A list that specifies the rules for access to a particular resource. Microsoft Windows NT implements user-based ACLs, which specify the resources available to a particular user.
(ACL) A list of security protections that applies to an object. (An object can be a file, process, event, or anything else having a security descriptor.) An entry in an access control list (ACL) is an access control entry (ACE). There are two types of access control list, discretionary and system. See also access control entry, discretionary access control list, security descriptor, and system access control list.
A list of user ID's and the specific access permission for specific files on the system.
Identifies the users who may access a resource, and the type of access to that resource, that a user is permitted to have. Once a user is authenticated the ACL controls what they are permitted to do.
Database that describes the type of access each user has to a service.
The information that identifies specific users or groups and their access privileges for a particular file or directory.
A list that contains information about an object describing which other objects can access it. It is a property of every object in the NetWare® Directory Services™ database. Trustees and the Inherited Rights Filter are contained in the ACL.
The part of a security descriptor that restricts and audits access to an object. The owner of an object has discretionary access control of the object and can change the object's ACL to allow or disallow other users access to the object. Access control lists are ordered lists of access control entries (ACEs).
A listing of Access Control Entries specifying access rights to services and specified data files located within Windows NT File System (NTFS) directories.
a attribute associated with files, directories, and printers that allows for restricting or granting the capability to manipulate a given object
a compound object, a bundle of information that specifies which users or groups have which permissions
a container for access control entries (ACEs), which determine which access rights should be granted or denied to principal
a list of entries associated with a file or folder that specifies which users and groups have access to that folder or file
a list of registered users , groups , or both, that is associated with one and only one PURL, domain, or partial redirect
an extended file permission
a set of identifier, rights pairs used to restrict access to a given dataset, attribute or attribute within an entry
a set of rules that either allow or deny the privileges of performing various actions (read, write, execute, etc) to a user or group on a filesystem object such as a file or a directory
a way to provide security for each attribute of an entry
Contains entries that identify which groups or users have access to a particular object, including the type and scope of that access.
Rules for packet filters (typically routers) that define which packets to pass and which to block.
An authorization mechanism in a protocol that maintains lists of hosts that are allowed to access each server controlling a display. The access control list for a user or group in a particular realm specifies the privileges that the user or group is granted to access server resources. Resources include such things as files, directories, and servlets.
The Access Control List - ACL - is a file which a computer's operating system uses to determine the users' individual access rights and privileges to folders / directories and files on a given system. Common privileges allow a user to read a file (or all the files in a folder / directory), to write / update the file or files, and to run (execute) the file (if it is an executable file, or program).
A list associated with an AFS directory that specifies what actions a user or group is permitted to perform on the directory and its files.
a list that specifies what access privileges users have to a directory, specifically, the right to lookup, insert, delete, read, write, lock, or administer files in a directory (abbreviated as l, i, d, r, w, k, a, respectively).
A list of privileges associated with every directory and file that specifies the type of access allowed for any user. Refer to the Data General Command Line Interpreter (CLI) User's Manual.
A list that indicates which users or groups have permission to access or modify a particular file; the Windows discretionary access control list (DACL) and system access control list (SACL) are examples of access control lists.
A mechanism that implements access control for a system resource by listing the identities of the system entities that are permitted to access the resource.
A structure that enables administrators to set permissions beyond the standard UNIX permissions. An ACL enables administrators to set permissions for several individual users and/or groups. at A list of programs (jobs) entered into the system that need to be run only once.
Part of Windows NT’s security description that controls access to a Windows NT object, such as a file. The owner of an object can change access control entities in the list to grant or revoke permissions (access rights) for the object.
A list of users that have been granted or denied access to a resource. Used to control access to services and folders.
A mechanism for determining the access level and permissions that a given computing resource, such as a file or database field, provides for a given identity.
(ACL) (1) (n.) An authorization mechanism in the X protocol that maintains lists of hosts which are allowed to access each server that controls a display. By default, only the local host can use the display, plus any hosts that are specified in the access control list for that display.(2) (n.) A file that contains a list of principals with certain access permissions. Typically, a server consults an access control list to verify that a client has permission to use its services. Note that a principal which is authenticated by GSS-API can still be denied services if an ACL does not permit those services.
A file that contains information indicating who can and cannot access particular objects in the data directory. Purveyor creates a separate ACL file for each restricted object, and these files determine whether users and groups can access objects on a global, virtual path, browse, or file level.
A set of access control entry (ACE) strings that collectively provide access control for calendars, calendar properties, and calendar components such as events and todos (tasks). An example of an ACL with three ACEs, with each ACE separated by a semi-colon is @@o^a^r^g;@@o^c^wdeic^g;@^a^sf^g.
The mechanism for controlling access to your directory. In Sun ONE Directory Server, an ACL is an aci attribute in a directory entry.
A list kept by routers to control access to or from the router for a number of services (for example, to prevent packets with a certain IP address from leaving a particular interface on the router).
One rudimentary security mechanism is the ACL in which the enforcer has a list of the physical (hardware) addresses of the devices (usually computers) permitted to access a network. These addresses are stored in MAC format. Drawbacks of this mechanism are that it's less useful to authenticate a hardware device than a user, and that MAC addresses can be spoofed by imposters. The advantage is that it's simple and easily administered.
A detailed list of permissions granted to users or groups with respect to file and network resource access.
The data set that contains the access rights each user has to a directory or file.
A sequential list of permit and deny conditions. The list defines the connections permitted to pass through a device, usually a router. ACLâ€(tm)s act as a basic method of limiting access to the network.
A list of principals that are authorized to have access to some object.
(1.) A file attribute that contains the basic and extended permissions that control access to the file. (2.) A list of hosts (maintained by Enhanced X-Windows) that have access to client programs. By default, only programs on the local host and those in this list, also known as "access list," can use the display. The list can be changed by clients on the local host; some server implementations can also modify the list. The authorization protocol name and data received by the server at connection setup may affect the list as well.
Most network security systems operate by allowing selective use ofservices. An Access Control List is the usual means by whichaccess to, and denial of, services is controlled. It is simply alist of the services available, each with a list of the hostspermitted to use the service. ACK
A list of security protections that apply to an entire object, a set of the objectâ€(tm)s properties, or an individual property of an object. There are two types of access control lists: discretionary and system. See also object.
A protection mechanism using a more refined level of protection than that available with UIC-based protection. ACLs can be used to grant or deny access to individual users or groups of users.
advertisers The operating system file that gives users access to files and programs they have no good reason to access
n. A list associated with a file that contains information about which users or groups have permission to access or modify the file. Acronym: ACL.
A collection of access control entries that define a hierarchy of access rules to be evaluated when a server receives a request for access to a particular resource. See access control entry (ACE).
A list of group codes that a LAT service node includes in a service announcement to designate the LAT users permitted to use the service.
Most network security systems operate by allowing selective use of services. An Access Control List is the usual means by which access to, and denial of, services is controlled. It is simply a list of the services available, each with a list of the hosts permitted to use the service.
A list associated with an AFS directory that specifies what actions a user or group can perform on the directory and the files in it. There are seven access permissions: ( administer), ( delete), ( insert), ( lock), ( lookup), ( read), and ( write).
Usually a list of devices that are allowed access to a network or network resource. This is sometimes known as MAC address filtering.
List of access control entries (ACEs) that grant or deny access to a particular system object.
DHCP mechanism whereby the server can allow or disallow the request or action defined in a packet. See also transaction signature (TSIG).
A collection of ACEs. An ACL is a mechanism for defining which users have access to your server. You can define ACL rules that are specific to a particular file or directory, granting or denying access to one or more users and groups.
access control list - (ACL) A list of security protections that apply to an entire object, or a set of the objects properties, or an individual property of an object. There are two types of access control lists: discretionary and system.
access control list (ACL) - In Windows-based systems, a list of access control entries that apply to an entire object, a set of the objects properties, or an individual property of an object, and that define the access granted to one or more security principals.
An access control list (ACL) provides finer-grained file security than traditional UNIX file protection provides. For example, an ACL enables you to allow group read access to a file, while allowing only one member of that group to write to the file.
A level of Windows NT permission that you can set on a file or a folder allowing some users to access it while other users cannot access it. For details, see the Windows NT documentation. Boolean A type of variable that can have only two values, typically 1 or 0. Boolean variables are often used to express conditions that are either TRUE or FALSE. Queries with Boolean operators ( AND, OR, NOT, and NEAR) are referred to as Boolean queries.
Contains a list of users or groups and their security permissions. Identifies who can update, modify, or delete an object on a computer or resource on the network.
A list of access control entries that determines which principals have access to a given resource or resources.
In computer security, a collection of all access rights for one object. In computer security, a list associated with an object that identifies all the subjects that can access the object and their access rights; for example, a list associated with a file that identifies users who can access the file and identifies their access rights to that file.
A list of user accounts and user groups and their privileges that is associated with a particular resource.
(ACL) A list of the services available on a server, each with a list of the hosts permitted to use the service.
In computer security, an access control list (ACL) is a list of permissions attached to an object. The list specifies who or what is allowed to access the object and what operations are allowed to be performed on the object. In a typical ACL, each entry in the list specifies a subject and an operation: for example, the entry (Alice, delete) on the ACL for file XYZ gives Alice permission to delete file XYZ.