Sponsored Content
Operating Systems Linux Read only access for Group called "Developers" to all folders on the Centos 6.6 Post 302954723 by blackrageous on Thursday 10th of September 2015 11:51:40 AM
Old 09-10-2015
I would not allow users to have read only access to every file on the server. This would imply sweeping changes. Why not identify the collection of files they need access too and consider using the other/world field. Why didn't acl's work?
 

8 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

how to request a "read" or "delivered" receipt for mails

Dears, I've written a script which allows me to send mails in different formats with different attaches. Now I still want to add a feature to this script. My users would like to be able to receive a "read" or "delivered" receipt for their mails. The script send mails on behalve of an specific... (1 Reply)
Discussion started by: plelie2
1 Replies

2. Windows & DOS: Issues & Discussions

Samba (SMB) client fails: "Called name not present"

Hi, I issue smbclient on a Linux REd hat server : smbclient -L ***.16.0.42 -U domaine/Administrator Password: Domain= OS= Server= Domain= OS= Server= Sharename Type Comment --------- ---- ------- IPC$ IPC IPC distant ... (0 Replies)
Discussion started by: big123456
0 Replies

3. UNIX for Advanced & Expert Users

All alias in .profile lost when "script" command is called

Hi, I was trying to call "script <an ip add>" command from .profile file to log everything whenever anyone logs in to this user. I did the following at the end of .profile. 1) Extracted the IP address who logged in 2) Called script < ip add> . The problem I am facing is all, aliases etc. written... (3 Replies)
Discussion started by: amicon007
3 Replies

4. Shell Programming and Scripting

read -p "prompt text" foo say "read: bad option(s)" in Bourne-Shell

Hallo, i need a Prompting read in my script: read -p "Enter your command: " command But i always get this Error: -p: is not an identifier When I run these in c-shell i get this error /usr/bin/read: read: bad option(s) How can I use a Prompt in the read command? (9 Replies)
Discussion started by: wiseguy
9 Replies

5. Shell Programming and Scripting

awk command to replace ";" with "|" and ""|" at diferent places in line of file

Hi, I have line in input file as below: 3G_CENTRAL;INDONESIA_(M)_TELKOMSEL;SPECIAL_WORLD_GRP_7_FA_2_TELKOMSEL My expected output for line in the file must be : "1-Radon1-cMOC_deg"|"LDIndex"|"3G_CENTRAL|INDONESIA_(M)_TELKOMSEL"|LAST|"SPECIAL_WORLD_GRP_7_FA_2_TELKOMSEL" Can someone... (7 Replies)
Discussion started by: shis100
7 Replies

6. Shell Programming and Scripting

Purpose of "read" and "$END$" in ksh ?

Hi, Could anyone please shed some light on the following script lines and what is it doing as it was written by an ex-administrator? cat $AMS/version|read a b verno d DBVer=$(/usr/bin/printf "%7s" $verno) I checked that the cat $AMS/version command returns following output: ... (10 Replies)
Discussion started by: dbadmin100
10 Replies

7. Shell Programming and Scripting

Read from "list1" and list matches in "list2"

I want to print any matching IP addresse in List1 with List 2; List 1 List of IP addresses; 161.85.58.210 250.57.15.129 217.23.162.249 74.76.129.101 30.221.177.237 3.147.200.59 170.58.142.64 127.65.109.33 150.167.242.146 223.3.20.186 25.181.180.99 2.55.199.32 (3 Replies)
Discussion started by: lewk
3 Replies

8. UNIX for Dummies Questions & Answers

Using "mailx" command to read "to" and "cc" email addreses from input file

How to use "mailx" command to do e-mail reading the input file containing email address, where column 1 has name and column 2 containing “To” e-mail address and column 3 contains “cc” e-mail address to include with same email. Sample input file, email.txt Below is an sample code where... (2 Replies)
Discussion started by: asjaiswal
2 Replies
chacl(1)						      General Commands Manual							  chacl(1)

NAME
chacl - add, modify, delete, copy, or summarize access control lists (ACLs) of files SYNOPSIS
acl file ... acl file ... aclpatt file ... fromfile tofile ... file... DESCRIPTION
extends the capabilities of chmod(1), by enabling the user to grant or restrict file access to additional specific users and/or groups. Traditional file access permissions, set when a file is created, grant or restrict access to the file's owner, group, and other users. These file access permissions (eg., are mapped into three base access control list entries: one entry for the file's owner (umode), one for the file's group g, mode), and one for other users mode). enables a user to designate up to thirteen additional sets of permissions (called optional access control list (ACL) entries) which are stored in the access control list of the file. To use chacl, the owner (or superuser) constructs an acl, a set of (user.group, mode) mappings to associate with one or more files. A spe- cific user and group can be referred to by either name or number; any user (u), group (g), or both can be referred to with a symbol, repre- senting any user or group. The @ symbol specifies the file's owner or group. Read, write, and execute/search modes are identical to those used by chmod; symbolic operators (op) add remove or set access rights. The entire acl should be quoted if it contains whitespace or special characters. Although two variants for constructing the acl are available (and fully explained in acl(5)), the following syntax is suggested: entry[, entry] ... where the syntax for an entry is u.g op mode[op mode] ... By default, modifies existing ACLs. It adds ACL entries or modifies access rights in existing ACL entries. If acl contains an ACL entry already associated with a file, the entry's mode bits are changed to the new value given, or are modified by the specified operators. If the file's ACL does not already contain the specified entry, that ACL entry is added. can also remove all access to files. Giving it a null acl argument means either ``no access'' (when using the option) or ``no changes.'' For a summary of the syntax, run without arguments. If file is specified as reads from standard input. Options recognizes the following options: Replace old ACLs with the given ACL. All optional ACL entries are first deleted from the specified files's ACLs, their base permissions are set to zero, and the new ACL is applied. If acl does not contain an entry for the owner (uthe group g), or other users of a file, that base ACL entry's mode is set to zero (no access). The command affects all of the file's ACL entries, but does not change the file's owner or group ID. In chmod(1), the ``modify'' and ``replace'' operations are distinguished by the syntax (string or octal value). There is no corollary for ACLs because they have a variable number of entries. Hence modifies specific entries by default, and option- ally replaces all entries. Delete the specified entries from the ACLs on all specified files. The aclpatt argument can be an exact ACL or an ACL pattern (see acl(5)). updates each file's ACL only if entries are deleted from it. If you attempt to delete a base ACL entry from any file, the entry remains but its access mode is set to zero (no access). If you attempt to delete a non-existent ACL entry from a file (that is, if an ACL entry pattern matches no ACL entry), informs you of the error, continues, and eventually returns non-zero. Copy the ACL from fromfile to the specified tofile, transferring ownership, if necessary (see acl(5), chown(2), or chownacl(3C)). fromfile can be to represent standard input. This option implies the option. If the owner and group of fromfile are identical to those of tofile, is identical to: To copy an ACL without transferring ownership, the above command is suggested instead of Delete (``zap'') all optional entries in the specified file's ACLs, leaving only base entries. Delete (``zap'') all optional entries in the specified file's ACLs, and set the access modes in all base entries to zero (no access). This is identical to replacing the old ACL with a null ACL: or using chmod(1), which deletes optional entries as a side effect: Incorporate (``fold'') optional ACL entries into base ACL entries. The base ACL entry's permission bits are altered, if necessary, to reflect the caller's effective access rights to the file; all optional entries, if any, are deleted. For ordinary users, only the access mode of the owner base ACL entry can be altered. Unlike the write bit is not turned off for a file on a read-only file system or a shared-text program being executed (see getaccess(1)). For super-users, only the execute mode bit in the owner base ACL entry might be changed, only if the file is not an regular file or if an execute bit is not already set in a base ACL entry mode, but is set in an optional ACL entry mode. acl also can be obtained from a string in a file: Using @ in acl to represent ``file owner or group'' can cause to run more slowly because it must reparse the ACL for each file (except with the option). EXTERNAL INFLUENCES
Environment Variables determines the language in which messages are displayed. If is not specified or is set to the empty string, a default of "C" (see lang(5)) is used instead of If any internationalization variable contains an invalid setting, behaves as if all internationalization variables are set to "C". See environ(5). RETURN VALUE
If succeeds, it returns a value of zero. If encounters an error before it changes any file's ACL, it prints an error message to standard error and returns 1. Such errors include invalid invocation, invalid syntax of acl (aclpatt), a given user name or group name is unknown, or inability to get an ACL from fromfile with the option. If cannot execute the requested operation, it prints an error message to standard error, continues, and later returns 2. This includes cases when a file does not exist, a file's ACL cannot be altered, more ACL entries would result than are allowed, or an attempt is made to delete a non-existing ACL entry. EXAMPLES
The following command adds read access for user in any group, and removes write access for any user in the files's groups, for files and This command replaces the ACL on the file open as standard input and on file with one which only allows the file owner read and write access. Delete from file the specific access rights, if any, for user 165 in group 13. Note that this is different from adding an ACL entry that restricts access for that user and group. The user's resulting access rights depend on the entries remaining in the ACL. The command also deletes all entries for user that have a read bit turned on (the asterisk can be used as a wildcard in the ACL pattern for user, group, or access mode): Copy the ACL from to and Delete the optional ACL entries, if any, on the file open as standard input. Deny all access to all files in the current directory whose names start with or Incorporate the optional ACL entries of a file into the base ACL entries: WARNINGS
An ACL string cannot contain more than 16 unique entries, even though converting @ symbols to user or group names and combining redundant entries might result in fewer than 16 entries for some files. DEPENDENCIES
will fail when the target file resides on a file system which does not support ACLs. NFS Only the option is supported on remote files. AUTHOR
was developed by HP. SEE ALSO
chmod(1), getaccess(1), lsacl(1), getacl(2), setacl(2), acl(5), glossary(9). chacl(1)
All times are GMT -4. The time now is 07:42 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy