Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Security descriptor

From Wikipedia, the free encyclopedia
(Redirected fromSecurity Descriptor)

Security descriptors are datastructures of security information forsecurableWindowsobjects, that is objects that can be identified by a unique name. Security descriptors can be associated with any named objects, includingfiles,folders, shares,registry keys, processes, threads, named pipes, services, job objects and other resources.[1]

Security descriptors contain discretionaryaccess control lists (DACLs) that contain access control entries (ACEs) that grant and deny access to trustees such as users or groups. They also contain a system access control list (SACLs) that control auditing of object access.[2][3] ACEs may be explicitly applied to an object or inherited from a parent object. The order of ACEs in an ACL is important, with access denied ACEs appearing higher in the order than ACEs that grant access. Security descriptors also contain the object owner.

Mandatory Integrity Control is implemented through a new type of ACE on a security descriptor.[4]

Files and folder permissions can be edited by various tools includingWindows Explorer,WMI, command line tools likeCacls, XCacls,ICacls, SubInACL,[5] thefreewareWin32 console FILEACL,[6][7] thefree softwareutilitySetACL, and other utilities. To edit a security descriptor, a user needs WRITE_DAC permissions to the object,[8] a permission that is usually delegated by default toadministrators and the object's owner.

Permissions in NTFS

[edit]

The following table summarizes NTFS permissions and their roles (in individual rows.) The table exposes the following information:[9][10][11]

  • Permission code: Each access control entry (ACE) specifies its permission with binary code. There are 14 codes (12 in older systems.)
  • Meaning: Each permission code has a meaning, depending on whether it is applied to a file or a folder. For example, code 0x01 on a file indicates the permission to read the file, while on a folder indicates the permission to list the content of the folder. Knowing the meaning alone, however, is useless. An ACE must also specify to whom the permission applies, and whether that permission is granted or denied.
  • Included in: In addition to individual permissions, an ACE can specify special permissions known as "generic access rights." These special permissions are equivalents of a number individual permissions. For example, GENERIC_READ (or GR) is the equivalent of "Read data", "Read attributes", "Read extended attributes", "Read permissions", and "Synchronize". Because it makes sense to ask for these five at the same time, requesting "GENERIC_READ" is more convenient.
  • Alias: The two Windows command-line utilities (icacls andcacls) have their own aliases for these permissions.
Permission
code
MeaningIncluded inAlias
For filesFor foldersR[a]E[b]W[c]A[d]M[e]InicaclsIncacls
0x01Read dataList folder contentsYesYesYesYesRDFILE_READ_DATA
0x80Read attributesYesYesYesYesRAFILE_READ_ATTRIBUTES
0x08Read extended attributesYesYesYesYesREAFILE_READ_EA
0x20Execute fileTraverse folderYesYesYesXFILE_EXECUTE
0x20000Read permissionsYesYesYesYesYesRCREAD_CONTROL
0x100000SynchronizeYesYesYesYesYesSSYNCHRONIZE
0x02Write dataCreate filesYesYesYesWDFILE_WRITE_DATA
0x04Append dataCreate foldersYesYesYesADFILE_APPEND_D
0x100Write attributesYesYesYesWAFILE_WRITE_ATTRIBUTES
0x10Write extended attributesYesYesYesWEAFILE_WRITE_EA
0x10000Delete (or rename[12])YesYesDEDELETE
0x40000Change permissionsYesWDACWRITE_DAC
0x80000Take ownershipYesWOWRITE_OWNER
0x40Delete subfolders and filesYesDCFILE_DELETE_CHILD

Most of these permissions are self-explanatory, except the following:

  1. Renaming a file requires the "Delete" permission.[12]
  2. File Explorer doesn't show "Synchronize" and always sets it. Multi-threaded apps like File Explorer and Windows Command Prompt need the "Synchronize" permission to be able to work with files and folders.[13]


Footnotes

[edit]
  1. ^GENERIC_READ, known as "Read" inFile Explorer
  2. ^GENERIC_EXECUTE, known as "Read & Execute" inFile Explorer
  3. ^GENERIC_WRITE, known as "Write" inFile Explorer
  4. ^GENERIC_ALL, known as "Full Control" inFile Explorer
  5. ^Known as "Modify" inFile Explorer

See also

[edit]

References

[edit]
  1. ^"Securable Objects".Microsoft. 2008-04-24. Retrieved2008-07-16.
  2. ^"What Are Security Descriptors and Access Control Lists?".Microsoft. Archived fromthe original on 2008-05-05. Retrieved2008-07-16.
  3. ^"DACLs and ACEs".Microsoft. 2008-04-24. Retrieved2008-07-16.
  4. ^https://msdn.microsoft.com/en-us/library/bb625957.aspx What is the Windows Integrity Mechanism?
  5. ^SubInACL home page
  6. ^FILEACL home pageArchived 2012-08-29 at theWayback Machine
  7. ^"FILEACL v3.0.1.6".Microsoft. 2004-03-23. Archived fromthe original on April 16, 2008. Retrieved2008-07-25.
  8. ^"ACCESS_MASK Data Type".Microsoft. 2008-04-24. Retrieved2008-07-23.
  9. ^"How Permissions Work".Microsoft. 2013-06-21. Retrieved2017-11-24.
  10. ^Richard Civil (8 September 2016)."How IT works NTFS Permissions, Part 2".Microsoft. Retrieved2017-11-24.
  11. ^Richard Civil (30 August 2016)."How IT works NTFS Permissions".Microsoft. Retrieved2017-11-24.
  12. ^abChen, Raymond (22 October 2021)."Renaming a file is a multi-step process, only one of which is changing the name of the file".The Old New Thing.Microsoft.Opening with DELETE permission grants permission to rename the file. The required permission is DELETE because the old name is being deleted.
  13. ^Chen, Raymond (18 November 2019)."I set the same ACL with the GUI and with icacls, yet the results are different".The Old New Thing.Microsoft.

External links

[edit]
Retrieved from "https://en.wikipedia.org/w/index.php?title=Security_descriptor&oldid=1268218652"
Categories:
Hidden category:

[8]ページ先頭

©2009-2025 Movatter.jp