Alibabacloud.com offers a wide variety of articles about information rights management irm, easily find your information rights management irm information here online.
user groupSetfacl-b/xxxRemove all ACL permissions for a fileSetfacl-m U:admin:rw-r DirectoryRecursive ACL permissionsSetfacl-m D:U:ADMIN:RW DirectoryDefault ACL permissions, the new file in the directory inherits the parent permission(2) Special permissions for files1.SetUID for filesExample:-rwsr-xr-x. /usr/bin/passwdThe passwd command has setuid permissions, so you can modify your passwordSet SUID:4 representative suidchmod 4755 file namechmod u+s file nameRemove Suid:chmod 755 file name2.Set
Method One, SPRINGMVC integration Shiro (Shiro is a powerful authority management framework)
Http://www.360doc.com/content/14/0529/09/11298474_381916189.shtml
Method Two, role-based access rights control
Role-based access rights controlLess nonsense, the theory of things do not want to say more, online a lot, I have to point to the actual.First, role-based a
before you say http://www.php.cn/code/12171.html "target=" _blank "> Rights Management, you should know what permissions management should have:
(1), the user can only access, the specified controller, the specified method
(2), the user can exist in multiple user groups
(3), user group can choose, specify the controller, the specified method
(4), can add control
two or two digits/[0-9][0-9 ]*/ one or more digital filename filesName ofs output field delimiter, default is also a space, you can change to a tab and so on ors The record delimiter for the output, which defaults to a newline character, that is, the processing result is a line of output to screen-f ' [: #/] ' defines three separators.7. HeadUsage: head [options] ... [File] ... The long option must use parameters that are also required for short options.-C: Displays the contents of the first
Bin: Executables, C-compiled binaries and shell scripts
Sbin: Super User executable, system-level instruction
ETC: Configuration file
LIB: Compiling dynamic link libraries, functions, etc.
Home, home directory, theoretically each user has a home below.
Dev: Interface Device files
Proc and SYS: System information such as process information, etc.
var: run-time
annotation InformationUsermod-l: Modify User NameUsermod-l: Lock UserUsermod-u: Unlocking UsersUsermod-f: Set inactivity PeriodUSERMOD-E yyyy-mm-dd: Specify user account expiration dateUsermod-d: Modify the user home directory, the new home directory will not be automatically created, the original home directory files will not be moved to the new home directory, to move the original home directory data, using the-M optionUserdel-r: Delete the user, delete the user's home directory, without the-
' username ' @ ' host '; Such as: Will reclaim the user ' testuser ' @ ' localhost ' all permissions. Revoke all on . from ' testuser ' @ ' localhost '; 9. Tables related to user authorization in MySQL library: DB: Permissions at the library level. Tables_priv: Table-level permissions. Colomns_priv: Column-level permissions. Procs_priv: The permissions associated with stored procedures and stored functions. Proxies_priv: Delegate user-related permissions. 10. Flush: (1), flush privileges: refre
company server has limited hard disk space and requires file compression to save disk space. ()File properties, advanced, compression settings650) this.width=650; "style=" Float:none; "title=" 17.png "alt=" wkiol1usqdadme-saagycxw1xse741.jpg "src="/HTTP/ S3.51cto.com/wyfs02/m02/5b/c3/wkiol1usqdadme-saagycxw1xse741.jpg "/>650) this.width=650;" style= "Float:none;" Title= "16.png" alt= "wkiom1usp3-i-chgaago7zavuyc858.jpg" src= "http://s3.51cto.com/wyfs02/M00/5B/C9/ Wkiom1usp3-i-chgaago7zavuyc858
-EA540.jpg "title=" 15.png "alt=" wkiom1uspwdyxl7faamn6ltq-ea540.jpg "style=" Padding:0px;margin:0px;vertical-align:top;border:none;float: none; "/>3. The company server has limited hard disk space and requires file compression to save disk space. ()File properties, advanced, compression settings650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M02/5B/C3/wKioL1USqDaDMe-SAAGYCXW1xsE741.jpg "title=" 17. PNG "alt=" wkiol1usqdadme-saagycxw1xse741.jpg "style=" padding:0px;margin:0px;vertical-al
Linux User and Rights managementI. Overview of the OrderUser management: Useradd,userdel,usermod,passwd,id,finger,chsh,chfn,chage,pwckGroup Management: GROUPADD,GROUPDEL,GROUPMOD,GPASSWD,NEWGRPRights Management: Chown,chgrp,chmod,umask/ETC/PASSWD User store filesFormat: User name: Password: UID:GID:comment Note: Home d
Environment:1. UNIX-like systems2.git1.6.6+ perl5.8.8+ openssh5.0+3. Warehouse users, self-add user git4.ssh no key-free usergit-server:192.168.50.108git-client:192.168.50.112Deployment:Git-server:1. Use the GIT user's environment operation, or modify the git user's shell switch post deploymentSudo-u gitgit clone https://github.com/sitaramc/gitolite.gitmkdir $HOME/bin./gitolite/install-to/home/git/bin/2. Generate admin key (root as Administrator here)SSH-KEYGEN-T RSAcp/root/.ssh/id_rsa.pub/tmp/M
script files that can be run, like the ' exe ' suffix on Windows, but not the type of file that is distinguished by the file suffix on Linux.A directory must have both read and Execute permissions to open, and a directory with write permission to allow other files to be created, because the directory file actually holds information owner permissions such as a list of files in that directory.The owning User group permission refers to all other users i
Rights management system, it is mainly in order to give different users to set different permissions, so that users with different permissions to log on after the use of the same function.
First look at the database
There are a total of 5 tables, users,roles and roleswork 3 tables with another 2 tables form a "W" type of relationship, is also a more common way to access the database, first of all to do th
▲mysql UsersMySQL database has only one root user by defaultMySQL database saves user information in the MySQL database's UESR data sheet▲mysql User Management#创建一个新的用户CREATE user username identified by ' password ';Note: A new user cannot log in after creation because no permissions are set#重命名一个用户RENAME user name to new user name;#删除一个用户DROP user username;#修改当前用户的密码SET PASSWORD = PASSWORD (' password ');N
)Password expires days payback will be lockedFrom January 1, 1970 onwards, the number of days after the account expires.
Group file formatGroup name: is the group nameGroup password: usually does not need to be set, the password is recorded in/etc/gshadowGID: Is the ID of the groupList of users with the current group as additional groups (comma delimiter)
Gshdow file formatGroup name: is the group nameGroup Password:Group Admins list: List of group admins, change groups passwords and mem
identification: groupid,gid; generally used 16bits binary representation (its range is: 0-65535);Administrators group id:0;Normal user group ID range: 1-65535System user group ID range: 1-499 (CENTOS6), 1-999 (CENTOS7)Login User I Group D range: 500-60000 (CENTOS6), 1000-60000 (CENTOS7)Groups are also required to resolve the group name to GID when they are used, and the parsing method is to find the name resolution database within the system (/etc/group)Group databases such as:[Email protected]
identification: groupid,gid; generally used 16bits binary representation (its range is: 0-65535);Administrators group id:0;Normal user group ID range: 1-65535System user group ID range: 1-499 (CENTOS6), 1-999 (CENTOS7)Login User I Group D range: 500-60000 (CENTOS6), 1000-60000 (CENTOS7)Groups are also required to resolve the group name to GID when they are used, and the parsing method is to find the name resolution database within the system (/etc/group)Group databases such as:[Email protected]
Tags: img user login home directory com auto less can't strong deleteLinux Core: All FilesCreate user-related files: WD saveAt the command line, type LESS/ETC/PASSWDFirst line: (each row represents a user's information to: Divide the delimiter into 7 segments)Root user, x represents a password, is a placeholder, otherwise the user information is compromised, that means the user's permissions are compromised
group of its department, so use thechmod G+s TrainingG is the meaning of the group, S is the meaning of inheritance, that is, training the following groups are all trining groups, modified information as follows2 Root manage 4096: managedrwxr2 Root Market 4096: marketdrwxr24096 £ trainingThe permissions for the new user are:2 4096 A Note: bobdrwxr24096: Nash_suThen use separatelychmod Nash_su nash_suChange the file's default user name root t
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.