From the course: Red Hat Certified System Administrator (EX200) Cert Prep: 2 File Access, Storage, and Security
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Configure inheritance with default access control lists
From the course: Red Hat Certified System Administrator (EX200) Cert Prep: 2 File Access, Storage, and Security
Configure inheritance with default access control lists
- [Instructor] Standard Linux permissions only have one type of inheritance in the form of the SGID bit on directories. In that case, the files and directories created inside inherit the group owner of the parent directory, which there can only be one of. ACLs go much further as they let files and directories inherit any number of user or group permissions. These ACLs are called default ACLs. Keep in mind that if you want to allow a user to access a directory, you set a regular ACL on it first. If however, you want that user to access all new files and directories inside it, then set a default ACL. Usually, you'll need to do both of these operations. For this exercise, we'll make a directory called ACL dir. In a terminal, type in sudo mkdir /home/acldir and hit Enter. Type in your password and hit Enter again. If you already have this directory from another lesson, go ahead and use it. Now let's change into using cd. Type in cd /home/acldir and hit Enter. You can verify your pass by…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
File and directory modes1m 19s
-
(Locked)
Change file and directory ownership3m 14s
-
(Locked)
Set permissions using numeric mode3m 2s
-
(Locked)
Set permissions using symbolic mode4m 46s
-
(Locked)
Initial permissions using umask4m 30s
-
(Locked)
Special file bits: SUID and SGID4m 59s
-
(Locked)
Special directory bits: SGID and Sticky5m 55s
-
(Locked)
Read access control lists3m 36s
-
(Locked)
Set access control lists (ACLs)5m 49s
-
(Locked)
Configure inheritance with default access control lists4m 27s
-
(Locked)
Delete access control lists4m 15s
-
(Locked)
Challenge: File access control2m 34s
-
(Locked)
Solution: File access control6m 54s
-
-
-
-
-
-