05-30-2010
Quote:
Originally Posted by
holocene
I just wish a separate step to chmod the files upon creation would not be required.
Depending on the environment you're building, resetting those user's
umask might prove helpful (or disastrous, as this approach is by no means folder-specific).
But why don't you implement a script to check and update the permissions of all files and folders in question at regular intervals by means of a root cron job ...?
This User Gave Thanks to dr.house For This Post:
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
From within a directory, how do I determine whether I have write permission for it.
test -w pwd ; echo ?
This doesn't work as it returns false, even though I have write permission. (4 Replies)
Discussion started by: Sniper Pixie
4 Replies
2. UNIX for Dummies Questions & Answers
Read and write bits make sense for a directory but what about the execute permission bit
What does that imply?Is it just a filler?
Saurabh (3 Replies)
Discussion started by: smehra
3 Replies
3. UNIX for Dummies Questions & Answers
Hi,
I want to copy a file from unix machine to a shared windows directory.
i tried using the ftp command but i was able to transfer the file only to my local directory.
Is there any way we can transfer/copy the files from unix to windows shared directory..........
Please help.
Thanks (5 Replies)
Discussion started by: sireesha15
5 Replies
4. Filesystems, Disks and Memory
Hi
Im working in an environment where 2 production and 2 testing unix servers are used.. All these servers share the same home directory..
how is it done
where would the home directory be located (0 Replies)
Discussion started by: raghav288
0 Replies
5. Solaris
how can I make a shared directory between two UNIX servers??? (6 Replies)
Discussion started by: mm00123
6 Replies
6. UNIX for Dummies Questions & Answers
Hi all.
Only one of the following makes any kind of sense as a possible permission field for a UNIX file. Which one?
--w-------
----rwxrwx
-r--------
--rwx-----
----r-----
I think it is no. 3. I dont think it would be 2, because why would you want to give groups and... (1 Reply)
Discussion started by: hawaiifiver
1 Replies
7. Shell Programming and Scripting
Hi,
How do i check if I have read/write/execute rights on a UNIX directory?
What I'm doing is checking read access on the files but i also want to check if user has rights on the direcory in whcih these files are present.
if then......
And I check if the directory exists by using... (6 Replies)
Discussion started by: chetancrsp18
6 Replies
8. UNIX for Dummies Questions & Answers
At work, we have a shared directory where we modify files via ssh. This can be an issue if two people unknowingly try to open and modify the same file. Sure, one user could send a mass e-mail/IM to the group, letting everyone know when he/she is accessing a file, but I was wondering if there was a... (2 Replies)
Discussion started by: jl487
2 Replies
9. Solaris
we want to allow user to FTP files into a directory, and then the program (PLSQL) will read and process the file, and then move the file to other directory for archiving.
the user id: uftp1, group: ftp
the program run in oracle database, thus have the user Id: oraprod, group: dba
how to... (2 Replies)
Discussion started by: siakhooi
2 Replies
10. UNIX for Dummies Questions & Answers
i have an application that writes to a directory. let's call the directory:
/var/app/
the permissions of this directory is:
drwxrwxr-x
Now the files that the application creates in this directory usually dont have read permissions for others.
i know there's something called... (3 Replies)
Discussion started by: SkySmart
3 Replies
LEARN ABOUT DEBIAN
gshadow
GSHADOW(5) File Formats and Conversions GSHADOW(5)
NAME
gshadow - shadowed group file
DESCRIPTION
/etc/gshadow contains the shadowed information for group accounts.
This file must not be readable by regular users if password security is to be maintained.
Each line of this file contains the following colon-separated fields:
group name
It must be a valid group name, which exist on the system.
encrypted password
Refer to crypt(3) for details on how this string is interpreted.
If the password field contains some string that is not a valid result of crypt(3), for instance ! or *, users will not be able to use a
unix password to access the group (but group members do not need the password).
The password is used when an user who is not a member of the group wants to gain the permissions of this group (see newgrp(1)).
This field may be empty, in which case only the group members can gain the group permissions.
A password field which starts with a exclamation mark means that the password is locked. The remaining characters on the line represent
the password field before the password was locked.
This password supersedes any password specified in /etc/group.
administrators
It must be a comma-separated list of user names.
Administrators can change the password or the members of the group.
Administrators also have the same permissions as the members (see below).
members
It must be a comma-separated list of user names.
Members can access the group without being prompted for a password.
You should use the same list of users as in /etc/group.
FILES
/etc/group
Group account information.
/etc/gshadow
Secure group account information.
SEE ALSO
gpasswd(5), group(5), grpck(8), grpconv(8), newgrp(1).
shadow-utils 4.1.5.1 05/25/2012 GSHADOW(5)