vserver security file-directory ntfs sacl add
Add a SACL entry to NTFS security descriptor
Availability: This command is available to cluster and Vserver administrators at the admin privilege level.
Description
The vserver security file-directory ntfs sacl add command adds system access control list entries (ACEs) into a security descriptor’s system access control list (SACL).
If the security descriptor contains a SACL that has existing security ACEs, the command adds the new security ACE to the SACL. If the security descriptor does not contain a SACL, the command creates the SACL and adds the new security ACE to it.
Adding a SACL entry to the security descriptor is the second step in configuring and applying security ACLs to a file or folder. Before you can add a SACL entry to a security descriptor, you must first create the security descriptor.
The steps to creating and applying NTFS ACLs are the following:
-
Create an NTFS security descriptor.
-
Add DACL and SACL entries to the NTFS security descriptor.
|
|
If you want to audit file and directory events, you must configure auditing on the Vserver in addition to adding the SACL to the security descriptor. |
-
Create a file/directory security policy.
This step associates the policy with a Vserver.
* Create policy tasks.
A policy task refers to a single operation to apply to a file (or folder) or to a set of files (or folders). among other things, the task defines which security descriptor to apply to a path.
* Apply a policy to the associated Vserver.
Parameters
-vserver <vserver name>- Vserver-
Specifies the name of the Vserver associated with the security descriptor to which you want to add a system access control list entry.
-ntfs-sd <ntfs sd name>- NTFS Security Descriptor Name-
Specifies the name of the security descriptor to which you want to add a system access control list entry.
-access-type {failure|success}- Success or Failure-
Specifies whether the system access control list entry that you want to add is a
failureorsuccessaccess audit type. -account <name or sid>- Account Name or SID-
Specifies the account on which to apply the system access control list entry. You can specify the account by using a user name or SID. You can use any of the following formats when specifying the value for this parameter:
+
* SID
* Domain\user-name
* user-name@Domain
* user-name@FQDNIf you specify any of the three user name formats for the value of -account, keep in mind that the value for the user name is case insensitive. - {
[-rights {no-access|full-control|modify|read-and-execute|read|write}]- Access Rights -
Specifies the rights that you want to get audited for the account specified in the
-accountparameter. The-rightsparameter is mutually exclusive with the-advanced-rightsparameter. If you specify the-rightsparameter, you can only specify one value.You can specify one of the following rights values:
-
no-access
-
full-control
-
modify
-
read-and-execute
-
read
-
write
-
- |
[-advanced-rights <Advanced access right>,…]- Advanced Access Rights } -
Specifies the advanced rights that you want to get audited for the account specified in the
-accountparameter. The-advanced-rightsparameter is mutually exclusive with the-rightsparameter. You can specify more than one advanced-rights value by using a comma-delimited list.You can specify one or more of the following advanced rights:
-
read-data
-
write-data
-
append-data
-
read-ea
-
write-ea
-
execute-file
-
delete-child
-
read-attr
-
write-attr
-
delete
-
read-perm
-
write-perm
-
write-owner
-
full-control
-
- |
[-rights-raw <Hex Integer>]- Raw Access Rights (privilege: advanced) } -
Specifies the raw rights that you want to get audited for the account specified in the
-accountparameter. The-rights-rawparameter is mutually exclusive with the-advanced-rightsand-rightsparameter. Specify the value as a hexadecimal integer, for example:0xA10For0xb3ffetc. [-apply-to {this-folder|sub-folders|files}]- Apply SACL To-
Specifies where to apply the system access control list entry. You can specify more than one value by using a comma-delimited list.
You can specify one or more of the following values:
-
this-folder
-
sub-folder
-
files
Select one of the following combinations of values for the -apply-toparameter for Storage-Level Access Guard (SLAG):-
this-folder, sub-folder, files
-
this-folder, sub-folder
-
files
If you specify an invalid
-apply-tovalue, this security descriptor is removed from the associated Storage-Level Access Guard (SLAG)security file-directory policy task. -
Examples
The following example adds a SACL entry to the security descriptor named “sd1” on Vserver vs1.
cluster1::> vserver security file-directory ntfs sacl add -ntfs-sd sd1 -access-type failure -account DOMAIN\Administrator -rights full-control -apply-to this-folder -vserver vs1
cluster1::> vserver security file-directory ntfs sacl show -vserver vs1 -ntfs-sd sd1 -access-type deny -account DOMAIN\Administrator
Vserver: vs1
Security Descriptor Name: sd1
Access type for Specified Access Rights: failure
Account Name or SID: DOMAIN\Administrator
Access Rights: full-control
Advanced Access Rights: -
Apply To: this-folder
Access Rights: full-control