Sponsored Content
Top Forums UNIX for Advanced & Expert Users Access Control Lists for Linux (Redhat 7.2) Post 23226 by ianf on Wednesday 19th of June 2002 04:53:42 AM
Old 06-19-2002
Question Access Control Lists for Linux (Redhat 7.2)

Hi,

Does anyone know if Redhat 7.2 allows for file access control lists as you can in Solaris ?

And if so, can you give me the basic command as I'm having trouble finding documentation on this.

Thanx
 

10 More Discussions You Might Find Interesting

1. Filesystems, Disks and Memory

Access Control

In Windows XP, there are 3 default access control groups namely: Administrators, Users and Power Users. Is there default access control groups in Unix system? If there is, what are they? newbie. (1 Reply)
Discussion started by: zertoir
1 Replies

2. UNIX for Dummies Questions & Answers

Access control Lists

Hi, I was wondering if someone could help me with ACL's. I have a file, say output, created by the root user, member of group other. Its permissions are rwxr--r--. I want only people in group other to have rwx access, but I also want one other user, stephen, member of some_other_group to have rwx... (1 Reply)
Discussion started by: sroberts82
1 Replies

3. Shell Programming and Scripting

Access Control List

Hey all, I have a directory (own by user: b; group: grpB) which I want a user (user: a; group: grpA) to be able to read and execute from, I wonder if I should add user a to this particular directory's ACL or that I would add group grpB to user a's subgroup? I would like to know the difference... (3 Replies)
Discussion started by: mpang_
3 Replies

4. Solaris

Command for access control list

Hi, I want to set access control list on folders but it should be recursively, any Idea? command (1 Reply)
Discussion started by: manoj.solaris
1 Replies

5. UNIX for Dummies Questions & Answers

Does U*X have Access Control Lists?

In OS like windows, I can define an Access Control List (ACL) and specify which accounts and groups have what access to a specific file. I assume U*X, Linux and cygwin on windows have this ACL feature too. I'm using cygwin on windows. What do I type at a bash prompt to allow a specific user... (1 Reply)
Discussion started by: siegfried
1 Replies

6. UNIX for Dummies Questions & Answers

Internet Access Control

I need to control intenet access @ work. xample. I need PC 1 to only be able to access these five sites and add to the list as needed. Can anyone pint me a direction. (1 Reply)
Discussion started by: fruiz
1 Replies

7. AIX

Access control using LDAP

Hello, I've configurated a LDAP user authentication on AIX V6 against Active Directory (Windows Server 2008). The Tree is built as follows: test (DC) |--- testgroup (group with members: user1, user2) | |--- sys1 (OU) | |--- sys1group (group with member: user1) | |--- sys2 (OU)... (0 Replies)
Discussion started by: xia777
0 Replies

8. UNIX for Dummies Questions & Answers

eTrust Access Control

Hi, I am using eTrust Access Control at work. I have got no output after type checklogin. I wonder what is the reason. Does anyone know? Thanks eTrustAC selang v8.00a-1555.13 - eTrustAC command line interpreter Copyright (c) 2006 CA. All rights reserved. eTrustAC> checklogin user1... (0 Replies)
Discussion started by: uuontario
0 Replies

9. Red Hat

How to access redhat Linux box graphically from windows box?

Hi I have a linux box and need to access from windows graphically # uname -a Linux pc-l416116 2.6.18-155.el5 #1 SMP Fri Jun 19 17:06:47 EDT 2009 i686 i686 i386 GNU/Linux What components do I need to install on Linux and windows to do that? TIA (6 Replies)
Discussion started by: magnus29
6 Replies

10. Proxy Server

How to use Squid on Linux to control certain IP to access Web Server and certain IP cannot access?

Dear all experts here, :) I would like to install a proxy server on Linux server to perform solely to control the access of Web server. In this case, some of my vendor asked me to try Squid and I have installed it onto my Linux server. I would like know how can I set the configuration to... (1 Reply)
Discussion started by: kwliew999
1 Replies
mkdir(2)							System Calls Manual							  mkdir(2)

NAME
mkdir - make a directory file SYNOPSIS
DESCRIPTION
The system call creates a new directory file named by path. The file permission bits of the new directory are initialized from mode, and are modified by the process's file mode creation mask. For each bit set in the process's file mode creation mask, the corresponding bit in the new directory's mode is cleared (see umask(2)). The directory's owner ID is set to the process's effective-user-ID. If the set-group-ID bit of the parent directory is set, the direc- tory's group ID is set to the group ID of the parent directory. Otherwise, the directory's group ID is set to the process's effective- group-ID. The set-group-ID bit of the new directory is set to the same value as the set-group-ID bit of the parent directory. Symbolic constants defining the access permission bits are found in the header and are used to construct the argument mode. The value of the argument mode is the bitwise inclusive OR of the values of the desired permissions. Read by owner. Write by owner. Execute (search) by owner. Read by group. Write by group. Execute (search) by group. Read by others (that is, anybody else). Write by others. Execute (search) by others. Access Control Lists - HFS File Systems Only On HFS file systems implementing access control lists, the directory is created with three base ACL entries, corresponding to the file access permission bits (see acl(5)). Access Control Lists - JFS File Systems Only On JFS file systems that support access control lists, optional ACL entries are created corresponding to the parent directory's default ACL entries. Also, the parent directory's default ACL entries are copied as the new directory's default ACL entries (see aclv(5)). RETURN VALUE
returns one of the following values: Successful completion. Failure. An error code is stored in ERRORS
If fails, no directory is created and is set to one of the following values: A component of the path prefix denies search permission. The parent directory of the new directory denies write permission. User's or group's disk quota block or inode limit has been reached for this file system. The named file already exists. path points outside the process's allocated address space. The reliable detection of this error is implementation dependent. An I/O error occurred while writing to the file system. Too many symbolic links are encountered in translating the path name. The maximum number of links to the parent directory, would be exceeded. The length of the specified path name exceeds bytes, or the length of a component of the path name exceeds bytes while is in effect. A component of the path prefix does not exist. Not enough space on the file system. A component of the path prefix is not a directory. The named file resides on a read-only file system. AUTHOR
was developed by the University of California, Berkeley. SEE ALSO
acl(2), chmod(2), setacl(2), stat(2), umask(2), acl(5), aclv(5), limits(5). STANDARDS CONFORMANCE
mkdir(2)
All times are GMT -4. The time now is 03:15 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy