Questions tagged [acl]

An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object.

An access control list (ACL) specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects. Each entry in a typical ACL specifies a subject and an operation.

When a subject requests an operation on an object in an ACL-based security model the operating system first checks the ACL for an applicable entry to decide whether the requested operation is authorized. A key issue in the definition of any ACL-based security model is determining how access control lists are edited, namely which users and processes are granted ACL-modification access. ACL models may be applied to collections of objects as well as to individual entities within the system hierarchy.

Benefits of ACLs include:

  • easy to implement
  • easy to understand
  • extremely fine-grained: down to the user and the resource

Drawbacks of ACLs include:

  • too fine-grained and thus too hard to manage. The ACL management is on a per-object level
  • not context-aware: ACLs do not take time, location, or other attributes into consideration
  • doesn't scale: ACLs only work on a small set of objects and users.

Other access control models include and which aim to address the shortcomings of .

More information can be found on Wikipedia's definition of access control lists.

2775 questions
1
vote
2 answers

Symfony2 ACLs and Doctrine2: database is never in sync with the current entity metadata

I basically have two different Doctrine connexions in my config.yml file, default (dev, prod environments) and test (for my test suite). Here is my default connexion config: # Doctrine Configuration doctrine: dbal: default_connection: …
guillaumepotier
  • 7,369
  • 8
  • 45
  • 72
1
vote
1 answer

DACL for event preventing users from setting it

I would like to do the following: create an event registered with the global namespace and modify it's DACL so that: Regular users can read the event state (Using WaitForSingleObject with a 0 timeout value) Administrators can change the event…
Stephane
  • 3,173
  • 3
  • 29
  • 42
1
vote
1 answer

Use DNS with IIS Express Under Windows XP

I'm setting up VS2010 SP1 with IIS 7.5 Express so I can use SSL in my Dev environment. Following Scott Hanselman's excellent post here is working for me. The only problem is he's running on Windows 7 (I assume), where I'm on XP. The bit that trips…
Ben McIntyre
  • 1,972
  • 17
  • 28
1
vote
2 answers

app.user is not accessible from unsecured area

How is it possible to get app.user from unsecure area? So I have secured area which starts from ^/user. But I need to display logout form on area which is accessible for everyone and not secured. How is this possible? My security.yml: security: …
Jevgeni Smirnov
  • 3,787
  • 5
  • 33
  • 50
1
vote
2 answers

How to insert rule in Google Calendar ACL from Google Apps Script

How can I add a new user to the ACL for a Google Calendar? I'm trying to send a POST HTTP request. Perhaps there is something wrong with the XML? The code below generates a server error (400). (Edit: Shows the…
KarBytes
  • 61
  • 8
1
vote
0 answers

Parse.com invalid acl key *unresolved

I'm using Parse.com in my android application. When I retrieve datas it is ok, but when I try to add something to database it shows an error: invalid acl key. What I have to add extra when I update database
ardakshalkar
  • 625
  • 2
  • 7
  • 21
1
vote
2 answers

How can I implement "firewall rules" style timebased ACL implemantation ? (C#, Sql Server)

I'm using ServiceStack and I dont know if my way is true or not for this requirement with ServiceStack Permission support. Now rule table structure…
Oguz Karadenizli
  • 3,449
  • 6
  • 38
  • 73
1
vote
1 answer

Cakephp authenticate authorize only admin without User model

I have integrated the Auth component and the Acl component (and behavior) and it all works fine with the User model etc. Now I would like to have the admin to be completely independent from the User model and the access control lists. Why? Well,…
Evert
  • 2,022
  • 1
  • 20
  • 29
1
vote
1 answer

adjacency list vs mptt for designing access control list

I am designing access control list in my system. In that there will be a tree of groups and accounts as shown below All users administrators john privilege members Peter mike In the above tree 'All users'…
taher chhabrawala
  • 4,110
  • 4
  • 35
  • 51
1
vote
1 answer

Recursive HTML ACL protected menu?

Is there any example of how to create recursive menu protected by ACL? Idea is to have printed traversal path to end-document with read access even if user don't have read access to parent node. Here is HTML code example of how it should…
Vukasin
  • 561
  • 5
  • 9
1
vote
2 answers

Hierarchical RBAC implementation in PHP?

What would you suggest? I checked out NIST RBAC PHP API 0.65 but it does not seem to support hierarchy. In essence I want to have users with sub-users and the sub-users would have roles and access only to what their parent can access. Which seems…
johnjohn
  • 4,221
  • 7
  • 36
  • 46
1
vote
0 answers

Network service account not inherited in ACL

I have a problem with files that are being moved into a folder that is set to replace permissions on child objects for the Network Service account. The process is that a media file is uploaded to a website, and is encoded by a piece of software.…
5lovak
  • 411
  • 1
  • 4
  • 8
1
vote
1 answer

Querying records by name in a lookup in a Access Control List (in sql and korma)

I'm a newbie to sql and am trying to follow this example here: http://net.tutsplus.com/tutorials/php/a-better-login-system/ So gist of the problem is, There are permissions that allow access to resources There are roles that can have multiple…
zcaudate
  • 13,998
  • 7
  • 64
  • 124
1
vote
1 answer

acl implementation - which way is more performant: deny acces for all?

I'm trying to implement an ACL and I would like your opinion about which could be the best (more performant) way to do it: Is it better to deny access to everybody and grant permissions according to each user, or is it better to grant access for…
sergioviniciuss
  • 4,596
  • 3
  • 36
  • 50
1
vote
3 answers

Mercurial ACL prevents pull

Please help me with understanding the mechanics behind Mercurial in combination with ACL. Our team uses Mercurial as a versioning system. The setup is very simple: two developers (one linux, one windows), remote repo (linux). Every time, the windows…
Eric
  • 1,594
  • 1
  • 15
  • 29
1 2 3
99
100