Displays the access control information of a file.
aclget [ -o OutFile ] File
The aclget command writes the access control information of the file specified by the File parameter to standard output or to the file specified by the OutFile parameter.
The information that you view includes attributes, base permissions, and extended permissions. To see an example of access control information, refer to Access Control List.
-o OutFile | Specifies that the access control information be written to the file specified by the OutFile parameter. |
Access Control: This command should be a standard user program and have the trusted computing base attribute.
In an access control list, attributes, base and extended permissions are in the following format:
attributes: ( SUID | SGID | SVTX )
base Permissions:
owner (name): Mode
group (group): Mode
others: mode
extended Permissions: ( Enabled | Disabled )
permit mode u:Username,g:groupname
deny mode u:Username,g:groupname
specify mode u:Username,g:groupname
The access modes are: read (r), write (w), and execute/search (x), with the Mode parameter expressed as rwx (with a dash replacing each unspecified permission)
For example, the following ACL indicates that the file belongs to user user1 and the group staff. In addition, the user user2 has read access for the file:
attributes:
base Permissions:
owner (user1): rw-
group (group): r--
others: ---
Extended Permissions: Enabled
permit r-- u:user2
The following ACL indicates that the file belongs to same user and group, but in this example, every other user has read access except for user2:
attributes:
base Permissions:
owner (user1): rw-
group (group): r--
others: r--
extended Permissions: Enabled
deny r-- u:user2
aclget status
An access control list appears, similar to the example in Access Control Lists.
aclget plans | aclput status
This copies the access control information.
/usr/bin/aclget | Contains the aclget command. |
The acledit command, aclput command, chmod command.
Access Control Lists in AIX 5L Version 5.2 System User's Guide: Operating System and Devices.
The Auditing Overview in AIX 5L Version 5.2 Security Guide explains more about audits and audit events.
For more information about the identification and authentication of users, discretionary access control, the trusted computing base, and auditing, refer to Standalone System Security in AIX 5L Version 5.2 Security Guide.