Lines Matching refs:access

7 says which user's access permissions it has.
9 Users are classified into @dfn{groups} for access control purposes. Each
11 process can use for access to files.
14 @dfn{persona}. This determines which files the process can access.
17 change its access permissions.
39 * Enable/Disable Setuid:: Turning setuid access on and off.
41 * Tips for Setuid:: How to avoid granting unlimited access.
68 in a data base which you can access as described in @ref{User Database}.
93 is'' for purposes of access control.
104 user's default group. These values do not play a role in access
112 its permission to access files, see @ref{Access Permission}.
136 program needs access to a resource that wouldn't ordinarily be
143 This kind of restricted access can be implemented by having the program
173 and setgid bits of a file's access mode. @xref{Permission Bits}.
413 is zero. The effective group ID only affects access permissions.
593 A typical setuid program does not need its special access all of the
594 time. It's a good idea to turn off this access when it isn't needed,
595 so it can't possibly give unintended access.
608 Then it can turn off game file access with
627 turn setuid access on and off by using @code{setreuid} to swap the real
637 Why does this have the effect of toggling the setuid access? Suppose a
642 only @code{jdoe} access. Another swap brings @code{games} back to
643 the effective user ID and restores access to the scores file.
799 It is easy for setuid programs to give the user access that isn't
801 Here are some guidelines for preventing unintended access and
842 If the @code{setuid} part of your program needs to access other files
844 would ordinarily have permission to access those files. You can use the
845 @code{access} function (@pxref{Access Permission}) to check this; it
1730 most systems, but on some systems a special network server gives access
2264 service provides access to it.