05-03-2011
There are three types of permissions:
- read access
- write access
- execute access
Use
chmod or chgrp
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hello,
Another newbie here and here is my dilemma. I created an account for me on Solaris 8 and I added myself to the root group. But when I login using that account I am unable to do superuser tasks.. (add users, admintool, etc). What am I missing? Thanks in advance..
Andre (5 Replies)
Discussion started by: jacobsa
5 Replies
2. Filesystems, Disks and Memory
Hi,
there is one strange situation with directory permissions that I run into every now and then, and now I face it a gain with a webserver.
Situation (example):
drwxrwsr-x 14 user www-data 4096 Jul 28 11:06 .
drwxr-xr-x 2 www-data www-data 4096 Jul 28 11:06 subdir
-rwxr-xr-x 1... (3 Replies)
Discussion started by: doozer
3 Replies
3. AIX
I was doing a little playing around with permissions on a 5.3 box in the office and wanted to make it so that it does not take root permission to delete a users home directory once they are deactivated or deleted in smit.
the default permissions are 755 with bin as both user and group
I noticed... (2 Replies)
Discussion started by: dgaixsysadm
2 Replies
4. Shell Programming and Scripting
Hi,
Is their a way to check the read and execute permission on a file on OTHERS and GROUP
rwxr--r-x
I am trying something like:
if ( || )
then
....
fi
The code above only checks the permissions of the owner of the file but not for the GROUP and OTHERS.
I will really... (5 Replies)
Discussion started by: rkumar28
5 Replies
5. Solaris
Does any one know if changing root's group from “other” to “root” will cause any problems on a running system.
Thanks (4 Replies)
Discussion started by: mjkroner
4 Replies
6. UNIX for Dummies Questions & Answers
Hi,
I've created a user named fwadmin, group named fwadmin and made the user belong to that group. I created the user and group using the 'User Manager' in Centos.
The user belongs to /etc/fw.Does this also mean that the group fwadmin belongs to /etc/fw. That is what I want.
But when I... (4 Replies)
Discussion started by: anaigini45
4 Replies
7. Solaris
I am a member of a few different user groups.
I would like to see what the difference is....
Can anyone tell me how to look at permissions side by side ?
We are using :
SunOS xxxxxx 5.10 Generic_127111-09 sun4u sparc SUNW,Sun-Fire-V440
Thanks ! (10 Replies)
Discussion started by: popeye
10 Replies
8. UNIX for Advanced & Expert Users
What would be a practical way of making sure files I upload to/edit in a particular directory on a server always have the correct group permissions?
I'm forgetful, so I try to automate things like chgrp'ing the files when I'm done. I could write a script to be run by cron. Is that the only way,... (2 Replies)
Discussion started by: mregine
2 Replies
9. UNIX for Advanced & Expert Users
I have a user who has had an id change. His old id was xl00 his new id b000999. Both id's are in group bauser. The user now cannot access his old files even though he is in the same group and permissions seem to be ok. See below, first 2 files he can't see, second two are no problem.
... (2 Replies)
Discussion started by: dw82199
2 Replies
10. Web Development
I am working on setup a wiki which should have users and group having read or write permission.
Before that we were using simple write to all methodology.
Now the challenge is this that i have created a 3 users and all of the 3 are able to write to wiki and update the page. Now what i what to... (0 Replies)
Discussion started by: sunnysthakur
0 Replies
LEARN ABOUT REDHAT
access
ACCESS(2) Linux Programmer's Manual ACCESS(2)
NAME
access - check user's permissions for a file
SYNOPSIS
#include <unistd.h>
int access(const char *pathname, int mode);
DESCRIPTION
access checks whether the process would be allowed to read, write or test for existence of the file (or other file system object) whose
name is pathname. If pathname is a symbolic link permissions of the file referred to by this symbolic link are tested.
mode is a mask consisting of one or more of R_OK, W_OK, X_OK and F_OK.
R_OK, W_OK and X_OK request checking whether the file exists and has read, write and execute permissions, respectively. F_OK just requests
checking for the existence of the file.
The tests depend on the permissions of the directories occurring in the path to the file, as given in pathname, and on the permissions of
directories and files referred to by symbolic links encountered on the way.
The check is done with the process's real uid and gid, rather than with the effective ids as is done when actually attempting an operation.
This is to allow set-UID programs to easily determine the invoking user's authority.
Only access bits are checked, not the file type or contents. Therefore, if a directory is found to be "writable," it probably means that
files can be created in the directory, and not that the directory can be written as a file. Similarly, a DOS file may be found to be "exe-
cutable," but the execve(2) call will still fail.
If the process has appropriate privileges, an implementation may indicate success for X_OK even if none of the execute file permission bits
are set.
RETURN VALUE
On success (all requested permissions granted), zero is returned. On error (at least one bit in mode asked for a permission that is
denied, or some other error occurred), -1 is returned, and errno is set appropriately.
ERRORS
access shall fail if:
EACCES The requested access would be denied to the file or search permission is denied to one of the directories in pathname.
ELOOP Too many symbolic links were encountered in resolving pathname.
ENAMETOOLONG
pathname is too long.
ENOENT A directory component in pathname would have been accessible but does not exist or was a dangling symbolic link.
ENOTDIR
A component used as a directory in pathname is not, in fact, a directory.
EROFS Write permission was requested for a file on a read-only filesystem.
access may fail if:
EFAULT pathname points outside your accessible address space.
EINVAL mode was incorrectly specified.
EIO An I/O error occurred.
ENOMEM Insufficient kernel memory was available.
ETXTBSY
Write access was requested to an executable which is being executed.
RESTRICTIONS
access returns an error if any of the access types in the requested call fails, even if other types might be successful.
access may not work correctly on NFS file systems with UID mapping enabled, because UID mapping is done on the server and hidden from the
client, which checks permissions.
Using access to check if a user is authorized to e.g. open a file before actually doing so using open(2) creates a security hole, because
the user might exploit the short time interval between checking and opening the file to manipulate it.
CONFORMING TO
SVID, AT&T, POSIX, X/OPEN, BSD 4.3
SEE ALSO
stat(2), open(2), chmod(2), chown(2), setuid(2), setgid(2)
Linux 2002-04-23 ACCESS(2)