In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-31 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Development >
Share
Shulou(Shulou.com)06/01 Report--
This article mainly shows you "how Linux accesses control list ACL", the content is simple and easy to understand, organized clearly, I hope to help you solve doubts, let Xiaobian lead you to study and learn "how Linux accesses control list ACL" this article bar.
Linux (and other POSIX-compatible operating systems such as Unix) has a method of permission control called access control lists (ACL), which is a common paradigm outside of permission assignment.
type
Assign to file owners Assign to groups to which files belong Assign to additional users Assign to additional groups Assign maximum access to other users
View ACLgetfacl [-option] [file| dic] Optional parameters: -a -d -c -e -E -s -R -t -n Output example: [tom@localhost abc]$ getfacl count.sh# file: count.sh# owner: root# group: rootuser::rw-user:tom:rwxuser:aaa:rwxgroup::r--group:temp:rw-mask::rwxother::r--Configure ACL
setfacl
Options Parameter Meaning-mACL Settings ACL-M file of settings file Read ACL entries from file for configuration-xACL Settings Delete ACL-X file Read ACL entries from file and delete-b Delete all extended ACL
-k Remove all default ACL
-R Recursively sets subdirectories and files
-d Set default ACL
-P Skip symbolic links
-L Tracks symbolic links
-n Do not recalculate valid permissions
- set=ACL setting overrides ACL configuration-mask recalculates valid permissions
- resotre= file Restore backup ACL from file-test test mode, output result
- set-file= file Read ACL entries from file to set
show details
ACL rule representation [d[fault]]:[u[ser]]: user:[permission] #specify user ACL[d]:g: group:[permission] #specify user group ACL[d]:m:[permission] #valid permission mask (other permissions cannot exceed this permission by default)[d]:o:[permission] #other user ACL
Configuration example:
root#setfacl -m u:tom:rwx sum.sh #Specify permissions for user tom Above is "How Linux accesses control list ACL" All the contents of this article, thank you for reading! I believe that everyone has a certain understanding, hope to share the content to help everyone, if you still want to learn more knowledge, welcome to pay attention to the industry information channel!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.