05-05-2008
acl - Linux Command - Unix Command check this site. Normally, when ACLs are not used, the POSIX standards of rwxrwxrwx are used where the first set of rwx is for the owner, the second set is for group membership and the last set is for other or world.
8 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hi,
Does anyone know if Redhat 7.2 allows for file access control lists as you can in Solaris ?
And if so, can you give me the basic command as I'm having trouble finding documentation on this.
Thanx (1 Reply)
Discussion started by: ianf
1 Replies
2. Filesystems, Disks and Memory
In Windows XP, there are 3 default access control groups namely: Administrators, Users and Power Users. Is there default access control groups in Unix system? If there is, what are they?
newbie. (1 Reply)
Discussion started by: zertoir
1 Replies
3. UNIX for Dummies Questions & Answers
Hi,
I was wondering if someone could help me with ACL's. I have a file, say output, created by the root user, member of group other. Its permissions are rwxr--r--. I want only people in group other to have rwx access, but I also want one other user, stephen, member of some_other_group to have rwx... (1 Reply)
Discussion started by: sroberts82
1 Replies
4. Shell Programming and Scripting
Hey all, I have a directory (own by user: b; group: grpB) which I want a user (user: a; group: grpA) to be able to read and execute from, I wonder if I should add user a to this particular directory's ACL or that I would add group grpB to user a's subgroup?
I would like to know the difference... (3 Replies)
Discussion started by: mpang_
3 Replies
5. UNIX for Dummies Questions & Answers
I need to control intenet access @ work. xample. I need PC 1 to only be able to access these five sites and add to the list as needed. Can anyone pint me a direction. (1 Reply)
Discussion started by: fruiz
1 Replies
6. AIX
Hello,
I've configurated a LDAP user authentication on AIX V6 against Active Directory (Windows Server 2008).
The Tree is built as follows:
test (DC)
|--- testgroup (group with members: user1, user2)
|
|--- sys1 (OU)
| |--- sys1group (group with member: user1)
|
|--- sys2 (OU)... (0 Replies)
Discussion started by: xia777
0 Replies
7. UNIX for Dummies Questions & Answers
Hi,
I am using eTrust Access Control at work. I have got no output after type checklogin. I wonder what is the reason. Does anyone know? Thanks
eTrustAC selang v8.00a-1555.13 - eTrustAC command line interpreter
Copyright (c) 2006 CA. All rights reserved.
eTrustAC> checklogin user1... (0 Replies)
Discussion started by: uuontario
0 Replies
8. Proxy Server
Dear all experts here,
:)
I would like to install a proxy server on Linux server to perform solely to control the access of Web server.
In this case, some of my vendor asked me to try Squid and I have installed it onto my Linux server.
I would like know how can I set the configuration to... (1 Reply)
Discussion started by: kwliew999
1 Replies
LEARN ABOUT DEBIAN
dpns-getacl
DPNS-GETACL(1) DPNS User Commands DPNS-GETACL(1)
NAME
dpns-getacl - get DPNS directory/file access control lists
SYNOPSIS
dpns-getacl [-a] [-d] path...
DESCRIPTION
dpns-getacl gets the Access Control List associated with a DPNS directory/file. For each path, it displays the file name, owner, the
group, and the Access Control List (ACL) if present. If a directory has a default ACL, dpns-getacl also displays the default ACL. Regular
files cannot have default ACLs.
The output looks like:
# file: filename
# owner: username
# group: groupname
user::perm
user:uid:perm
group::perm
group:gid:perm
mask:perm
other:perm
default:user::perm
default:user:uid:perm
default:group::perm
default:group:gid:perm
default:mask:perm
default:other:perm
The first "user" entry gives the permissions granted to the owner of the file. The following "user" entries show the permissions granted
to specific users, they are sorted in ascending order of uid. The first "group" entry gives the permissions granted to the group owner of
the file. The following "group" entries show the permissions granted to specific groups, they are sorted in ascending order of gid. The
"mask" entry is the maximum permission granted to specific users or groups. It does not affect the "owner" and "other" permissions. The
"mask" entry must be present if there are specific "user" or "group" entries. "default" entries associated with a directory are inherited
as access ACL by the files or sub-directories created in that directory. The umask is not used. Sub-directories also inherit the default
ACL as default ACL. As soon as there is one default ACL entry, the 3 default ACL base entries (default user, default group, default other)
must be present.
The entry processing conforms to the Posix 1003.1e draft standard 17.
path specifies the DPNS pathname. If path does not start with /, it is prefixed by the content of the DPNS_HOME environment variable.
uid is displayed as the username if known else as the numeric id.
gid is displayed as the groupname if known else as the numeric id.
perm is expressed as a combination of characters rwx-
OPTIONS
-a only display the access ACL.
-d only display the default ACL.
EXAMPLES
dpns-getacl /dpm/dteam/test/file.log/d2
# file: /dpm/dteam/test/file.log/d2
# owner: baud
# group: c3
user::rwx
group::r-x #effective:r-x
other::r-x
default:user::rwx
default:group::r-x
default:other::r-x
EXIT STATUS
This program returns 0 if the operation was successful or >0 if the operation failed.
SEE ALSO
Castor_limits(4), dpns_chmod(3), dpns_chown(3)
AUTHOR
LCG Grid Deployment Team
DPNS
$Date: 2005/03/02 08:32:12 $ DPNS-GETACL(1)