Data Management Glossary nnn
-
A
- Active Storage
- Adaptive Data Management
- AI Agents
- AI and Corporate Data
- AI Compute
- AI Data Extraction
- AI Data Governance
- AI Data Ingestion
- AI Data Leakage
- AI Data Management
- AI Data Pipelines
- AI Data Preparation
- AI Data Workflows
- AI Inferencing
- AI Infrastructure
- Air Gap
- Alternate Data Streams (ADS)
- Amazon (AWS) S3 Intelligent Tiering
- Amazon FSx
- Amazon Glacier (AWS Glacier)
- Amazon S3 (AWS S3)
- Amazon S3 Glacier Instant Retrieval
- Amazon Tiering
- Analytics-driven Data Management
- Application Programming Interface (API)
- Archival Storage
- Archiving
- Artificial Intelligence (AI)
- AWS DataSync
- AWS Lambda
- AWS Snowball
- AWS Storage
- Azure Data Box
- Azure NetApp Files
- Azure Storage
- Azure Tiering
-
C
- Capacity Planning
- Carbon footprint
- Carbon Usage Effectiveness
- Chain of Custody
- Chargeback
- Checksum
- Cloud Archiving
- Cloud Cost Optimization
- Cloud Costs
- Cloud Data Analytics
- Cloud Data Growth Analytics
- Cloud Data Management
- Cloud Data Migration
- Cloud Data Storage
- Cloud File Storage
- Cloud Migration
- Cloud NAS
- Cloud Object Storage
- Cloud Storage Gateway
- Cloud Tiering
- CloudPools
- Cold Data
- Common Internet File System (CIFS)
- Compression
-
D
- Dark Data
- Data Analytics
- Data Archiving
- Data Backup
- Data Center Consolidation
- Data Center Emissions
- Data Classification
- Data Curation
- Data Governance
- Data Hoarding
- Data Indexing
- Data Lake
- Data Lakehouse
- Data Lifecycle Management
- Data Lineage
- Data Literacy
- Data Management
- Data Management for AI
- Data Management Policy
- Data Migration
- Data Migration Chain of Custody
- Data Migration Plan
- Data Migration Software
- Data Migration Warm Cutover
- Data Mobilization
- Data Orchestration
- Data Protection
- Data Retention
- Data Retrieval
- Data Services
- Data Silos
- Data Sprawl
- Data Storage
- Data Storage Costs
- Data Storage Management Services (DSMS)
- Data Storage Optimization
- Data Storage Tags
- Data Tagging
- Data Tiering
- Data Transfer
- Data Virtualization
- Deduplication
- Deep Analytics
- Dell PowerScale
- Dell PowerScale SmartPools
- Department Showback
- Digital Business
- Digital Pathology Data Management
- Direct Data Access
- Director (Komprise Director)
- Disaster Recovery
- Dynamic Data Analytics
- Dynamic Links
-
E
-
F
-
G
-
H
-
I
-
K
-
M
-
N
-
O
-
P
-
R
-
S
- S3
- S3 Data Migration
- S3 Intelligent Tiering
- Scale-Out Grid
- Scale-Out Storage
- Secondary Storage
- Sensitive Data Detection
- Shadow AI
- Shadow IT
- Sharding
- Shared-Nothing Architecture
- Showback
- Smart Data Workflows
- SmartPools
- SMB Data Migration
- SMB protocol (Server Message Block)
- Solid State Drives (SSDs)
- Storage Area Network (SAN)
- Storage Array
- Storage as a Service
- Storage as a Service (STaaS)
- Storage Assessment
- Storage Costs
- Storage Efficiency
- Storage Insights
- Storage Metrics
- Storage Pool
- Storage Reclamation
- Storage Refresh
- Storage Tiering
- Stubs
- Sustainable Data Management
- Symbolic Link
- System Metadata
-
U
- Unstructured Data
- Unstructured Data AI
- Unstructured Data Analytics
- Unstructured Data Classification
- Unstructured Data Governance
- Unstructured Data Management
- Unstructured Data Migration
- Unstructured Data Preparation
- Unstructured Data Storage
- Unstructured Data Tiering
- Unstructured Data Workflows
- Unstructured Metadata
POSIX ACLS
POSIX ACLs are fine-grained access rights for files and directories. An Access Control Lists (ACL) consists of entries specifying access permissions on an associated object. POSIX ACLs provides more granular control over file and directory permissions than the traditional POSIX permission model.
The traditional POSIX permission model uses a set of file bits to define permissions for the owner, group, and other users. In contrast, POSIX ACLs provide a more flexible and fine-grained access control mechanism by allowing multiple entries in an access control list, each of which specifies a different user or group and a different set of permissions.
With POSIX ACLs, you can grant or deny specific permissions to individual users or groups for a particular file or directory. For example, you can allow a particular user to read and write a file, but deny them the ability to execute it. You can also grant a group of users read-only access to a directory, but prevent them from modifying or deleting any files in that directory.
POSIX ACLs are supported on many Unix-based operating systems, including Linux, BSD, and macOS. They can be managed using command-line utilities such as setfacl and getfacl.
Not all filesystems support POSIX ACLs. Their behavior may vary across different implementations.
Related Terms
Getting Started with Komprise:
- Learn about Intelligent Data Management
- Schedule a demonstration with our team
- Read the latest State of Unstructured Data Management Report
