sections in this module City College of San Francisco - CS260A - Unix/Linux System Administration
Module: Virtual Machines
module list

Group Permissions

As we have been discussing, you should avoid letting users run as root unless absolutely necessary. If a user's special needs are limited to data access, it may be possible to manipulate permissions and provide the capabilities they require. 

Group Permissions

If the data is in a directory which is accessible to the user, group permissions may be sufficient to provide the access required. The simplest method is to

A more modern approach than using a special group is to use an access control list to provide the access required. You may also find that using the file attributes a and i provide an additional layer of support. (ACLs and attributes will be discussed in a couple of weeks). Both of these solutions have two drawbacks that must be kept in mind

Use of a special group to manage data among a group of people is complemented by the use a set-group-id directory. If the directory is set-group-id, any new files created in it are also placed in that group.

We discuss set-user-id and set-group-id later in this module.

Prev This page was made entirely with free software on linux:  
the Mozilla Project, Kompozer,
and Openoffice.org    
Next

Copyright 2013 Greg Boyd - All Rights Reserved.