Share to: share facebook share twitter share wa share telegram print page

Access-control list

In computer security, an access-control list (ACL) is a list of permissions[a] associated with a system resource (object or facility). An ACL specifies which users or system processes are granted access to resources, as well as what operations are allowed on given resources.[1] Each entry in a typical ACL specifies a subject and an operation. For instance,

  • If a file object has an ACL that contains (Alice: read,write; Bob: read), this would give Alice permission to read and write the file and give Bob permission only to read it.
  • If the RACF profile CONSOLE CLASS(TSOAUTH) has an ACL that contains (ALICE:READ), this would give ALICE permission to use the TSO CONSOLE command.

Implementations

Many kinds of operating systems implement ACLs or have a historical implementation; the first implementation of ACLs was in the filesystem of Multics in 1965.[2][3]

Filesystem ACLs

A filesystem ACL is a data structure (usually a table) containing entries that specify individual user or group rights to specific system objects such as programs, processes, or files. These entries are known as access-control entries (ACEs) in the Microsoft Windows NT,[4] OpenVMS, and Unix-like operating systems such as Linux, macOS, and Solaris. Each accessible object contains an identifier to its ACL. The privileges or permissions determine specific access rights, such as whether a user can read from, write to, or execute an object. In some implementations, an ACE can control whether or not a user, or group of users, may alter the ACL on an object.

One of the first operating systems to provide filesystem ACLs was Multics. PRIMOS featured ACLs at least as early as 1984.[5]

In the 1990s the ACL and RBAC models were extensively tested[by whom?] and used to administer file permissions.

POSIX ACL

POSIX 1003.1e/1003.2c working group made an effort to standardize ACLs, resulting in what is now known as "POSIX.1e ACL" or simply "POSIX ACL".[6] The POSIX.1e/POSIX.2c drafts were withdrawn in 1997 due to participants losing interest for funding the project and turning to more powerful alternatives such as NFSv4 ACL.[7] As of December 2019, no live sources of the draft could be found on the Internet, but it can still be found in the Internet Archive.[8]

Most of the Unix and Unix-like operating systems (e.g. Linux since 2.5.46 or November 2002,[9] FreeBSD, or Solaris) support POSIX.1e ACLs (not necessarily draft 17). ACLs are usually stored in the extended attributes of a file on these systems.

NFSv4 ACL

NFSv4 ACLs are much more powerful than POSIX draft ACLs. Unlike draft POSIX ACLs, NFSv4 ACLs are defined by an actually published standard, as part of the Network File System.

NFSv4 ACLs are supported by many Unix and Unix-like operating systems. Examples include AIX, FreeBSD,[10] Mac OS X beginning with version 10.4 ("Tiger"), or Solaris with ZFS filesystem,[11] support NFSv4 ACLs, which are part of the NFSv4 standard. There are two experimental implementations of NFSv4 ACLs for Linux: NFSv4 ACLs support for Ext3 filesystem[12] and the more recent Richacls, which brings NFSv4 ACLs support for Ext4 filesystem.[13] As with POSIX ACLs, NFSv4 ACLs are usually stored as extended attributes on Unix-like systems.

NFSv4 ACLs are organized nearly identically to the Windows NT ACLs used in NTFS.[14] NFSv4.1 ACLs are a superset of both NT ACLs and POSIX draft ACLs.[15] Samba supports saving the NT ACLs of SMB-shared files in many ways, one of which is as NFSv4-encoded ACLs.[16]

Active Directory ACLs

Microsoft's Active Directory service implements an LDAP server that store and disseminate configuration information about users and computers in a domain.[17] Active Directory extends the LDAP specification by adding the same type of access-control list mechanism as Windows NT uses for the NTFS filesystem. Windows 2000 then extended the syntax for access-control entries such that they could not only grant or deny access to entire LDAP objects, but also to individual attributes within these objects.[18]

Networking ACLs

On some types of proprietary computer hardware (in particular, routers and switches), an access-control list provides rules that are applied to port numbers or IP addresses that are available on a host or other layer 3, each with a list of hosts and/or networks permitted to use the service. Although it is additionally possible to configure access-control lists based on network domain names, this is a questionable idea because individual TCP, UDP, and ICMP headers do not contain domain names. Consequently, the device enforcing the access-control list must separately resolve names to numeric addresses. This presents an additional attack surface for an attacker who is seeking to compromise security of the system which the access-control list is protecting. Both individual servers and routers can have network ACLs. Access-control lists can generally be configured to control both inbound and outbound traffic, and in this context they are similar to firewalls. Like firewalls, ACLs could be subject to security regulations and standards such as PCI DSS.

SQL implementations

ACL algorithms have been ported to SQL and to relational database systems. Many "modern" (2000s and 2010s) SQL-based systems, like enterprise resource planning and content management systems, have used ACL models in their administration modules.

Comparing with RBAC

The main alternative to the ACL model is the role-based access-control (RBAC) model. A "minimal RBAC model", RBACm, can be compared with an ACL mechanism, ACLg, where only groups are permitted as entries in the ACL. Barkley (1997)[19] showed that RBACm and ACLg are equivalent.

In modern SQL implementations, ACLs also manage groups and inheritance in a hierarchy of groups. So "modern ACLs" can express all that RBAC express and are notably powerful (compared to "old ACLs") in their ability to express access-control policy in terms of the way in which administrators view organizations.

For data interchange, and for "high-level comparisons", ACL data can be translated to XACML.[20]

See also

Notes

  1. ^ E.g., File-system permissions, permission to perform specific action.

References

  1. ^ R. Shirey (August 2007). Internet Security Glossary, Version 2. doi:10.17487/RFC4949. RFC 4949. Retrieved May 19, 2023.
  2. ^ Richard E. Smith. Elementary Information Security. p. 150.
  3. ^ Daley, R. C.; Neumann, P. G. (1965). "A general-purpose file system for secondary storage". AFIPS '65 (Fall, part I): Proceedings of the November 30--December 1, 1965, fall joint computer conference, part I. ACM Press. p. 213. doi:10.1145/1463891.1463915.
  4. ^ "Managing Authorization and Access Control". Microsoft Learn. 2009-09-11. Retrieved 2024-05-15.
  5. ^ "P.S.I. Pacer Software, Inc. Gnet-II revision 3.0". Communications. Computerworld. Vol. 18, no. 21. 1984-05-21. p. 54. ISSN 0010-4841. Retrieved 2017-06-30. The new version of Gnet-II (revision 3.0) has added a line-security mechanism which is implemented under the Primos ACL subsystem.
  6. ^ Grünbacher, Andreas. "POSIX Access Control Lists on Linux". Usenix. Retrieved 12 December 2019.
  7. ^ wurtzkurdle. "Why was POSIX.1e withdrawn?". Unix StackExchange. Retrieved 12 December 2019.
  8. ^ Trümper, Winfried (February 28, 1999). "Summary about Posix.1e". Archived from the original on 2008-07-23.
  9. ^ "Red Hat Enterprise Linux AS 3 Release Notes (x86 Edition)". Red Hat. 2003. Archived from the original on 2013-12-02. Retrieved 2013-04-08. EA (Extended Attributes) and ACL (Access Control Lists) functionality is now available for ext3 file systems. In addition, ACL functionality is available for NFS.
  10. ^ "NFSv4 ACLs". FreeBSD. 2011-09-12. Retrieved 2013-04-08.
  11. ^ "Chapter 8 Using ACLs and Attributes to Protect ZFS Files". Oracle Corporation. 2009-10-01. Retrieved 2013-04-08.
  12. ^ Grünbacher, Andreas (May 2008). "Native NFSv4 ACLs on Linux". SUSE. Archived from the original on 2013-06-20. Retrieved 2013-04-08.
  13. ^ Grünbacher, Andreas (July–September 2010). "Richacls – Native NFSv4 ACLs on Linux". bestbits.at. Archived from the original on 2013-03-20. Retrieved 2013-04-08.
  14. ^ "ACLs". Linux NFS.
  15. ^ "Mapping Between NFSv4 and Posix Draft ACLs".
  16. ^ "vfs_nfs4acl_xattr(8)". Samba Manual.
  17. ^ "[MS-ADTS]: Active Directory Technical Specification".
  18. ^ Swift, Michael M. (November 2002). "Improving the granularity of access control for Windows 2000". ACM Transactions on Information and System Security. 5 (4): 398–437. doi:10.1145/581271.581273. S2CID 10702162.
  19. ^ J. Barkley (1997) "Comparing simple role based access control models and access control lists", In "Proceedings of the second ACM workshop on Role-based access control", pages 127-132.
  20. ^ G. Karjoth, A. Schade and E. Van Herreweghen (2008) "Implementing ACL-based Policies in XACML", In "2008 Annual Computer Security Applications Conference".

Further reading

Read other articles:

House in Pleasantville, New YorkSol Friedman House (Toyhill)General informationTypeHouseArchitectural styleUsonianLocationPleasantville, New YorkCoordinates41°07′44″N 73°44′53″W / 41.128856°N 73.748003°W / 41.128856; -73.748003Construction started1948Design and constructionArchitect(s)Frank Lloyd Wright Sol Friedman House Toyhill, was built in Pleasantville, New York in 1948. This was the first of the three Frank Lloyd Wright homes built in the Usonia Homes...

معركة مري جزء من الحروب المملوكية الأرمينية المماليك يهزموا الأرمن في معركة مري في 1266 ويقتلوا توروس أحد أبناء الملك حيطوم الأول (الساقط على الأرض، جهة اليمين) ويأسروا ابنه الآخر (الملك المستقبلي ليو الثاني، في المنتصف).[1] معلومات عامة التاريخ 24 أغسطس 1266 البلد مملكة أرم...

Baveno Gemeente in Italië Situering Regio Piëmont (PMN) Provincie Verbano-Cusio-Ossola (VB) Coördinaten 45° 54′ NB, 8° 30′ OL Algemeen Oppervlakte 17,3 km² Inwoners (1 januari 2018) 4.883[1] (274 inw./km²) Hoogte 205 m Overig Postcode 28831 Netnummer 0323 Beschermheilige Santi Gervaso e Protasio Naam inwoner bavenesi ISTAT-code 103008 Portaal    Italië Baveno is een gemeente in de Italiaanse provincie Verbano-Cusio-Ossola (regio Piëmont) en telt 4741 inw...

キング・コング King Kong 監督 メリアン・C・クーパーアーネスト・B・シュードサック脚本 ジェームズ・アシュモア・クリールマン(英語版)ルース・ローズ(英語版)原案 エドガー・ウォーレスメリアン・C・クーパー製作 メリアン・C・クーパーアーネスト・B・シュードサック製作総指揮 デヴィッド・O・セルズニック出演者 フェイ・レイロバート・アームストロング...

Esta página cita fontes, mas que não cobrem todo o conteúdo. Ajude a inserir referências. Conteúdo não verificável pode ser removido.—Encontre fontes: ABW  • CAPES  • Google (N • L • A) (Dezembro de 2008) Aquarian Age - Sign for Evolution アクエリアン エイジ Informações gerais Gêneros Aventura, Fantasia Aquarian Age Anime Direção Yoshimitsu Ohashi Estúdio de animação Madhouse, Broccoli, Victor Entertainmen...

У Вікіпедії є статті про інші значення цього терміна: Цепелін. Цепелін Zepelin —  громада  — Вид Цепелін Координати: 53°49′59″ пн. ш. 12°03′00″ сх. д. / 53.83306° пн. ш. 12.05000° сх. д. / 53.83306; 12.05000 Країна  Німеччина Земля Мекленбург-Передня...

داش وايلدر   معلومات شخصية الميلاد 17 مايو 1987 (36 سنة)  آشفيل، كارولاينا الشمالية  مواطنة الولايات المتحدة  الطول 178 سنتيمتر  الوزن 101 كيلوغرام  الحياة العملية المهنة مصارع محترف  الرياضة المصارعة المحترفة  المواقع IMDB صفحته على IMDB  تعديل مصدري - تعديل  ...

Герард ван дер Лем Особисті дані Народження 15 листопада 1952(1952-11-15) (71 рік)   Амстердам, Нідерланди Громадянство  Нідерланди Позиція нападник Юнацькі клуби «Аякс» «Амстердам» Професіональні клуби* Роки Клуб І (г) 1973–1975 «Амстердам» 66 (8) 1975–1977 «Рода» 66 (10) 1977–1980 «Феєнор

Kapelle von Calas Pfarrkirche Calas ist ein Ortsteil der südfranzösischen Gemeinde Cabriès im Département Bouches-du-Rhône. Das Dorf liegt an der D543, die Septèmes-les-Vallons mit Sault verbindet. Cabriès liegt rund vier Kilometer weiter südwestlich. Ursprünglich lautete der Ortsname Calcaria.[1] Sehenswürdigkeiten In Cabriès befinden sich zwei Gotteshäuser: Zuerst die Dorfkirche mit dem Namen Notre-Dame-de-l’Assomption (dt.: Mariä Himmelfahrt). Die dreischiffige Kirch...

Beberapa siswi sekolah dasar saat mengikuti upacara bendera. Peserta didik adalah anggota masyarakat yang berusaha mengembangkan potensi diri melalui proses pembelajaran pada jalur pendidikan baik pendidikan informal, pendidikan formal maupun pendidikan nonformal, pada jenjang pendidikan dan jenis pendidikan tertentu. Istilah lain Murid, yaitu istilah untuk menyebut peserta didik di jenjang pendidikan dini dan dasar, yaitu taman kanak-kanak dan sekolah dasar. Pelajar adalah istilah lain yang ...

Середньовіччя У темах Війни Середньовічна культура Середньовічна література Середньовічна медицина Середньовічна музика Середньовічна освіта Середньовічна філософія Періодизація Раннє Середньовіччя Високе Середньовіччя Пізнє Середньовіччя Сторінка з середньовічн

Promise of fealty to the Canadian monarch Peter MacKay (left) reciting the Oath of Allegiance, as administered by Kevin G. Lynch (right), Clerk of the Privy Council, and in the presence of Governor General Michaëlle Jean (seated, centre), at Rideau Hall, 14 August 2007 The Canadian Oath of Allegiance is a promise or declaration of fealty to the Canadian monarch—as personification of the Canadian state and its authority, rather than as an individual person—taken, along with other specific...

Este artículo o sección necesita referencias que aparezcan en una publicación acreditada.Este aviso fue puesto el 18 de enero de 2018. Hélice de cinco palas de un buque de gran tonelaje Hélice de un avión F4U Corsair La hélice es un dispositivo mecánico formado por un conjunto de elementos denominados palas o álabes, montados de forma concéntrica y solidarias de un eje que, al girar, las palas trazan un movimiento rotativo en un plano.[1]​ Las palas no son placas planas, sino ...

2021 National Football League championship game 2021 Super Bowl redirects here. For the Super Bowl at the completion of the 2021 season, see Super Bowl LVI. Super Bowl LV Kansas City Chiefs (1)(AFC)(14–2) Tampa Bay Buccaneers (5)(NFC)(11–5) 9 31 Head coach:Andy Reid Head coach:Bruce Arians 1234 Total KC 3330 9 TB 714100 31 DateFebruary 7, 2021StadiumRaymond James Stadium, Tampa, FloridaMVPTom Brady, quarterbackFavoriteChiefs by 3[1]RefereeCarl Cheffers[2][3]Attenda...

Species of true bug Alydus calcaratus Scientific classification Domain: Eukaryota Kingdom: Animalia Phylum: Arthropoda Class: Insecta Order: Hemiptera Suborder: Heteroptera Family: Alydidae Genus: Alydus Species: A. calcaratus Binomial name Alydus calcaratus(Linnaeus, 1758) Synonyms Cimex calcaratus Linnaeus Alydus calcaratus is a bug species with a Holarctic distribution ranging from the British Isles almost all over Europe to eastern Siberia and China. Moreover, the species also in nor...

New Zealand minister of the Crown Deputy Prime Minister of New ZealandCoat of Arms of New ZealandFlag of New ZealandIncumbentWinston Peterssince 27 November 2023Department of the Prime Minister and CabinetStyle Mr Deputy Prime Minister (informal) The Honourable (formal) His Excellency (diplomatic) Member ofCabinet of New ZealandExecutive CouncilReports toPrime Minister of New ZealandAppointerGovernor-General of New ZealandTerm lengthNo fixed termFormation13 December 1949; 73...

For other places with the same name, see Ciechanów (disambiguation). Place in Masovian Voivodeship, PolandCiechanówCiechanów Castle FlagCoat of armsCiechanówCoordinates: 52°52′N 20°38′E / 52.867°N 20.633°E / 52.867; 20.633Country PolandVoivodeshipMasovianCountyCiechanówGminaCiechanów (urban gmina)First mentioned1065City rights1400Government • City mayorKrzysztof Kosiński (PSL)Area • Total32.51 km2 (12.55 sq mi)...

Простейовчеськ. Prostějov[1][2] Простейовська ратуша Прапор Герб Координати 49°28′20″ пн. ш. 17°06′38″ сх. д. / 49.47222222224977628° пн. ш. 17.11055555558377961° сх. д. / 49.47222222224977628; 17.11055555558377961Координати: 49°28′20″ пн. ш. 17°06′38″ сх. д. / 49.472222222249...

Витверезник у Кстово, Росія Мінімалістична та легко очищувана камера витверезника в Норвегії Витвере́зник — санітарно-медична установа для витвережування п'яних. Існують витверезники від алкогольного та наркотичного сп'яніння. Зміст 1 Історія 1.1 Росія та СРСР 1.2 Україн...

Nokia Lumia 930BrandNokiaManufacturerMicrosoft MobileSloganOne experience. Windows on your phone.SeriesLumiaCompatible networksGSM/GPRS/EDGE 850/900/1800/1900 HSPA+ 850/900/1800/1900 LTE 800/900/1800/2100/2600Wi-Fi[1]First releasedJuly 4, 2014DiscontinuedJune 25, 2015 (2015-06-25) UK[2]PredecessorNokia Lumia 920 Nokia Lumia 925SuccessorMicrosoft Lumia 950RelatedNokia Lumia 530Nokia Lumia 630Nokia Lumia 730Nokia Lumia 830Nokia Lumia 1520Nokia Lumia IconTypeSmartp...

Kembali kehalaman sebelumnya