Access Control List: Filesystem Acls
Access Control List: Filesystem Acls
Access Control List: Filesystem Acls
An access control list (ACL), with respect to a computer file system, is a list of
permissions attached to an object. An ACL specifies which users or system processes are
granted access to objects, as well as what operations are allowed on given objects.[1] Each
entry in a typical ACL specifies a subject and an operation. For instance, if a file object has
an ACL that contains (Alice: read,write; Bob: read), this would give Alice
permission to read and write the file and Bob to only read it.
Contents
1 Implementations
o 1.1 Filesystem ACLs
o 1.2 Networking ACLs
o 1.3 SQL implementations
2 Comparing with RBAC
3 See also
4 References
5 Further reading
Implementations
Many kinds of systems implement ACLs, or have a historical implementation.
Filesystem ACLs
A filesystem ACL is a data structure (usually a table) containing entries that specify
individual user or group rights to specific system objects such as programs, processes, or
files. These entries are known as access-control entries (ACEs) in the Microsoft Windows
NT,[2] OpenVMS, Unix-like, and Mac OS X operating systems. Each accessible object
contains an identifier to its ACL. The privileges or permissions determine specific access
rights, such as whether a user can read from, write to, or execute an object. In some
implementations, an ACE can control whether or not a user, or group of users, may alter the
ACL on an object.
Most of the Unix and Unix-like operating systems (e.g. Linux,[3] BSD, or Solaris) support
POSIX.1e ACLs, based on an early POSIX draft that was withdrawn in 1997. Many of
them, for example AIX, FreeBSD,[4] Mac OS X beginning with version 10.4 ("Tiger"), or
Solaris with ZFS filesystem,[5] support NFSv4 ACLs, which are part of the NFSv4
standard. There are two experimental implementations of NFSv4 ACLs for Linux: NFSv4
ACLs support for Ext3 filesystem[6] and the more recent Richacls,[7] which brings NFSv4
ACLs support for Ext4 filesystem.
In the 1990s the ACL and RBAC models were extensively tested[by whom?] and used to
administer file permissions.
Networking ACLs
SQL implementations
ACL algorithms have been ported to SQL and to relational database systems. Many
"modern" (2000s and 2010s) SQL-based systems, like enterprise resource planning and
content management systems, have used ACL models in their administration modules.
In modern SQL implementations, ACL also manage groups and inheritance in a hierarchy
of groups. So "modern ACLs" can express all that RBAC express, and are notably powerful
(compared to "old ACLs") in their ability to express access control policy in terms of the
way in which administrators view organizations.
For data interchange, and for "high level comparisons", ACL data can be translated to
XACML.[10]