From the course: Red Hat Certified System Administrator (EX200) Cert Prep: 2 File Access, Storage, and Security
Unlock the full course today
Join today to access over 22,400 courses taught by industry experts or purchase this course individually.
Set permissions using symbolic mode
From the course: Red Hat Certified System Administrator (EX200) Cert Prep: 2 File Access, Storage, and Security
Set permissions using symbolic mode
- [Instructor] There are two different methods of setting permissions in Linux, numeric and symbolic. For this video, let's talk about symbolic mode. When we do a long list with LS, we see several things. We see the permissions, ownership, timestamp, file name and a few other smaller bits such as size. There are 10 characters on the left hand side of the listing. The first character shows the type, if it's a hash as a file. If it were a directory it would be a letter D, if it were a symbolic link it would be an L, if it were a character device it's C, a P for a pipe and a B for a block device. The next nine characters are divided into groups of three. The first group is the user owner of the file. The user owner in this case is user1. The user owner has read, write and execute. The second group of three is for the group owner. The group owner in this case is accounting. The accounting group has read and execute. The last group of three is for everyone that is not the user owner or…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
File and directory modes1m 19s
-
Change file and directory ownership3m 14s
-
Set permissions using numeric mode3m 2s
-
Set permissions using symbolic mode4m 46s
-
Initial permissions using umask4m 30s
-
Special file bits: SUID and SGID4m 59s
-
Special directory bits: SGID and Sticky5m 55s
-
Read access control lists3m 36s
-
Set access control lists (ACLs)5m 49s
-
Configure inheritance with default access control lists4m 27s
-
Delete access control lists4m 15s
-
Challenge: File access control2m 34s
-
Solution: File access control6m 54s
-
-
-
-
-
-