558), and then assigned to a primary group. A user can also be a part of other groups as well, however, will always have a primary group assigned. The base access control of UNIX is heavily dependent on the user id as the access request always checks the user id against the 12 security bits assigned to each file. The first 3 bits are the user bits, followed by the group bits, and then the other bits. The final 3 bits are assigned to set user ID and set group ID, followed finally by the sticky bit…
Words 784 - Pages 4