ACLs are also used by many operating systems to user control access to files and/or other resources such as printers. Typically they will divide file access into read only, execute, or read/write. But they may allow finer control. e.g. a specific user can read and write, but not rename or delete. Most widely used operating systems provide some form of access control. There are many approaches. Netware, for example, has an elaborate ACL based access system as does Windows NT. Unix and unixlike systems provide a access controls that are similar in practice although the implementation is somewhat different in philosophy in that access is controlled associating each object with one, and only one, user.
In many appications, access lists control access based on a name, address or some other characteristic. There is no challenge-authentication process as there is with passwords. This can be good -- or bad -- depending on what the immediate objective is,.
http://www.cisco.com/univercd/cc/td/doc/product/software/ios113ed/113ed_cr/secur_c/scprt3/scacls.htm
https://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/EACL128.html
Return To Index Copyright 1994-2019 by Donald Kenney.