Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
Handling security for your files z/OS UNIX System Services User's Guide SA23-2279-00 |
|
Each user has user ID (UID) and group ID (GID) numbers that are set when the user is defined to the system. A user always belongs to at least one group—for example, a department—and each group that uses the system is assigned a GID. The system uses the UID and GID to identify the files and processes that a user may use. When you create a directory or a file, it is automatically associated with your UID, and its GID is set to the owning GID for the parent directory (the directory it is in). There are three classes of users whose access you can control with
the permission bits (ACLs allow access control for any user or group):
You control access to a file and directory that you own through its permission bits. (Taken together, the permission bits are often called the mode.) In this topic, we discuss:
|
Copyright IBM Corporation 1990, 2014
|