1nischmod(1) User Commands nischmod(1)
2
3
4
6 nischmod - change access rights on a NIS+ object
7
9 nischmod [-AfLP] mode name...
10
11
13 nischmod changes the access rights (mode) of the NIS+ objects or
14 entries specified by name to mode. Entries are specified using indexed
15 names (see nismatch(1)). Only principals with modify access to an
16 object may change its mode.
17
18
19 mode has the following form:
20
21
22 rights [, rights]...
23
24
25 rights has the form:
26
27 [ who ] op permission [ op permission ]...
28
29
30
31
32 who is a combination of:
33
34 n Nobody's permissions.
35
36
37 o Owner's permissions.
38
39
40 g Group's permissions.
41
42
43 w World's permissions.
44
45
46 a All, or owg.
47
48 If who is omitted, the default is a.
49
50
51
52 op is one of:
53
54 + To grant the permission.
55
56
57 − To revoke the permission.
58
59
60 = To set the permissions explicitly.
61
62
63
64 permission is any combination of:
65
66 r Read.
67
68
69 m Modify.
70
71
72 c Create.
73
74
75 d Destroy.
76
77
78
79 Unlike the system chmod(1) command, this command does not accept an
80 octal notation.
81
83 The following options are supported:
84
85 -A Modify all entries in all tables in the concatenation path that
86 match the search criteria specified in name. This option implies
87 the -P switch.
88
89
90 -f Force the operation and fail silently if it does not succeed.
91
92
93 -L Follow links and change the permission of the linked object or
94 entries rather than the permission of the link itself.
95
96
97 -P Follow the concatenation path within a named table. This option
98 is only applicable when either name is an indexed name or the -L
99 switch is also specified and the named object is a link pointing
100 to an entry.
101
102
104 Example 1 Using the nischmod Command
105
106
107 This example gives everyone read access to an object. (that is, access
108 for owner, group, and all).
109
110
111 example% nischmod a+r object
112
113
114
115
116 This example denies create and modify privileges to group and unau‐
117 thenticated clients (nobody).
118
119
120 example% nischmod gn−cm object
121
122
123
124
125 In this example, a complex set of permissions are set for an object.
126
127
128 example% nischmod o=rmcd,g=rm,w=rc,n=r object
129
130
131
132
133 This example sets the permissions of an entry in the password table so
134 that the group owner can modify them.
135
136
137 example% nischmod g+m '[uid=55],passwd.org_dir'
138
139
140
141
142 The next example changes the permissions of a linked object.
143
144
145 example% nischmod -L w+mr linkname
146
147
148
150 NIS_PATH If this variable is set, and the NIS+ name is not fully
151 qualified, each directory specified will be searched until
152 the object is found (see nisdefaults(1)).
153
154
156 The following exit values are returned:
157
158 0 Successful operation.
159
160
161 1 Operation failed.
162
163
165 See attributes(5) for descriptions of the following attributes:
166
167
168
169
170 ┌─────────────────────────────┬─────────────────────────────┐
171 │ ATTRIBUTE TYPE │ ATTRIBUTE VALUE │
172 ├─────────────────────────────┼─────────────────────────────┤
173 │Availability │SUNWnisu │
174 └─────────────────────────────┴─────────────────────────────┘
175
177 chmod(1), NIS+[22m(1), nischgrp(1), nischown(1), nisdefaults(1), nis‐
178 match(1), nis_objects(3NSL), attributes(5)
179
181 NIS+ might not be supported in future releases of the Solaris operating
182 system. Tools to aid the migration from NIS+ to LDAP are available in
183 the current Solaris release. For more information, visit
184 http://www.sun.com/directory/nisplus/transition.html.
185
186
187
188SunOS 5.11 2 Dec 2005 nischmod(1)