Free Essay

Pos355 Week 2

In:

Submitted By shiff1rd
Words 580
Pages 3
File Management
POS355
May 30, 2012

File Management
When implementing a networked information system that will support thousands of users, it is important to consider which files will need restricted access, and which will be open to all users. The purpose of this essay will explore how a Unix system configured to support five thousand users is able to allow only four thousand nine hundred ninety of those users access to a single file.
Unix File Access Control
Although Unix has evolved over the years, even the most up to date system relies quite heavily upon the originally introduced file access scheme found in the very early versions of Unix. The core of this functionality essentially states that there are three possible permissions any user can have with a single file: read, write, and execute. Permissions for each of these actions are stored with the file’s inode and granted for three groups: the file owner, member’s of the file’s group; and everyone else. All of these permissions are identified in the first nine bits of the file’s twelve protection bits.
The last three bits of the file’s protection bits indicate special behavior. The first two bits tell Unix whether to duplicate the permissions granted for the file owner, or file group, upon execution, respectively. The third bit represents a sticky bit that was originally used in early versions of Unix, but has since been decommissioned. This permission essentially told the operating system whether to keep the contents of the file in memory or not.
As we can see, simple access to a limited number of users within Unix is relatively simple. At it’s core, you simply need to ensure that a group exists with the appropriate permissions for each file, and subsequently all appropriate users are assigned to that user group. For example, a single file that has two groups of users (readers and writers) would require two separate groups, with corresponding users, be established in the system.
File Access for Owner
Managing file access gets difficult when working with a large volume of users as permissions are based upon either the file creator or the file group. In our example above, for each file that is created a new group would need to be established with corresponding members in order for non-file owners to access the file. For this week’s assignment, granting access to the four thousand nine hundred ninety users would be quite simple. The System Administrator could create a single group in which all users are a member. However, as the system grows and files multiply, user groups will significantly increase as well. This is where Access Control Lists (ACL) come in handy.
In the more recent versions of Unix, System Administrators are able to set file access control lists to grant an unlimited number of users or groups to each file. No extra configuration of the files is necessary, the System Administrator simply need to understand the setfacl command (which is distributed with FreeBSD) and how permissions are granted.
Conclusion

Granting access for a single file is relatively simple, even for a large base of users. The System Administrator can simply grant appropriate permissions at the group level for the file. Next, the Admin must create a group of users that is equal to the file’s group and assign all four thousand nine hundred ninety users to the group. This will ensure that each user will be able to access the file as needed.

Similar Documents

Free Essay

Pos355 Week 2 File Management Paper

...Week 2 File Management Paper POS/355 Joey Turner JR Professor Alicia Pearlman Most UNIX systems that you will come across are usually based on the control scheme of file access associate with early versions of the UNIX system. In UNIX, every individual user is assigned their own unique user ID that they may use to access files saved in memory. Users are identified by being a part of a private group or various groups which can be identified then by their group ID. When a file is created in LINUS it is identified as being owned by a particular user and marked with the user that created the file’s user id. The file also belongs to whatever group the user is associated with as well or else the group of its parent directory but only if that parent directory has SetGID permission configured. SetGID (SetGIUD) are access rights flags that allow users to run executable (.exe) files with the permission of user ids or group id. Protection bits in sets of twelve are associated with each file as well. The owner ID, group ID, and protection bits are part of the file’s index node-which are a data-structure used to represent a file-system object which can be a file or file directory. There are 9 of the 12 protection bits that are advocated to the user and group ids owners of the files which control reading, writing, and execute permissions. These nine protection bits then form a system of hierarchy of user id, group id, and all others. The hierarchy is also coupled with the...

Words: 884 - Pages: 4

Premium Essay

Pos 355 Final Exam Answers

...NAME: David Sauerbrei POS355 Week 5 Final Exam This is an open-book, open-notes exam. You may consult the textbook, lectures and PowerPoint slides, but no other source. This exam must be an individual effort. Each question is worth one-half point. The total point value of this exam is 20 points. Please post your completed exam in the Assignments area by 11:59 p.m. Monday, May 14. 1. The operating system serves as an intermediary between the user and the computer hardware. (True / False) ANSWER: True 2. The operating system serves as an intermediary between a process and the computer hardware. (True / False) ANSWER: False 3. This is the brain of a computer. a. smart card b. artificial intelligence c. logical address d. read-only memory e. central processing unit ANSWER: e 4. When a single user runs two copies of the same program concurrently (for example, two instances of NotePad), two processes are created. (True / False) ANSWER: True 5. The following operating systems were developed by Microsoft: a. Mac OS b. Linux c. Solaris d. all of the above e. b and c only f. none of the above ANSWER: f 6. A _______________ operating system supports a system that has rigid time requirements on the CPU and data flows. ANSWER: Real-time 7. Time-sharing requires the following. a. process scheduling b. process protection c. deadlock...

Words: 1596 - Pages: 7