Search⌘ K

Permission Bits and Access Control Lists

Explore how operating systems use permission bits and access control lists to manage file and directory access. Understand UNIX file permissions for owners, groups, and others, and learn about advanced controls like ACLs for flexible resource sharing. This lesson helps you grasp key mechanisms for secure and shared persistent storage management.

We'll cover the following...

The abstraction of a process provided two central virtualizations: of the CPU and of memory. Each of these gave the illusion to a process that it had its own private CPU and its own private memory. In reality, the OS underneath used various techniques to share limited physical resources among competing entities in a safe and secure manner.

The file system also presents a virtual view of a disk, transforming it from a bunch of raw blocks into much more user-friendly files and directories, as described within this chapter. However, the abstraction is notably different from that of the CPU and memory, in that files are commonly shared among different users and processes and are not (always) private. Thus, a more comprehensive set of mechanisms for enabling various degrees of sharing are usually present within file systems.

Permission bits

The first form of such mechanisms is the classic UNIX permission bits. To see permissions for a file foo.txt, just type:

Shell
prompt> ls -l foo.txt
-rw-r--r-- 1 remzi wheel 0 Aug 24 16:29 foo.txt

Try it out yourself in the terminal below. You can run all the commands in this lesson in this terminal.

Terminal 1
Terminal
Loading...

We’ll just pay attention to the first ...