How to implement Access Control Lists (ACLs) in Red Hat Enterprise Linux

Solution Verified - Updated -

Issue

  • How to implement Access Control Lists (ACLs) in Red Hat Enterprise Linux
  • How to use ACLs in RHEL
  • What is a file ACL

Environment

  • Red Hat Enterprise Linux 4
  • Red Hat Enterprise Linux 5
  • Red Hat Enterprise Linux 6
  • ext3, ext4

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.

Current Customers and Partners

Log in for full access

Log In