Unix security: Difference between revisions

Content deleted Content added
m Design concepts: Permissions: Already covered in the already linked "file system permissions" article. Code examples are of no use here. This isn't stackoverflow.
m User groups: Remove redundant statement from sentence before
Line 10:
 
===User groups===
 
Users under Unix style operating systems often belong to managed groups with specific access permissions. This enables users to be grouped by the level of access they have to this system. Many Unix implementations add an additional layer of security by requiring that a user be a member of the ''[[Wheel (computing)|wheel]]'' [[Group identifier (Unix)|user privileges group]] in order to access the <code>su</code> command.<ref name=levi>{{cite book|title=UNIX Administration: A Comprehensive Sourcebook for Effective Systems and Network Management |first=Bozidar |last=Levi |publisher=CRC Press |year=2002 |pages=207 |isbn=0-8493-1351-1}}</ref>
 
===Root access===