O'Reilly logo

Solaris™ Operating Environment Boot Camp by Dominic Butler, David Rhodes

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How Permissions Are Represented

When users log in to a Solaris system, they enter a user name and a password. This mechanism establishes the user's identity and results in the user being awarded a specific user ID (UID) and a group ID (GID) as part of his or her credentials.

When we run the ls -l command in a directory containing files, we see that each file (or directory) also has a UID (the third column) and a GID (the fourth column):

 hydrogen# ls -l total 476 drwxrwxr-x 5 adm adm 512 Jul 7 17:47 acct -rw------- 1 uucp bin 0 Jul 7 15:39 aculog -r--r--r-- 1 root root 28 Aug 22 21:52 lastlog drwxr-xr-x 2 adm adm 512 Jul 7 15:38 log -rw-r--r-- 1 root root 101744 Aug 22 21:52 messages drwxr-xrwx 2 adm adm 512 Jul 7 15:38 passwd drwxrwxr-x 2 adm ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required