Sponsored Content
Operating Systems Linux Red Hat Is there limit on number of ACLs' per directory in Redhat Post 302992837 by waavman on Thursday 2nd of March 2017 08:52:49 AM
Old 03-02-2017
Sure Bakunin, thats a good suggestion. I will look into feasibility of implementing that.
However that set aside, does anybody know if there is in fact a technical limit on the number of ACLs' supported by RedHat Linux beyond which it might impact the OS stability. I am not able to find that information anywhere online. As an FYI I am using Red Hat Enterprise Linux Server release 5.10.
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Directory limit

I'm setting up a file server for users. Does anyone know how I can limit each users directory to 500MB? -------------- Runing Solaris 8 (3 Replies)
Discussion started by: merlin
3 Replies

2. UNIX for Advanced & Expert Users

limit to number of files in a given directory

Everyone, We are on a unix AIX 4.3 platform and our application is written as such that all configuration files must reside in a specific directory. Currently there are over 10,000 files in this directory (and growing at about 300 per month). My question is is there a physical limit to the... (2 Replies)
Discussion started by: hedrict
2 Replies

3. Shell Programming and Scripting

limit the number of jobs to run.

i just want to get the BackGround status and limit the number of jobs to run the at a time. can i able get the back ground exit status ? that i code below. can jobs -l limit the number of jobs to run ? total is this script looks fine ? cat run_job.ksh #!/usr/bin/ksh... (0 Replies)
Discussion started by: GrepMe
0 Replies

4. UNIX for Dummies Questions & Answers

Number of long limit

Hi Hi! I'm currently using AIX 5.2 and would like to know where can i find to see that there's a restriction on the number of login times a user can have. Example, I want give a 2 login per user but some one to give 3 login and some one have to give unlit login time (without logging off the... (2 Replies)
Discussion started by: herath
2 Replies

5. Ubuntu

Redhat 2.1 AS Memory Limit?

I have a customer with an HP DL380 G4 server running Redhat 2.1 AS that has 4GB memory installed. They want to upgrade in the server to the maximum of 12GB using (6) 2GB DIMMs. I can do this for them, but I read somewhere that Redhat 2.1 has an upper memory limit. Or you need a kernel patch to use... (2 Replies)
Discussion started by: Cbish68
2 Replies

6. Solaris

How to limit number of Commands

Is there a way that I can limit number of commands that one user can run during period of time. For example Max 10 commands per senconds.:) (3 Replies)
Discussion started by: winger0608
3 Replies

7. Programming

How to limit the number of child processes

I need a mechanism to fork child processes and all child processes should connect to a server.but the number of child processes should be limited(for ex:50) Here's my pseudo, but I cant figure out how to limit the child process number. Should I use a semaphore? or what? for(;;)... (3 Replies)
Discussion started by: xyzt
3 Replies

8. UNIX for Dummies Questions & Answers

Limit Number of files

hi guys how can i limit number of files in a disk or partition ? or how can i make a limit to inode number for a disk or partition ? ext3 or ext4 file system (1 Reply)
Discussion started by: mhs
1 Replies

9. Cybersecurity

Limit CPU and RAM utilization for new user in RedHat

We have a system with 4 Xeon Processors each with 10 cores, total 512 GB RAM and 10 TB Hard Drive. we want to create multiple user accounts with different resource limitations as : User 1: RAM : 50GB, PROCESSOR: 10 Cores , User folder in home directory of 10GB space. User 2: RAM :... (5 Replies)
Discussion started by: vaibhavvsk
5 Replies

10. UNIX for Beginners Questions & Answers

Limit number of files transferred

I've a folder in remote server and it has 50 files. I like to transfer these files by first 10 and next 10 files. I'm using mget command to transfer the files. How to limit the file transfer limit to 10. instead of copying 50 files at a time. Thanks Janarthan (5 Replies)
Discussion started by: Janarthan
5 Replies
Jifty::Plugin::OAuth(3pm)				User Contributed Perl Documentation				 Jifty::Plugin::OAuth(3pm)

NAME
Jifty::Plugin::OAuth - secure API authorization DESCRIPTION
An OAuth web services API for your Jifty app. Users may grant limited authorization to other applications in a secure way. This plugin adds an "/oauth" set of URLs to your application, listed below. It also adds "is_oauthed" and "oauth_token" to Jifty::CurrentUser, so you may have additional restrictions on OAuth access (such as forbidding OAuthed users to change users' passwords). /oauth This lists some basic information about OAuth, and where to learn more. It also tells consumers how they may gain OAuth-ability for your site. /oauth/request_token The URL at which consumers POST to get a request token /oauth/authorize The URL at which users authorize request tokens /oauth/authorized After authorizing or denying a request token, users are directed here before going back to the consumer's site /oauth/access_token The URL that consumers POST to trade an authorized request token for an access token, with which they may act on the user's behalf WARNING
This plugin is beta. Please let us know if there are any issues with it. USAGE
Add the following to your config: framework: Plugins: - OAuth: {} GLOSSARY
service provider A service provider is an application that has users who have private data. This plugin enables your Jifty application to be an OAuth service provider. consumer A consumer is an application that wants to access or change users' private data. The service provider (in this case, this plugin) ensures that this happens securely and with users' full approval. Without OAuth (or similar systems), this would be accomplished perhaps by the user giving the consumer her login information. Obviously not ideal. This plugin does not implement the protocol as a consumer, only as a service provider. You'll likely want more control and flexibility as a consumer. request token A request token is a unique, random string that a user may authorize for a consumer. access token An access token is a unique, random string that a consumer can use to access private resources on the authorizing user's behalf. Consumers may only receive an access token if they have an authorized request token. NOTES
You must provide consumers access to "/oauth/request_token" and "/oauth/access_token". You could restrict "/oauth/request_token" and "/oauth/access_token" to only logged-in users and require consumers to log in. Perhaps you could have a column in your users table that represents whether this user is a consumer and restrict access to these URLs that way. Or, you could let anyone access these URLs. This policy is left you as the developer. Limiting access is wise because each hit to "/oauth/request_token" and "/oauth/access_token" uses some entropy (so an attacker could run a denial-of-service attack against you) You should not allow public access to "/oauth/authorize". "/oauth/authorize" will throw a 401 (unauthorized) error if an unauthenticated user accesses it. On unauthenticated access of "/oauth/authorize", you should tangent the user to your login page to improve usability. You should allow public access to "/oauth". This has some information for consumers. There is currently no way for consumers to add themselves. This might change in the future, with an OAuth extension. Consumers must contact you and provide you with the following data: consumer_key An arbitrary string that uniquely identifies a consumer. Preferably something random over, say, "Hiveminder". secret A (preferably random) string that is used to ensure that it's really the consumer you're talking to. After the consumer provides this to you, it's never sent in plaintext. It is always, however, included in cryptographic signatures. name A readable name to use in displaying the consumer to users. This is where you'd put "Hiveminder". url (optional) The website of the consumer. rsa_key (optional) The consumer's public RSA key. This is optional. Without it, they will not be able to use the RSA-SHA1 signature method. They can still use HMAC-SHA1 though. TECHNICAL DETAILS
OAuth is an open protocol that enables consumers to access users' private data in a secure and authorized manner. The way it works is: o The consumer establishes a key and a secret with the service provider. This step only happens once, and is currently manual. o The user is using the consumer's application and decides that she wants to use some data that she already has on the service provider's application. o The consumer asks the service provider for a request token. The service provider generates one and gives it to the consumer. o The consumer directs the user to the service provider with that request token. o The user logs in and authorizes that request token. o The service provider directs the user back to the consumer. o The consumer asks the service provider to exchange his authorized request token for an access token. This access token lets the consumer access resources on the user's behalf in a limited way, for a limited amount of time. By establishing secrets and using signatures and timestamps, this can be done in a very secure manner. For example, a replay attack (an eavesdropper repeats a request made by a legitimate consumer) is actively defended against. METHODS
init This adds an is_oauthed accessor to Jifty::CurrentUser. It also establishes a trigger in Jifty::Record so that only OAuthed consumers with write access can do anything other than read. SEE ALSO
Net::OAuth::Request, <http://oauth.net/> AUTHOR
Shawn M Moore "<sartak@bestpractical.com>" LICENSE
Jifty::Plugin::OAuth is Copyright 2007-2008 Best Practical Solutions, LLC. Jifty::Plugin::OAuth is distributed under the same terms as Perl itself. perl v5.12.4 2009-11-19 Jifty::Plugin::OAuth(3pm)
All times are GMT -4. The time now is 03:39 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy