Discretionary Access Algorithm



next up previous contents
Next: Discretionary Access Control Up: Discretionary Access Control Previous: Access Control Lists

Discretionary Access Algorithm

A process may request to read a file, write to a file, or execute/search a file. To determine this access, the POSIX.6 defined algorithm is applied to the ACL of the file. In general terms, the access check is performed on the ACL entries in the following order:

  1. as the file owner.
  2. as a named user.
  3. as belonging to the owning group, together with any named groups.
  4. as belonging in any named groups.
  5. as other.
When a match on one of these is made, the ACL is no longer searched, and the granted or denied permissions are in effect. For example, if a user is specified as a named user, and all permissions in the entry are set to deny access to that user, the user is denied access. The groups the user may belong to are not checked to see if the user may have access through the groups' permissions. The algorithm (somewhat simplified here) is as follows:



next up previous contents
Next: Discretionary Access Control Up: Discretionary Access Control Previous: Access Control Lists



John Barkley
Fri Oct 7 16:17:21 EDT 1994