06-19-2002
Access Control Lists for Linux (Redhat 7.2)
Hi,
Does anyone know if Redhat 7.2 allows for file access control lists as you can in Solaris ?
And if so, can you give me the basic command as I'm having trouble finding documentation on this.
Thanx
10 More Discussions You Might Find Interesting
1. Filesystems, Disks and Memory
In Windows XP, there are 3 default access control groups namely: Administrators, Users and Power Users. Is there default access control groups in Unix system? If there is, what are they?
newbie. (1 Reply)
Discussion started by: zertoir
1 Replies
2. UNIX for Dummies Questions & Answers
Hi,
I was wondering if someone could help me with ACL's. I have a file, say output, created by the root user, member of group other. Its permissions are rwxr--r--. I want only people in group other to have rwx access, but I also want one other user, stephen, member of some_other_group to have rwx... (1 Reply)
Discussion started by: sroberts82
1 Replies
3. Shell Programming and Scripting
Hey all, I have a directory (own by user: b; group: grpB) which I want a user (user: a; group: grpA) to be able to read and execute from, I wonder if I should add user a to this particular directory's ACL or that I would add group grpB to user a's subgroup?
I would like to know the difference... (3 Replies)
Discussion started by: mpang_
3 Replies
4. Solaris
Hi,
I want to set access control list on folders but it should be recursively,
any Idea? command (1 Reply)
Discussion started by: manoj.solaris
1 Replies
5. UNIX for Dummies Questions & Answers
In OS like windows, I can define an Access Control List (ACL) and specify which accounts and groups have what access to a specific file.
I assume U*X, Linux and cygwin on windows have this ACL feature too. I'm using cygwin on windows. What do I type at a bash prompt to allow a specific user... (1 Reply)
Discussion started by: siegfried
1 Replies
6. UNIX for Dummies Questions & Answers
I need to control intenet access @ work. xample. I need PC 1 to only be able to access these five sites and add to the list as needed. Can anyone pint me a direction. (1 Reply)
Discussion started by: fruiz
1 Replies
7. AIX
Hello,
I've configurated a LDAP user authentication on AIX V6 against Active Directory (Windows Server 2008).
The Tree is built as follows:
test (DC)
|--- testgroup (group with members: user1, user2)
|
|--- sys1 (OU)
| |--- sys1group (group with member: user1)
|
|--- sys2 (OU)... (0 Replies)
Discussion started by: xia777
0 Replies
8. UNIX for Dummies Questions & Answers
Hi,
I am using eTrust Access Control at work. I have got no output after type checklogin. I wonder what is the reason. Does anyone know? Thanks
eTrustAC selang v8.00a-1555.13 - eTrustAC command line interpreter
Copyright (c) 2006 CA. All rights reserved.
eTrustAC> checklogin user1... (0 Replies)
Discussion started by: uuontario
0 Replies
9. Red Hat
Hi
I have a linux box and need to access from windows graphically
# uname -a
Linux pc-l416116 2.6.18-155.el5 #1 SMP Fri Jun 19 17:06:47 EDT 2009 i686 i686 i386 GNU/Linux
What components do I need to install on Linux and windows to do that?
TIA (6 Replies)
Discussion started by: magnus29
6 Replies
10. Proxy Server
Dear all experts here,
:)
I would like to install a proxy server on Linux server to perform solely to control the access of Web server.
In this case, some of my vendor asked me to try Squid and I have installed it onto my Linux server.
I would like know how can I set the configuration to... (1 Reply)
Discussion started by: kwliew999
1 Replies
LEARN ABOUT DEBIAN
zephyrd
ZEPHYRD(8) System Manager's Manual ZEPHYRD(8)
NAME
zephyrd - Zephyr server daemon
SYNOPSIS
/usr/etc/zephyrd [ -d ]
DESCRIPTION
zephyrd is the central server for the Zephyr Notification System. It maintains a location database of all currently logged-in users, and a
subscription database for each user's Zephyr clients.
zephyrd communicates with daemons running on other Zephyr server hosts, to provide a reliable service.
While running, any unusual conditions are recorded via syslog(3) to facility local6 at various levels. The -d option enables logging of
additional debugging information.
When a zephyrd is executed, it requests a list of server machines from Hesiod and initializes its state from any zephyrds executing on the
other known servers. This initialization is only performed after the zephyrds have authenticated themselves to each other via Kerberos.
The server then enters a dispatch loop, servicing requests from clients and other servers.
SIGNALS
SIGUSR1 enables logging of additional debugging information.
SIGUSR2 disables the logging of additional debugging information.
SIGHUP causes zephyrd to re-read the default subscription file and to re-query Hesiod about valid peers. Any peers which are not respond-
ing and no longer mentioned in Hesiod are flushed; any peers not previously named by Hesiod are added.
SIGINT and SIGTERM cause zephyrd to gracefully shut down.
SIGFPE causes zephyrd to dump the location and subscription databases to /var/tmp/zephyr.db in an ASCII format.
ACCESS CONTROL
Certain notice classes are restricted by the Zephyr server. Each such class has access control lists enumerating who may transmit
(xmt-*.acl) or subscribe to that particular class. Subscriptions may be restricted either absolutely (sub-*.acl files), or by instance
restrictions. iws-*.acl files control subscriptions to wildcarded instances. iui-*.acl files control subscriptions to instances which are
not the Kerberos principal identity of the subscriber. If an access control list of a given type is absent, there is no restriction of
that type on the class, except that any notices of the class must be authenticated. The class registry lists all classes which are
restricted.
FILES
/etc/zephyr/acl/class-registry.acl:
List of classes which are restricted
/etc/zephyr/acl/iws-*.acl:
Access Control Lists for instance-wildcard restrictions
/etc/zephyr/acl/iui-*.acl:
Access Control Lists for instance-identity restrictions
/etc/zephyr/acl/sub-*.acl:
Access Control Lists for subscribing
/etc/zephyr/acl/xmt-*.acl:
Access Control Lists for transmitting
/etc/zephyr/srvtab:
Kerberos 4 Service keys
/etc/zephyr/krb5.keytab:
Kerberos V Service keys
/etc/zephyr/ztkts:
Current Kerberos tickets for exchange with other servers
/var/tmp/zephyr.db:
File containing an ASCII dump of the database.
BUGS
The current implementation of the Zephyr server (zephyrd(8)) makes no distinction between realm-announced, net-visible and net-announced
exposure levels.
SEE ALSO
zephyr(1), zhm(8), kerberosintro(1), hesiod(3), access_control_lists(?), syslog(3)
Athena Technical Plan, Sections E.4.1 (Zephyr Notification Service) and E.2.1 (Kerberos Authentication and Authorization System)
AUTHOR
John T. Kohl, MIT Project Athena and Digital Equipment Corporation
RESTRICTIONS
Copyright (c) 1987,1988 by the Massachusetts Institute of Technology. All Rights Reserved.
zephyr(1) specifies the terms and conditions for redistribution.
MIT Project Athena July 1, 1988 ZEPHYRD(8)