Sponsored Content
Top Forums UNIX for Advanced & Expert Users Question for expert only in Access control list Post 302989095 by mecnio on Saturday 7th of January 2017 07:03:33 PM
Old 01-07-2017
Question Question for expert only in Access control list

If I'm the admin for the financial system and I want to configure authorization pf file system permission.Also, The first rule is that Managers and clerks can read and write billings for all cases. The second rules is that Paralegals and administrative assits can read and write billings only on cases assigned to their supervising Manager.
how to write these rules in Linux by using ACL approach
 

10 More Discussions You Might Find Interesting

1. Filesystems, Disks and Memory

Access Control

In Windows XP, there are 3 default access control groups namely: Administrators, Users and Power Users. Is there default access control groups in Unix system? If there is, what are they? newbie. (1 Reply)
Discussion started by: zertoir
1 Replies

2. UNIX for Dummies Questions & Answers

Access control Lists

Hi, I was wondering if someone could help me with ACL's. I have a file, say output, created by the root user, member of group other. Its permissions are rwxr--r--. I want only people in group other to have rwx access, but I also want one other user, stephen, member of some_other_group to have rwx... (1 Reply)
Discussion started by: sroberts82
1 Replies

3. Shell Programming and Scripting

Access Control List

Hey all, I have a directory (own by user: b; group: grpB) which I want a user (user: a; group: grpA) to be able to read and execute from, I wonder if I should add user a to this particular directory's ACL or that I would add group grpB to user a's subgroup? I would like to know the difference... (3 Replies)
Discussion started by: mpang_
3 Replies

4. Solaris

Command for access control list

Hi, I want to set access control list on folders but it should be recursively, any Idea? command (1 Reply)
Discussion started by: manoj.solaris
1 Replies

5. UNIX for Dummies Questions & Answers

FTP access & control question

Folks; I need some help with these: 1. understanding how to control access rights and manage visibility using FTP in Solaris, in other words, I need to use FTP in Solaris to be able to give some users access to add/modify data to/from the UNIX server. 2. How can i control the space allowed for... (2 Replies)
Discussion started by: Katkota
2 Replies

6. UNIX for Dummies Questions & Answers

Does U*X have Access Control Lists?

In OS like windows, I can define an Access Control List (ACL) and specify which accounts and groups have what access to a specific file. I assume U*X, Linux and cygwin on windows have this ACL feature too. I'm using cygwin on windows. What do I type at a bash prompt to allow a specific user... (1 Reply)
Discussion started by: siegfried
1 Replies

7. UNIX for Dummies Questions & Answers

Internet Access Control

I need to control intenet access @ work. xample. I need PC 1 to only be able to access these five sites and add to the list as needed. Can anyone pint me a direction. (1 Reply)
Discussion started by: fruiz
1 Replies

8. AIX

Access control using LDAP

Hello, I've configurated a LDAP user authentication on AIX V6 against Active Directory (Windows Server 2008). The Tree is built as follows: test (DC) |--- testgroup (group with members: user1, user2) | |--- sys1 (OU) | |--- sys1group (group with member: user1) | |--- sys2 (OU)... (0 Replies)
Discussion started by: xia777
0 Replies

9. UNIX for Dummies Questions & Answers

eTrust Access Control

Hi, I am using eTrust Access Control at work. I have got no output after type checklogin. I wonder what is the reason. Does anyone know? Thanks eTrustAC selang v8.00a-1555.13 - eTrustAC command line interpreter Copyright (c) 2006 CA. All rights reserved. eTrustAC> checklogin user1... (0 Replies)
Discussion started by: uuontario
0 Replies

10. Proxy Server

How to use Squid on Linux to control certain IP to access Web Server and certain IP cannot access?

Dear all experts here, :) I would like to install a proxy server on Linux server to perform solely to control the access of Web server. In this case, some of my vendor asked me to try Squid and I have installed it onto my Linux server. I would like know how can I set the configuration to... (1 Reply)
Discussion started by: kwliew999
1 Replies
UIF(8)							      System Manager's Manual							    UIF(8)

UIF(8)							    BSD System Manager's Manual 						    UIF(8)

NAME
uif -- Tool for generating optimized packetfilter rules SYNOPSIS
uif [-dptW] [-b base] [-c config_file] [-C config_file] [-D bind_dn] [-r ruleset] [-R ruleset] [-s server] [-T time] [-w password] DESCRIPTION
This manual page documents the uif command. It is used to generate optimized iptables(8) packetfilter rules, using a simple description file specified by the user. Generated rules are provided in iptables-save(8) style. uif can be used to read or write rulesets from or to LDAP servers in your network, which provides a global storing mechanism. (LDAP support is currently broken, note that you need to include the uif.schema to your slapd configuration in order to use it.) uif.conf(5) provides an easy way to specify rules, without exact knowledge of the iptables syntax. It provides groups and aliases to make your packetfilter human readable. Keep in mind that uif is intended to assist you when designing firewalls, but will not tell you what to filter. Options The options are as follows: -b base Specify the base to act on when using LDAP based firewall configuration. uif will look in the subtree ou=filter, ou=sysconfig, base for your rulesets. -c config_file This option specifies the configuration file to be read by uif. See uif.conf(5) for detailed informations on the fileformat. It defaults to /etc/uif/uif.conf. -C config_file When reading configuration data from other sources than specified with -c you may want to convert this information into a textual configuration file. This options writes the parsed config back to the file specified by config_file. -d Clears all firewall rules immediatly. -D bind_dn If a special account is needed to bind to the LDAP database, the account dn can be specified at this point. Note: you should use this when writing an existing configuration to the LDAP. Reading the configuration may be done with an anonymous bind. -p Prints rules specified in the configuration to stdout. This option is mainly used for debugging the rule simplifier. -r ruleset Specifies the name of the ruleset to load from the LDAP database. Remember to use the -b option to set the base. Rulesets are stored using the following dn: cn=name, ou=rulesets, ou=filter, ou=sysconfig, base, where name will be replaced by the ruleset specified. -R ruleset Specifies the name of the ruleset to write to the LDAP database. This option can be used to convert i.e. a textual configuration to a LDAP based ruleset. Like using -r you've to specify the LDAP base to use. Target is cn=name, ou=rulesets, ou=filter, ou=sysconfig, base, where name will be replaced by the ruleset specified. -s server This option specified the LDAP server to be used. -t This option is used to validate the packetfilter configuration without applying any rules. Mainly used for debugging. -T time When changing your packetfiltering rules remotely, it is usefull to have a test option. Specify this one to apply your rules for a period of time (in seconds). After that the original rules will be restored. -w password When connecting to the LDAP server, you may need to authenticate via passwords. If you really need to specify a password, use this option, otherwise use -W and enter it interactivly. -W Activate interactive password query for LDAP authentication. uif is meant to leave the packetfilter rules in a defined state, so if something went wrong during the initialisation, or uif is aborted by the user, the rules that were active before starting will be restored. Normally you will not need to call this binary directly. Use the init script instead, since it does the most common steps for you. FILES
Configuration files are located in /etc/uif. SEE ALSO
uif.conf(5) iptables(8) AUTHOR
This manual page was written by Cajus Pollmeier <pollmeier@gonicus.de> and Jorg Platte <joerg.platte@gmx.de>, for the Debian GNU/Linux system (but may be used by others). UIF(8) May 24, 2002 UIF(8)
All times are GMT -4. The time now is 03:04 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy