From the course: Red Hat Certified System Administrator (EX200) Cert Prep: 2 File Access, Storage, and Security
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Read access control lists
From the course: Red Hat Certified System Administrator (EX200) Cert Prep: 2 File Access, Storage, and Security
Read access control lists
- [Instructor] Because ACLs are layered on top of Linux permissions, we can't use standard tools such as LS to list them. With ACLs, comes a suite of new tools. Let's take a look. Go to a terminal and create a directory using mkdir and then change into it. Type in mkdir space aclexercise and hit Enter. Now type in cd space aclexercise and hit Enter again. You can verify your path by typing in pwd. Now let's create a file and place an ACL on it. Type in touch space aclfile and hit Enter. We can verify this with ls space -l. In order to read the ACLs on a file, we'll use the getfacl command. Getfacl is installed by default in CentOS, but if you're using another distribution, you may have to install ACLs before proceeding. Type in g e t f a c l space aclfile and hit Enter. This lists the name of the file, the user owner, the group owner and permissions for the user group and other. Basically, this lists the standard Linux permissions. We can also view the same data in tabular format by…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
File and directory modes1m 19s
-
(Locked)
Change file and directory ownership3m 14s
-
(Locked)
Set permissions using numeric mode3m 2s
-
(Locked)
Set permissions using symbolic mode4m 46s
-
(Locked)
Initial permissions using umask4m 30s
-
(Locked)
Special file bits: SUID and SGID4m 59s
-
(Locked)
Special directory bits: SGID and Sticky5m 55s
-
(Locked)
Read access control lists3m 36s
-
(Locked)
Set access control lists (ACLs)5m 49s
-
(Locked)
Configure inheritance with default access control lists4m 27s
-
(Locked)
Delete access control lists4m 15s
-
(Locked)
Challenge: File access control2m 34s
-
(Locked)
Solution: File access control6m 54s
-
-
-
-
-
-