File owners manage resource permissions by the creation of access control lists. An access control list is simply a table containing usernames and the permissions granted to each user on a resource. In this video, learn about the purpose and use of access control lists, including Windows NTFS file permissions.
- [Mike] In a discretionary access control system,…resource owners have the ability to set…and modify permissions for other users of the system.…File owners manage resource permissions…by the creation of access control lists.…An access control list is simply a table,…containing usernames…and the permissions granted to each user of a resource.…For example, I might own a file on a computer governed…by a discretionary access control system…and decide that I want other users…to access my file.…
I might grant one user the ability to edit the file…and a large group the ability to read the file.…Each one of these decisions would require…an entry in an access control list.…The NTFS file system used by Windows…implements access control lists…and allows users to assign a variety of permissions.…Full control is just what the name implies.…The user can perform any action on the file or folder.…Read permission allows the user…to view the contents of the file.…
Read & Execute permission goes beyond the Read permission…and also allows the user to run executable programs.…
To join one of Mike's free study groups for access to bonus tips and practice questions, visit certmike.com.
- Identity and access management
- Using access cards and biometrics
- Multifactor authentication
- Password authentication protocols
- Device authentication
- Identity management life cycle
- Access control lists
Skill Level Intermediate
Q: This course was updated on 05/18/2018. What changed?
A: New videos were added that cover subject/object model. In addition, the following topics were updated: registration and identity proofing, SSO and federation, and advanced authorization concepts.