Knowledge (XXG)

Access-control list

Source đź“ť

282:
server that store and disseminate configuration information about users and computers in a domain. Active Directory extends the LDAP specification by adding the same type of access-control list mechanism as Windows NT uses for the NTFS filesystem. Windows 2000 then extended the syntax for
174:
1003.1e/1003.2c working group made an effort to standardize ACLs, resulting in what is now known as "POSIX.1e ACL" or simply "POSIX ACL". The POSIX.1e/POSIX.2c drafts were withdrawn in 1997 due to participants losing interest for funding the project and turning to more powerful alternatives such as
414:
In modern SQL implementations, ACLs also manage groups and inheritance in a hierarchy of groups. So "modern ACLs" can express all that RBAC express and are notably powerful (compared to "old ACLs") in their ability to express access-control policy in terms of the way in which administrators view
735: 141:. Each accessible object contains an identifier to its ACL. The privileges or permissions determine specific access rights, such as whether a user can read from, write to, or 54:
are granted access to resources, as well as what operations are allowed on given resources. Each entry in a typical ACL specifies a subject and an operation. For instance,
665: 755:
EA (Extended Attributes) and ACL (Access Control Lists) functionality is now available for ext3 file systems. In addition, ACL functionality is available for NFS.
315:, each with a list of hosts and/or networks permitted to use the service. Although it is additionally possible to configure access-control lists based on network 347:
can have network ACLs. Access-control lists can generally be configured to control both inbound and outbound traffic, and in this context they are similar to
283:
access-control entries such that they could not only grant or deny access to entire LDAP objects, but also to individual attributes within these objects.
743: 205:
ACLs are much more powerful than POSIX draft ACLs. Unlike draft POSIX ACLs, NFSv4 ACLs are defined by an actually published standard, as part of the
1057: 1027: 368: 923: 1159: 989: 194:) support POSIX.1e ACLs (not necessarily draft 17). ACLs are usually stored in the extended attributes of a file on these systems. 604: 240:
ACLs, which are part of the NFSv4 standard. There are two experimental implementations of NFSv4 ACLs for Linux: NFSv4 ACLs support for
332: 1126: 328: 175:
NFSv4 ACL. As of December 2019, no live sources of the draft could be found on the Internet, but it can still be found in the
652:
The new version of Gnet-II (revision 3.0) has added a line-security mechanism which is implemented under the Primos ACL subsystem.
1188: 339:
for an attacker who is seeking to compromise security of the system which the access-control list is protecting. Both individual
145:
an object. In some implementations, an ACE can control whether or not a user, or group of users, may alter the ACL on an object.
82:
Many kinds of operating systems implement ACLs or have a historical implementation; the first implementation of ACLs was in the
717: 320: 376: 818: 446: 300: 229: 191: 138: 583:
AFIPS '65 (Fall, part I): Proceedings of the November 30--December 1, 1965, fall joint computer conference, part I
476: 441: 392: 380: 160: 1140: 331:
headers do not contain domain names. Consequently, the device enforcing the access-control list must separately
461: 905: 848: 497: 466: 451: 252:
filesystem. As with POSIX ACLs, NFSv4 ACLs are usually stored as extended attributes on Unix-like systems.
1065: 1034: 324: 1107: 471: 348: 142: 1069: 62:, this would give Alice permission to read and write the file and give Bob permission only to read it. 538: 431: 263:
supports saving the NT ACLs of SMB-shared files in many ways, one of which is as NFSv4-encoded ACLs.
1038: 1092: 1085: 976: 873: 206: 111: 51: 1111: 958: 796: 344: 340: 308: 292: 891: 792: 637: 107: 31: 1008: 950: 586: 528: 275: 260: 176: 126: 47: 979:", In "Proceedings of the second ACM workshop on Role-based access control", pages 127-132. 1163: 1144: 608: 578: 43: 212:
NFSv4 ACLs are supported by many Unix and Unix-like operating systems. Examples include
336: 296: 225: 103: 418:
For data interchange, and for "high-level comparisons", ACL data can be translated to
351:. Like firewalls, ACLs could be subject to security regulations and standards such as 114:, or files. These entries are known as access-control entries (ACEs) in the Microsoft 1182: 312: 962: 937:
Swift, Michael M. (November 2002). "Improving the granularity of access control for
403:, where only groups are permitted as entries in the ACL. Barkley (1997) showed that 1028:"SELinux and grsecurity: A Case Study Comparing Linux Security Kernel Enhancements" 938: 17: 629: 541: 522: 316: 255:
NFSv4 ACLs are organized nearly identically to the Windows NT ACLs used in
99: 721: 304: 115: 83: 641: 822: 590: 271: 123: 977:
Comparing simple role based access control models and access control lists
954: 826: 691: 245: 221: 163:
models were extensively tested and used to administer file permissions.
771: 739: 352: 217: 187: 149: 119: 87: 767: 1127:"Permissions: A Primer, or: DACL, SACL, Owner, SID and ACE Explained" 533: 153: 106:(usually a table) containing entries that specify individual user or 1026:
Michael Fox; John Giordano; Lori Stotler; Arun Thomas (2005-08-24).
259:. NFSv4.1 ACLs are a superset of both NT ACLs and POSIX draft ACLs. 852: 436: 419: 237: 202: 183: 171: 148:
One of the first operating systems to provide filesystem ACLs was
134: 130: 73:, this would give ALICE permission to use the TSO CONSOLE command. 456: 279: 256: 249: 241: 66: 383:
systems, have used ACL models in their administration modules.
291:
On some types of proprietary computer hardware (in particular,
992:", In "2008 Annual Computer Security Applications Conference". 372: 364: 233: 213: 924:"[MS-ADTS]: Active Directory Technical Specification" 299:), an access-control list provides rules that are applied to 736:"Red Hat Enterprise Linux AS 3 Release Notes (x86 Edition)" 793:"Chapter 8 Using ACLs and Attributes to Protect ZFS Files" 69:
profile CONSOLE CLASS(TSOAUTH) has an ACL that contains
182:
Most of the Unix and Unix-like operating systems (e.g.
988:
G. Karjoth, A. Schade and E. Van Herreweghen (2008) "
636:. Vol. 18, no. 21. 1984-05-21. p. 54. 579:"A general-purpose file system for secondary storage" 110:
rights to specific system objects such as programs,
943:
ACM Transactions on Information and System Security
630:"P.S.I. Pacer Software, Inc. Gnet-II revision 3.0" 335:to numeric addresses. This presents an additional 319:, this is a questionable idea because individual 1086:"Access Control and Operating System Security" 391:The main alternative to the ACL model is the 46:(object or facility). An ACL specifies which 42:) is a list of permissions associated with a 8: 892:"Mapping Between NFSv4 and Posix Draft ACLs" 847:GrĂĽnbacher, Andreas (July–September 2010). 605:"Managing Authorization and Access Control" 58:If a file object has an ACL that contains 1009:"File System Access Control Lists (ACLs)" 532: 399:, can be compared with an ACL mechanism, 156:featured ACLs at least as early as 1984. 27:List of permissions for a system resource 990:Implementing ACL-based Policies in XACML 500:, permission to perform specific action. 849:"Richacls – Native NFSv4 ACLs on Linux" 716:TrĂĽmper, Winfried (February 28, 1999). 513: 489: 395:(RBAC) model. A "minimal RBAC model", 248:, which brings NFSv4 ACLs support for 666:"POSIX Access Control Lists on Linux" 577:Daley, R. C.; Neumann, P. G. (1965). 524:Internet Security Glossary, Version 2 7: 363:ACL algorithms have been ported to 371:. Many "modern" (2000s and 2010s) 25: 817:GrĂĽnbacher, Andreas (May 2008). 564:Elementary Information Security 244:filesystem and the more recent 186:since 2.5.46 or November 2002, 224:beginning with version 10.4 (" 60:(Alice: read,write; Bob: read) 1: 851:. bestbits.at. Archived from 692:"Why was POSIX.1e withdrawn?" 819:"Native NFSv4 ACLs on Linux" 377:enterprise resource planning 1125:Klein, Helge (2009-03-12). 1058:"Operating System Security" 369:relational database systems 1205: 585:. ACM Press. p. 213. 1062:CyberSecurity Spring 2005 521:R. Shirey (August 2007). 477:Role-based access control 442:Capability-based security 393:role-based access-control 159:In the 1990s the ACL and 1056:Hinrichs, Susan (2005). 718:"Summary about Posix.1e" 462:Extended file attributes 307:that are available on a 1189:Computer access control 591:10.1145/1463891.1463915 498:File-system permissions 467:File-system permissions 452:Confused deputy problem 1160:"How Permissions Work" 1141:"Access Control Lists" 1066:University of Illinois 1035:University of Virginia 906:"vfs_nfs4acl_xattr(8)" 742:. 2003. Archived from 278:service implements an 955:10.1145/581271.581273 664:GrĂĽnbacher, Andreas. 472:Privilege (computing) 375:-based systems, like 267:Active Directory ACLs 432:Access token manager 236:filesystem, support 1106:Clarkson, Michael. 1093:Stanford University 975:J. Barkley (1997) " 387:Comparing with RBAC 359:SQL implementations 207:Network File System 36:access-control list 18:Access control list 1112:Cornell University 797:Oracle Corporation 696:Unix StackExchange 632:. Communications. 562:Richard E. Smith. 381:content management 127:operating systems 32:computer security 16:(Redirected from 1196: 1174: 1172: 1171: 1155: 1153: 1152: 1136: 1134: 1133: 1121: 1119: 1118: 1108:"Access Control" 1102: 1100: 1099: 1090: 1084:Mitchell, John. 1080: 1078: 1077: 1068:. Archived from 1052: 1050: 1049: 1043: 1037:. Archived from 1032: 1022: 1020: 1019: 1013:FreeBSD Handbook 993: 986: 980: 973: 967: 966: 934: 928: 927: 920: 914: 913: 902: 896: 895: 888: 882: 881: 870: 864: 863: 861: 860: 844: 838: 837: 835: 834: 825:. Archived from 814: 808: 807: 805: 804: 789: 783: 782: 780: 779: 764: 758: 757: 752: 751: 732: 726: 725: 720:. Archived from 713: 707: 706: 704: 702: 687: 681: 680: 678: 676: 661: 655: 654: 649: 648: 626: 620: 619: 617: 616: 601: 595: 594: 574: 568: 567: 559: 553: 552: 550: 548: 536: 534:10.17487/RFC4949 518: 501: 494: 411:are equivalent. 276:Active Directory 177:Internet Archive 72: 61: 52:system processes 21: 1204: 1203: 1199: 1198: 1197: 1195: 1194: 1193: 1179: 1178: 1177: 1169: 1167: 1164:Microsoft Learn 1158: 1150: 1148: 1145:Microsoft Learn 1139: 1131: 1129: 1124: 1116: 1114: 1105: 1097: 1095: 1088: 1083: 1075: 1073: 1055: 1047: 1045: 1041: 1030: 1025: 1017: 1015: 1006: 1002: 1000:Further reading 997: 996: 987: 983: 974: 970: 936: 935: 931: 922: 921: 917: 904: 903: 899: 890: 889: 885: 872: 871: 867: 858: 856: 846: 845: 841: 832: 830: 816: 815: 811: 802: 800: 791: 790: 786: 777: 775: 766: 765: 761: 749: 747: 734: 733: 729: 715: 714: 710: 700: 698: 689: 688: 684: 674: 672: 663: 662: 658: 646: 644: 628: 627: 623: 614: 612: 609:Microsoft Learn 603: 602: 598: 576: 575: 571: 561: 560: 556: 546: 544: 520: 519: 515: 510: 505: 504: 495: 491: 486: 428: 415:organizations. 389: 361: 289: 287:Networking ACLs 269: 200: 169: 96: 94:Filesystem ACLs 80: 78:Implementations 70: 59: 44:system resource 28: 23: 22: 15: 12: 11: 5: 1202: 1200: 1192: 1191: 1181: 1180: 1176: 1175: 1156: 1137: 1122: 1103: 1081: 1053: 1023: 1003: 1001: 998: 995: 994: 981: 968: 949:(4): 398–437. 929: 915: 897: 883: 865: 839: 809: 784: 759: 727: 724:on 2008-07-23. 708: 682: 656: 621: 596: 569: 566:. p. 150. 554: 512: 511: 509: 506: 503: 502: 488: 487: 485: 482: 481: 480: 474: 469: 464: 459: 454: 449: 444: 439: 434: 427: 424: 388: 385: 360: 357: 337:attack surface 288: 285: 268: 265: 199: 196: 168: 165: 104:data structure 95: 92: 79: 76: 75: 74: 63: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 1201: 1190: 1187: 1186: 1184: 1165: 1161: 1157: 1146: 1142: 1138: 1128: 1123: 1113: 1109: 1104: 1094: 1087: 1082: 1072:on 2012-03-04 1071: 1067: 1063: 1059: 1054: 1044:on 2012-02-24 1040: 1036: 1029: 1024: 1014: 1010: 1007:Rhodes, Tom. 1005: 1004: 999: 991: 985: 982: 978: 972: 969: 964: 960: 956: 952: 948: 944: 940: 933: 930: 925: 919: 916: 911: 907: 901: 898: 893: 887: 884: 879: 875: 869: 866: 855:on 2013-03-20 854: 850: 843: 840: 829:on 2013-06-20 828: 824: 820: 813: 810: 798: 794: 788: 785: 773: 769: 763: 760: 756: 746:on 2013-12-02 745: 741: 737: 731: 728: 723: 719: 712: 709: 697: 693: 690:wurtzkurdle. 686: 683: 671: 667: 660: 657: 653: 643: 639: 635: 634:Computerworld 631: 625: 622: 610: 606: 600: 597: 592: 588: 584: 580: 573: 570: 565: 558: 555: 543: 540: 535: 530: 526: 525: 517: 514: 507: 499: 493: 490: 483: 478: 475: 473: 470: 468: 465: 463: 460: 458: 455: 453: 450: 448: 445: 443: 440: 438: 435: 433: 430: 429: 425: 423: 421: 416: 412: 410: 406: 402: 398: 394: 386: 384: 382: 378: 374: 370: 366: 358: 356: 354: 350: 346: 342: 338: 334: 333:resolve names 330: 326: 322: 318: 314: 310: 306: 302: 298: 294: 286: 284: 281: 277: 273: 266: 264: 262: 258: 253: 251: 247: 243: 239: 235: 231: 227: 223: 219: 215: 210: 208: 204: 197: 195: 193: 189: 185: 180: 178: 173: 166: 164: 162: 157: 155: 151: 146: 144: 140: 136: 132: 128: 125: 121: 117: 113: 109: 105: 101: 93: 91: 89: 85: 77: 68: 64: 57: 56: 55: 53: 49: 45: 41: 37: 33: 19: 1168:. Retrieved 1166:. 2013-07-03 1149:. Retrieved 1147:. 2023-02-07 1130:. Retrieved 1115:. Retrieved 1096:. Retrieved 1074:. Retrieved 1070:the original 1061: 1046:. Retrieved 1039:the original 1016:. Retrieved 1012: 984: 971: 946: 942: 939:Windows 2000 932: 918: 910:Samba Manual 909: 900: 886: 877: 868: 857:. Retrieved 853:the original 842: 831:. Retrieved 827:the original 812: 801:. Retrieved 799:. 2009-10-01 787: 776:. Retrieved 774:. 2011-09-12 768:"NFSv4 ACLs" 762: 754: 748:. Retrieved 744:the original 730: 722:the original 711: 699:. Retrieved 695: 685: 673:. Retrieved 669: 659: 651: 645:. Retrieved 633: 624: 613:. Retrieved 611:. 2009-09-11 599: 582: 572: 563: 557: 545:. Retrieved 523: 516: 492: 417: 413: 408: 404: 400: 396: 390: 362: 353:PCI DSS 317:domain names 313:layer 3 305:IP addresses 301:port numbers 290: 270: 254: 211: 201: 181: 170: 158: 147: 97: 81: 71:(ALICE:READ) 39: 35: 29: 701:12 December 675:12 December 1170:2024-05-15 1151:2024-05-15 1132:2013-04-08 1117:2013-04-08 1098:2013-04-08 1076:2013-04-08 1048:2013-04-08 1018:2013-04-08 859:2013-04-08 833:2013-04-08 803:2013-04-08 778:2013-04-08 750:2013-04-08 647:2017-06-30 615:2024-05-15 508:References 116:Windows NT 100:filesystem 84:filesystem 878:Linux NFS 642:0010-4841 349:firewalls 311:or other 272:Microsoft 198:NFSv4 ACL 167:POSIX ACL 124:Unix-like 112:processes 102:ACL is a 90:in 1965. 1183:Category 963:10702162 426:See also 297:switches 246:Richacls 222:Mac OS X 129:such as 772:FreeBSD 740:Red Hat 547:May 19, 367:and to 345:routers 341:servers 293:routers 230:Solaris 228:"), or 218:FreeBSD 192:Solaris 188:FreeBSD 150:Multics 143:execute 139:Solaris 120:OpenVMS 88:Multics 65:If the 961:  874:"ACLs" 670:Usenix 640:  496:E.g., 479:(RBAC) 447:C-list 327:, and 154:PRIMOS 137:, and 122:, and 1089:(PDF) 1042:(PDF) 1031:(PDF) 959:S2CID 484:Notes 437:Cacls 420:XACML 405:RBACm 397:RBACm 261:Samba 238:NFSv4 232:with 226:Tiger 203:NFSv4 190:, or 184:Linux 172:POSIX 135:macOS 131:Linux 108:group 48:users 34:, an 823:SUSE 703:2019 677:2019 638:ISSN 549:2023 542:4949 457:DACL 409:ACLg 407:and 401:ACLg 379:and 343:and 329:ICMP 309:host 295:and 280:LDAP 257:NTFS 250:Ext4 242:Ext3 161:RBAC 67:RACF 951:doi 941:". 587:doi 539:RFC 529:doi 373:SQL 365:SQL 325:UDP 321:TCP 303:or 274:'s 234:ZFS 214:AIX 86:of 50:or 40:ACL 30:In 1185:: 1162:. 1143:. 1110:. 1091:. 1064:. 1060:. 1033:. 1011:. 957:. 945:. 908:. 876:. 821:. 795:. 770:. 753:. 738:. 694:. 668:. 650:. 607:. 581:. 537:. 527:. 422:. 355:. 323:, 220:, 216:, 209:. 179:. 152:. 133:, 118:, 98:A 1173:. 1154:. 1135:. 1120:. 1101:. 1079:. 1051:. 1021:. 965:. 953:: 947:5 926:. 912:. 894:. 880:. 862:. 836:. 806:. 781:. 705:. 679:. 618:. 593:. 589:: 551:. 531:: 38:( 20:)

Index

Access control list
computer security
system resource
users
system processes
RACF
filesystem
Multics
filesystem
data structure
group
processes
Windows NT
OpenVMS
Unix-like
operating systems
Linux
macOS
Solaris
execute
Multics
PRIMOS
RBAC
POSIX
Internet Archive
Linux
FreeBSD
Solaris
NFSv4
Network File System

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑