: [tom@localhost abc] $getfacl count.sh # file: count.sh # owner: root # group: root user::rw- user:tom:rwx user:aaa:rwx group::r-- group:temp:rw- mask::rwx other::r-- configuration ACLsetfacl

Option parameter meaning-ACL-M file of mACL setting settings file reads ACL entry from file for configuration-xACL setting deletes ACL-X file reads ACL entry from file and deletes-b

Delete all extended ACL-k

Delete all default ACL-R

Recursively set subdirectories and files-d

Set the default ACL-P

Skip symbolic links-L

Track symbolic links-n

Do not recalculate valid permissions-set=ACL setting overrides ACL configuration-mask

Recalculate valid permissions-resotre= files restore backup ACL-test from files

Test mode, output results-set-file= file reads ACL entries from the file to set the ACL rule representation

[d [Eefault]: [u [ser]: user: [permission] # specify user ACL [d]: G: group: [permission] # specify user group ACL [d]: M: [permission] # valid permission mask (other permissions cannot exceed this permission by default) [d]: o: [permission] # other user ACL configuration example: root#setfacl-m u:tom:rwx sum. Will it be helpful for sh # to specify permissions for the user tom to finish reading the above content? If you want to know more about the relevant knowledge or read more related articles, please follow the industry information channel, thank you for your support.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Development

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report