Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How Linux accesses the control list ACL

2025-03-31 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Development >

Share

Shulou(Shulou.com)06/01 Report--

This article mainly shows you "how Linux accesses control list ACL", the content is simple and easy to understand, organized clearly, I hope to help you solve doubts, let Xiaobian lead you to study and learn "how Linux accesses control list ACL" this article bar.

Linux (and other POSIX-compatible operating systems such as Unix) has a method of permission control called access control lists (ACL), which is a common paradigm outside of permission assignment.

type

Assign to file owners Assign to groups to which files belong Assign to additional users Assign to additional groups Assign maximum access to other users

View ACLgetfacl [-option] [file| dic] Optional parameters: -a -d -c -e -E -s -R -t -n Output example: [tom@localhost abc]$ getfacl count.sh# file: count.sh# owner: root# group: rootuser::rw-user:tom:rwxuser:aaa:rwxgroup::r--group:temp:rw-mask::rwxother::r--Configure ACL

setfacl

Options Parameter Meaning-mACL Settings ACL-M file of settings file Read ACL entries from file for configuration-xACL Settings Delete ACL-X file Read ACL entries from file and delete-b Delete all extended ACL

-k Remove all default ACL

-R Recursively sets subdirectories and files

-d Set default ACL

-P Skip symbolic links

-L Tracks symbolic links

-n Do not recalculate valid permissions

- set=ACL setting overrides ACL configuration-mask recalculates valid permissions

- resotre= file Restore backup ACL from file-test test mode, output result

- set-file= file Read ACL entries from file to set

show details

ACL rule representation [d[fault]]:[u[ser]]: user:[permission] #specify user ACL[d]:g: group:[permission] #specify user group ACL[d]:m:[permission] #valid permission mask (other permissions cannot exceed this permission by default)[d]:o:[permission] #other user ACL

Configuration example:

root#setfacl -m u:tom:rwx sum.sh #Specify permissions for user tom Above is "How Linux accesses control list ACL" All the contents of this article, thank you for reading! I believe that everyone has a certain understanding, hope to share the content to help everyone, if you still want to learn more knowledge, welcome to pay attention to the industry information channel!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Development

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report