Implementing Access Control Lists using Linux
Source: Page Maintained by Andreas Gr├╝nbacher - Posted by LinuxSecurity.com Team   
Server Security Here's information on implementing ACLs using Linux. Access Control Lists (ACLs) support more fine-grained permissions. Arbitrary users and groups can be granted or denied access in addition to the three traditional classes of users. ... The main advantage of . . . Here's information on implementing ACLs using Linux. Access Control Lists (ACLs) support more fine-grained permissions. Arbitrary users and groups can be granted or denied access in addition to the three traditional classes of users. ... The main advantage of this mechanism is its simplicity. With just a couple of bits, many permission scenarios can be modeled. However, there often is a need to specify access permissions at a more fine-grained level, especially for commercial applications and their security requirements.

Read this full article at Page Maintained by Andreas Gr├╝nbacher

Only registered users can write comments.
Please login or register.

Powered by AkoComment!