Restrict access to a set of people in a group


 
Thread Tools Search this Thread
Top Forums UNIX for Dummies Questions & Answers Restrict access to a set of people in a group
# 1  
Old 02-01-2011
MySQL Restrict access to a set of people in a group - Unix directory

Hi,

How can I restrict access to a set of people in a group on a directory?

Ex.. The following are the permissions on a directory (dir1)

rwxrwxr-- own1 grp1 dir1
where own1 is the owner
grp1 is the group name
and dir1 is the directory name.

So., Is there any way that only few id's in grp1 can be given rwx permissions while the others in grp1 can be given only r-x permission without moving the id's to a seperate group?

Any kind of help is appreciated!!!!!
SmilieSmilie

Last edited by brahmi; 02-01-2011 at 06:23 PM..
 
Login or Register to Ask a Question

Previous Thread | Next Thread

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Restrict access

I'm trying to use squid to restrict elinks' access to certain websites(only http traffic). I have tried some configs in squid.conf but no luck. Hope someone has a bit of time to explain me how can you make these config's :) ---------- Post updated at 05:40 PM ---------- Previous update was at... (1 Reply)
Discussion started by: Birnbacher
1 Replies

2. Ubuntu

Restrict SUDO Access

Linux ubuntu 3.0.0-12-generic #20-Ubuntu SMP Fri Oct 7 14:56:25 UTC 2011 x86_64 x86_64 x86_64 GNU/Linux Hi Folks, Please help me. I am bit struck here. Here is the OS info. Linux ubuntu 3.0.0-12-generic #20-Ubuntu SMP Fri Oct 7 14:56:25 UTC 2011 x86_64 x86_64 x86_64 GNU/Linux I have a... (17 Replies)
Discussion started by: explorer007
17 Replies

3. Red Hat

Restrict user access

Hi there I have an application user on my system that wants accesses to these file systems as such: rwx: /SAPO /SAPS12 /R3_888 /R3_888B /R3_888F /R3_888R r: /usr/sap these are the existing FS permissions:ownerships: # ls -ld /SAPO (9 Replies)
Discussion started by: hedkandi
9 Replies

4. UNIX for Dummies Questions & Answers

Restrict user access.

Hi All, How can we restrict a particular user access to a particular shell in solaris 10. Thanks in Advance. (5 Replies)
Discussion started by: rama krishna
5 Replies

5. UNIX for Advanced & Expert Users

Restrict Access to the folder

Hi I have requirement to create 3 new users on my server but to restrict their access to a set of particular folders. /export/home/kapil/shared, /export/home/kapil/shared/Folder1 /export/home/kapil/shared/Folder2 These folders should be accessible to all the 3 users and to me too.... (1 Reply)
Discussion started by: kapilk
1 Replies

6. UNIX for Dummies Questions & Answers

How to create/restrict a user with to have no privilege from other group

Hello experts I am new to Unix. Env : HPUX I need to create a user say testuser such that it does not have access to file/directories from the other group i.e the last 3 digits . How do I do that. Reason for such a request :- I have an existing user oracle which has default umask... (3 Replies)
Discussion started by: simonsimon
3 Replies

7. UNIX for Advanced & Expert Users

Restrict access to specific users.

Hi All! I would like to know if there is any specific way by which I can restrict access to apecific users (ip addresses). OS : Red hat linux Thanks! nua7 (6 Replies)
Discussion started by: nua7
6 Replies

8. HP-UX

how to know the no of people access a same file

how to know the no of people access a same file at a time? (1 Reply)
Discussion started by: megh
1 Replies

9. UNIX for Dummies Questions & Answers

Can we set it so people can't use the same password twice?

If we have it so users accounts need a new password after 90 days is there a way to also say that after 90 days they need to use a new password and not let them use the same one twice? (2 Replies)
Discussion started by: LordJezo
2 Replies

10. HP-UX

How to restrict a user group to access the kernel

Hi, Please any one can help me to know that how we can restrict a user group to access the kernel at all. (0 Replies)
Discussion started by: harishankar
0 Replies
Login or Register to Ask a Question
cp(1)							      General Commands Manual							     cp(1)

NAME
cp - Copies files SYNOPSIS
cp [-fhip] [--] source_file destination_file cp [-fhip] [--] source_file... destination_directory cp [-fhip] [-r | -R] [--] [source_file | source_directory]... destination_directory The cp command copies a source file or the files in a source directory to a destination file or directory. If your source and destination are directories, the source is copied to the destination and created with the same name. STANDARDS
Interfaces documented on this reference page conform to industry standards as follows: cp: XCU5.0 Refer to the standards(5) reference page for more information about industry standards and associated tags. OPTIONS
[Tru64 UNIX] The cp command does not prompt you when an existing file is to be overwritten. (If both -f and -i are specified on the com- mand line--for example, because an alias includes one of them--whichever appears last overrides the other.) [Tru64 UNIX] Together with the -R option, the same as the -r option. Prompts you with the name of the file whenever the copy would cause an existing file to be over- written. An answer beginning with y, or the locale's equivalent of y, causes cp to continue. Any other answer prevents it from overwriting the file. Preserves for the copy the modification time, access time, file mode, user ID, and group ID of the original, as allowed by per- missions. If the user ID and group ID cannot be preserved, no error message is displayed and the exit value is not altered. If the origi- nal is set-user-ID or set-group-ID, and either the user ID or the group ID cannot be preserved, the set-user-ID and set-group-ID bits are not preserved in the copy's permissions. [Tru64 UNIX] Preserves the extended file attributes (property list), including the access control list (ACL) if any. When the source is a directory, copies the directory and the entire subtree connected at that point. Special file types, such as symbolic links, named pipes (FIFOs), and block and character devices, are opened and their contents are copied to regular files having the same name. (This may be desired for links but is probably not desired for disk, tape, or network devices.) For example, if a is a symbolic link to file z and a is copied to b with the -r option, b is not a symbolic link to file z but is a copy of it. As with -r, when the source is a directory, copies the directory and the entire subtree connected at that point. However, destination_files are created with the same file types as source_files, for instance symbolic links, named pipes (FIFOs), or block or character devices. As an example, if a is a symbolic link to file z and a is copied to b with the -R option, b will also be a symbolic link to file z. If source_file is a FIFO, the file permission bits of destination_file are set to those of source_file modified by the file creation mask of the user if the -p option is not used. Indicates that the arguments following this option are to be interpreted as file names. This null option allows the specification of file names that start with a minus. DESCRIPTION
If a destination file already exists, its contents are overwritten if permissions allow, but cp does not change its mode, user ID, or group ID. However, if the file is not being copied by the root user, writing the file may clear the set-user-ID or set-group-ID permission bits. If the destination file does not exist, the mode of the source file is used, as modified by the file mode creation mask (umask). If the source file is either set-user-ID or set-group-ID, those bits are removed unless the -p option is used. Appropriate permissions are always required for file creation or overwriting. [Tru64 UNIX] You can also copy special device files. If the file is a named pipe, the data in the pipe is copied into a regular file. If the file is a device, the file is read until the end of file, and that data is copied into a regular file. The LC_MESSAGES variable determines the locale's equivalent of y or n (for yes/no queries). If the source_file is a directory, the following is true: If neither the -R or -r option was specified, an error message is displayed and source_file is not copied. If the target specified exists and is a file, not a directory, an error message is displayed and source_file is not copied. If the target does not exist and the -p option is specified, the permission bits of the target directory are set equal to the source directory bitwise inclusively ORed with S_IRWXU (0700 octal). This means the newly created directory will always allow the owner read, write and execute permission. If the target does not exist and the -p option is not specified, the permission bits of the target directory are set equal to the source directory bits, modified by the file creation mask of the user (shuts off the corresponding permis- sion bits specified in the umask). The resulting permission bits are then ORed with S_IRWXU (0700 octal) which gives the owner read, write and execute permission. If the target does not exist and cannot be created, an error message is displayed and source_file is not copied. NOTES
Do not give the destination the same name as one of the source files. If you specify a directory as the destination, the directory must already exist. If you are using the -r option to copy the contents of one directory to another, and source_directory contains subdirecto- ries that do not exist in destination_directory, the subdirectories are created. EXIT STATUS
The following exit values are returned: Successful completion. An error occurred. EXAMPLES
To copy one file to another, enter: cp file1 file2 If file2 exists (and is writable), it is replaced by file1. To copy files to a directory, enter: cp file1 file2 dir1 The dir1 directory must exist. To copy all files in a directory and preserve their modification times, enter: cp -p dir1/* dir2 To copy a directory tree to another directory, enter: cp -r dir1 dir2 The dir1 tree is created in dir2. ENVIRONMENT VARIABLES
The following environment variables affect the execution of cp: Provides a default value for the internationalization variables that are unset or null. If LANG is unset or null, the corresponding value from the default locale is used. If any of the internationalization vari- ables contain an invalid setting, the utility behaves as if none of the variables had been defined. If set to a non-empty string value, overrides the values of all the other internationalization variables. Determines the locale for the interpretation of sequences of bytes of text data as characters (for example, single-byte as opposed to multibyte characters in arguments). Determines the locale for the for- mat and contents of diagnostic messages written to standard error. Determines the location of message catalogues for the processing of LC_MESSAGES. SEE ALSO
Commands: cpio(1), find(1), link(1), ln(1), mv(1), pax(1), tar(1), umask(1) Functions: umask(2) Files: proplist(4), acl(4) Standards: standards(5) cp(1)