sections in this module | City
College of San Francisco - CS260A - Unix/Linux System
Administration Module: Virtual Machines |
module list |
As we have been discussing, you should avoid letting users run as root unless absolutely necessary. If a user's special needs are limited to data access, it may be possible to manipulate permissions and provide the capabilities they require.
Group Permissions
If the data is in a directory which is accessible to the user, group permissions may be sufficient to provide the access required. The simplest method is to
A more modern approach than using a special group is to use an access control list to provide the access required. You may also find that using the file attributes a and i provide an additional layer of support. (ACLs and attributes will be discussed in a couple of weeks). Both of these solutions have two drawbacks that must be kept in mind
Use of a special group to manage data among a group of people is
complemented by the use a set-group-id directory. If the directory
is set-group-id, any new files created in it are also placed in
that group.
We discuss set-user-id and set-group-id later in this module.
Prev | This page was made entirely
with free software on linux: the Mozilla Project, Kompozer, and Openoffice.org |
Next |