Novell LINUX ENTERPRISE DESKTOP 10 SP2 - DEPLOYMENT GUIDE 08-05-2008 Deployment Manual page 337

Table of Contents

Advertisement

Table 13.1
ACL Entry Types
Type
owner
named user
owning group
named group
mask
other
Table 13.2
Masking Access Permissions
Entry Type
named user
mask
13.4.1 ACL Entries and File Mode Permission
Bits
Figure 13.1, "Minimum ACL: ACL Entries Compared to Permission Bits"
and
Figure 13.2, "Extended ACL: ACL Entries Compared to Permission Bits"
illustrate the two cases of a minimum ACL and an extended ACL. The figures are
structured in three blocks—the left block shows the type specifications of the ACL
entries, the center block displays an example ACL, and the right block shows the re-
spective permission bits according to the conventional permission concept, for example,
as displayed by ls -l. In both cases, the owner class permissions are mapped to the
Text Form
user::rwx
user:name:rwx
group::rwx
group:name:rwx
mask::rwx
other::rwx
Text Form
user:geeko:r-x
mask::rw-
effective permissions:
Permissions
r-x
rw-
r--
(page 322)
(page 322)
Access Control Lists in Linux
321

Advertisement

Table of Contents
loading

This manual is also suitable for:

Linux enterprise desktop 10 sp2

Table of Contents