Another significant enhancement in the 2.6 kernel is the addition of POSIX ACLs or Access Control Lists, improving the traditional UNIX-based file security and permissions model based on read, write, and execute permissions for everyone, groups, and users. This permission model is fairly limited and lacks the flexibility and power to truly ensure real file security on your hosts.
Access Control Lists provide a significant enhancement to this model and provide you with more granular access control over your files and objects in a similar way that Microsoft Windows systems offer. This allows you, in many cases, to introduce Role-Based Access Controls (RBAC) and, therefore, the ability to ensure that only those users and groups that require access to specific files and resources get that access.
Was this article helpful?
Read how to maintain and repair any desktop and laptop computer. This Ebook has articles with photos and videos that show detailed step by step pc repair and maintenance procedures. There are many links to online videos that explain how you can build, maintain, speed up, clean, and repair your computer yourself. Put the money that you were going to pay the PC Tech in your own pocket.