Novell LINUX ENTERPRISE DESKTOP 11 - SECURITY GUIDE 17-03-2009 Manual page 109

Hide thumbs Also See for LINUX ENTERPRISE DESKTOP 11 - SECURITY GUIDE 17-03-2009:
Table of Contents

Advertisement

Table 10.1
ACL Entry Types
Type
owner
named user
owning group
named group
mask
other
Table 10.2
Masking Access Permissions
Entry Type
named user
mask
10.4.1 ACL Entries and File Mode Permission
Bits
Figure 10.1, "Minimum ACL: ACL Entries Compared to Permission Bits"
and
Figure 10.2, "Extended ACL: ACL Entries Compared to Permission Bits"
illustrate the two cases of a minimum ACL and an extended ACL. The figures are
structured in three blocks—the left block shows the type specifications of the ACL
entries, the center block displays an example ACL, and the right block shows the re-
spective permission bits according to the conventional permission concept, for example,
as displayed by ls -l. In both cases, the owner class permissions are mapped to the
Text Form
user::rwx
user:name:rwx
group::rwx
group:name:rwx
mask::rwx
other::rwx
Text Form
user:geeko:r-x
mask::rw-
effective permissions:
Permissions
r-x
rw-
r--
(page 98)
(page 98)
Access Control Lists in Linux
97

Advertisement

Table of Contents
loading

This manual is also suitable for:

Suse linux enterprise desktop 11

Table of Contents