From the course: Red Hat Certified System Administrator (EX200) Cert Prep: 2 File Access, Storage, and Security
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Set access control lists (ACLs)
From the course: Red Hat Certified System Administrator (EX200) Cert Prep: 2 File Access, Storage, and Security
Set access control lists (ACLs)
- [Instructor] ACLs are turned on by default in CentOS for the OS partition only. In comparison to being creative with standard permissions along with special bits and UMass to solve problems, ACLs are downright easy to implement. With ACLs, you just give the right people and groups the access they need and you're done. The command we use to assign file ACLs is setfacl. The syntax is setfacl space dash m space user colon the username, colon the desired permissions space. And then the file name. For example if we wanted to set our rwx permissions for the username Bob on slash home slash file dot txt we'd type setfacl dash m for modify user colon Bob for the username rwx for permissions followed by the file path. In this case slash home slash file dot txt. Let's go to a terminal to use the setfacl command. To set up this exercise we'll create a directory called acldir using mkdir, type in sudo space mkdir space slash home slash acldir and hit enter type in your password and hit enter…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
File and directory modes1m 19s
-
(Locked)
Change file and directory ownership3m 14s
-
(Locked)
Set permissions using numeric mode3m 2s
-
(Locked)
Set permissions using symbolic mode4m 46s
-
(Locked)
Initial permissions using umask4m 30s
-
(Locked)
Special file bits: SUID and SGID4m 59s
-
(Locked)
Special directory bits: SGID and Sticky5m 55s
-
(Locked)
Read access control lists3m 36s
-
(Locked)
Set access control lists (ACLs)5m 49s
-
(Locked)
Configure inheritance with default access control lists4m 27s
-
(Locked)
Delete access control lists4m 15s
-
(Locked)
Challenge: File access control2m 34s
-
(Locked)
Solution: File access control6m 54s
-
-
-
-
-
-