Face questions resolved | ACL access control mechanisms

ACL (Access Control List) Access Control Lists

It includes three aspects:

First, the privilege mode (Scheme)

1, IP: the IP address of the authority control particle size

2, Digest: The most commonly used, with similar username: password identification authority to configure the permissions, to facilitate application to distinguish between different access control

3, World: access control most open way, is a special digest mode, there is only one authority identifier "world: anyone"

4, Super: Super User

Second, the authorization object

Authorization object refers to permissions granted to a user or a designated entity, e.g. the IP address or machine lights.

Third, permission Permission

1, CREATE: create a data node privilege allows authorized to create sub-node objects in this Znode

2, DELETE: delete child nodes permissions to allow authorization object to delete the data node's children

3, READ: read permission data node, permitting authorized access to the data objects and read the data contents of the node or sub-node list, etc.

4, WRITE: Update authority node data, the data permitting authorized target node update operation

5, ADMIN: rights management data node, permitting authorized object ACL setting operation related to the data node

file

Guess you like

Origin www.cnblogs.com/it-carry/p/11641326.html