SlideShare a Scribd company logo
1 of 102
Download to read offline
Effective Access Control
with Directories, Services, and Share Points

Macworld 2009: IT845
Download Session Presentations
 http://macpres09.shownets.net
Q&A – MacIT® Conference
We are using Google Moderator to take questions for
   this session.

1.   Go to http://tinyurl.com/633v6e
2.   Pick the topic that matches this session
3.   Sign in using a Google Account
        User Name: macworldexpo09
        Password: macworld09
4.   Submit the questions you want to ask
5.   Vote on others’ questions you want answered
Hello.
Access Control
Spotlight               LDAP
                                    NFS
   Authentication         AFP
            Authorization                 Ownership
Security                     SMB
             Users                         Permissions
                      Groups
   XATTRs
              ACLs                        SACLs
                                POSIX
    ACEs        Share Points            DNS
WHO Needs Access?
WHAT?
HOW?
Users & Groups
Mac OS X Users
        Standard

        Administrator

        Managed with Parental Controls

        Sharing

        Guest

        Root (System Administrator)
Local or Directory
Groups
Ownership & Permissions
Ownership

            Owner
            Group
            Other or World
File Permissions
Folder Permissions
POSIX
Ownership                Folder

Owner
Group


                          File
Permissions

Owner
Group
Other or World
Command Line Admin
    POSIX Permissions
Locked Files
Command Line Admin
         Locked Files




 See chflags man page for more
External Volumes
Access Control Lists
      (ACLs)
ACLs - OS X




      Limited ACLs via Finder
ACLs - OS X Server
OS X ACLs



                                •   User


Access Control Entries (ACEs)
                                •   Type

                                •   Permission

                                •   Inheritance
OS X ACLs



User - Local or Network User or Group

Type - Allow or Deny
OS X ACLs


17 options in each ACE
ACE Inheritance
ACE Inheritance
ACE Inheritance
ACE Inheritance
ACE Inheritance
ACE Inheritance
Inherited vs. Explicit ACEs
ACE Precedence



ACEs evaluated from top to bottom

Allow ACEs are cumulative
Deny ACEs




Deny ACEs override all
POSIX and ACLs



POSIX and ACLs coexist

ACLs evaluated first

POSIX permissions used if no ACE matched

Deny ACEs STILL override
Propagation

  Commonly misunderstood

  Occurs upon file or folder creation

  Occurs when Administrator forces it

  Does NOT occur when Inheritance is set
Inspection


             Effective Permissions Inspector
             (EPI)
Command Line Admin
       ACLs
Command Line Admin
       ACLs
ACL Considerations




    Windows Compatible
ACL Considerations
   Stored as Extended Attributes




 Can be enabled/disabled on the fly
ACL Considerations


Extended Attribute aware tools
Command Line Admin
Other Extended Attribute aware tools
Command Line Admin
Other Extended Attribute aware tools
Standards are good
Map shares to those who share
Apply ACLs Gradually
Deny ACLs are a last resort
Propagate Regularly
Who - Users & Groups

What - Ownership & Permissions
HOW?
Local Folder Sharing
Local Folder Sharing
Local Folder Sharing
The Shared Folder




The Sticky Bit
Command Line Admin
      Sticky Bit
OS X Network File Sharing
OS X Network File Sharing
OS X Network File Sharing
OS X Network File Sharing
FileVault
OS X Server Share Points
Protocol Options
Protocol Options
Spotlight
WebDAV
OS X Server
Standard Configuration
OS X Server
Standard Configuration
OS X Server
Standard Configuration
Share Server Performance Tips

  One dedicated share server for every 150
  remote home directory users

  No more than 300 PHDs/server

  Monitor Spotlight Indexing on share servers

  Use MCXRedirector for ~/Library/Caches
Protocol Ports




*From Mac OS X Server File Services Administration for Version 10.5 Leopard
Protocol Security




   *From Mac OS X Server File Services Administration for Version 10.5 Leopard
Service ACLs
Service ACLs
Service ACLs != Firewall
Services Access
Limited Administration
Service ACLs

                      Server Admin




Workgroup Manager
OS X Server
Standard Configuration
Other ACLs - DNS
Other ACLs - LDAP
Airport ACLs
Expanding OS X ACLs



       Sandbox on OS X Client
Expanding OS X ACLs
Additional Resources
•   http://www.apple.com/server/macosx/resources/
    Mac OS X Server Resources

•   http://images.apple.com/server/macosx/docs/
    File_Services_Admin_v10.5.pdf
    Mac OS X Server File Services Administration

•   http://discussions.apple.com/forum.jspa?forumID=1233
    Apple Discussions Forum - Mac OS X Server v10.5
    Leopard > File Sharing
More Additional Resources
•   http://www.afp548.com/article.php?
    story=MCXRedirector
    Leopard's Built-in Network Home Folder Redirector

•   http://www.bombich.com/mactips/scripts.html
    Bombich’s Service Access Control Lists Utility

•   http://www.mikey-san.net/sandbox/
    Sandbox 2 - Access control lists for Mac OS X Client
Who, What & How
Thanks.
Download Session Presentations
 http://macpres09.shownets.net

More Related Content

Viewers also liked (7)

Virtualization
VirtualizationVirtualization
Virtualization
 
Opp
OppOpp
Opp
 
Food system pres 2 2011 7-18
Food system pres 2 2011 7-18Food system pres 2 2011 7-18
Food system pres 2 2011 7-18
 
香港六合彩-六合彩 » SlideShare
香港六合彩-六合彩 » SlideShare香港六合彩-六合彩 » SlideShare
香港六合彩-六合彩 » SlideShare
 
IAS 7 Cash Flow Statements
IAS 7 Cash Flow StatementsIAS 7 Cash Flow Statements
IAS 7 Cash Flow Statements
 
IAS 16 Property Plant And Equipment
IAS 16 Property Plant And EquipmentIAS 16 Property Plant And Equipment
IAS 16 Property Plant And Equipment
 
IAS 17 Leases
IAS 17 LeasesIAS 17 Leases
IAS 17 Leases
 

Similar to Effective Access Controls with Directories, Services and Sharepoints

Similar to Effective Access Controls with Directories, Services and Sharepoints (20)

AFS introduction
AFS introductionAFS introduction
AFS introduction
 
Expo ciberseguridad
Expo ciberseguridadExpo ciberseguridad
Expo ciberseguridad
 
cibers
ciberscibers
cibers
 
AWS re:Invent 2016: Deep Dive on Amazon Elastic File System (STG202)
AWS re:Invent 2016: Deep Dive on Amazon Elastic File System (STG202)AWS re:Invent 2016: Deep Dive on Amazon Elastic File System (STG202)
AWS re:Invent 2016: Deep Dive on Amazon Elastic File System (STG202)
 
Deep Dive on Amazon EFS | AWS Public Sector Summit 2017
Deep Dive on Amazon EFS | AWS Public Sector Summit 2017Deep Dive on Amazon EFS | AWS Public Sector Summit 2017
Deep Dive on Amazon EFS | AWS Public Sector Summit 2017
 
Libra Library OS
Libra Library OSLibra Library OS
Libra Library OS
 
Cl116
Cl116Cl116
Cl116
 
Distributed File Systems
Distributed File SystemsDistributed File Systems
Distributed File Systems
 
Cl309
Cl309Cl309
Cl309
 
Deep Dive on Elastic File System - February 2017 AWS Online Tech Talks
Deep Dive on Elastic File System - February 2017 AWS Online Tech TalksDeep Dive on Elastic File System - February 2017 AWS Online Tech Talks
Deep Dive on Elastic File System - February 2017 AWS Online Tech Talks
 
Amazon Elastic File System (Amazon EFS) Introduction & Demo
Amazon Elastic File System (Amazon EFS) Introduction & DemoAmazon Elastic File System (Amazon EFS) Introduction & Demo
Amazon Elastic File System (Amazon EFS) Introduction & Demo
 
Amazon EFS: Deploying Scalable, Shared File Systems
 Amazon EFS: Deploying Scalable, Shared File Systems  Amazon EFS: Deploying Scalable, Shared File Systems
Amazon EFS: Deploying Scalable, Shared File Systems
 
Deep Dive on Amazon Elastic File System - June 2017 AWS Online Tech Talks
Deep Dive on Amazon Elastic File System - June 2017 AWS Online Tech TalksDeep Dive on Amazon Elastic File System - June 2017 AWS Online Tech Talks
Deep Dive on Amazon Elastic File System - June 2017 AWS Online Tech Talks
 
Simple Virtualization Overview
Simple Virtualization OverviewSimple Virtualization Overview
Simple Virtualization Overview
 
aclpwn - Active Directory ACL exploitation with BloodHound
aclpwn - Active Directory ACL exploitation with BloodHoundaclpwn - Active Directory ACL exploitation with BloodHound
aclpwn - Active Directory ACL exploitation with BloodHound
 
SRV401 Deep Dive on Amazon Elastic File System (Amazon EFS)
SRV401 Deep Dive on Amazon Elastic File System (Amazon EFS)SRV401 Deep Dive on Amazon Elastic File System (Amazon EFS)
SRV401 Deep Dive on Amazon Elastic File System (Amazon EFS)
 
Nelf2012
Nelf2012Nelf2012
Nelf2012
 
Amazon EFS
Amazon EFSAmazon EFS
Amazon EFS
 
Oracle on linux
Oracle on linuxOracle on linux
Oracle on linux
 
CNIT 152: 13 Investigating Mac OS X Systems
CNIT 152: 13 Investigating Mac OS X SystemsCNIT 152: 13 Investigating Mac OS X Systems
CNIT 152: 13 Investigating Mac OS X Systems
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Effective Access Controls with Directories, Services and Sharepoints