From the course: Red Hat Certified System Administrator (EX200) Cert Prep: 2 File Access, Storage, and Security

Unlock the full course today

Join today to access over 22,400 courses taught by industry experts or purchase this course individually.

Set permissions using symbolic mode

Set permissions using symbolic mode

- [Instructor] There are two different methods of setting permissions in Linux, numeric and symbolic. For this video, let's talk about symbolic mode. When we do a long list with LS, we see several things. We see the permissions, ownership, timestamp, file name and a few other smaller bits such as size. There are 10 characters on the left hand side of the listing. The first character shows the type, if it's a hash as a file. If it were a directory it would be a letter D, if it were a symbolic link it would be an L, if it were a character device it's C, a P for a pipe and a B for a block device. The next nine characters are divided into groups of three. The first group is the user owner of the file. The user owner in this case is user1. The user owner has read, write and execute. The second group of three is for the group owner. The group owner in this case is accounting. The accounting group has read and execute. The last group of three is for everyone that is not the user owner or…

Contents