SetACLのマニュアルを和訳してみるテスト
SetACL by Helge Klein
OPTIONS
| -on |
ObjectName |
| -ot |
ObjectType |
| -actn |
Action |
| -ace |
"n:Trustee;p:Permission;s:IsSID;i:Inheritance;m:Mode;w:Where" |
| -trst |
"n1:Trustee;n2:Trustee;s1:IsSID;s2:IsSID;ta:TrusteeAction;w:Where" |
| -dom |
"n1:Domain;n2:Domain;da:DomainAction;w:Where" |
| -ownr |
"n:Trustee;s:IsSID" |
| -grp |
"n:Trustee;s:IsSID" |
| -rec |
Recursion |
| -op |
"dacl:Protection;sacl:Protection" |
| -rst |
Where |
| -lst |
"f:Format;w:What;i:ListInherited;s:DisplaySID" |
| -bckp |
Filename |
| -log |
Filename |
| -fltr |
Keyword |
| -clr |
Where |
| -silent |
|
| -ignoreerr |
|
PARAMETERS
ObjectName:
Name of the object to process (e.g. 'c:\mydir')
ObjectType:
Type of object:
| file: |
Directory/file |
| reg: |
Registry key |
| srv: |
Service |
| prn: |
Printer |
| shr: |
Network share |
Action:
Action(s) to perform:
| ace: |
Process ACEs specified by parameter(s) '-ace' |
| trustee: |
Process trustee(s) specified by parameter(s) '-trst'. |
| domain: |
Process domain(s) specified by parameter(s) '-dom'. |
| list: |
List permissions. A backup file can be specified by parameter '-bckp'. Controlled by parameter '-lst'. |
| restore: |
Restore entire security descriptors backed up using the list function. A file containing the backup has to be specified using the parameter '-bckp'. The listing has to be in SDDL format. |
| setowner: |
Set the owner to trustee specified by parameter '-ownr'. |
| setgroup: |
Set the primary group to trustee specified by parameter '-grp'. |
| clear: |
Clear the ACL of any non-inherited ACEs. The parameter '-clr' controls whether to do this for the DACL, the SACL, or both. |
| setprot: |
Set the flag 'allow inheritable permissions from the parent object to propagate to this object' to the value specified by parameter '-op'. |
| rstchldrn: |
Reset permissions on all sub-objects and enable propagation of inherited permissions. The parameter '-rst' controls whether to do this for the DACL, the SACL, or both. |
TrusteeAction:
Action to perform on trustee specified:
| remtrst: |
Remove all ACEs belonging to trustee specified. |
| repltrst: |
Replace trustee 'n1' by 'n2' in all ACEs. |
| cpytrst: |
Copy the permissions for trustee 'n1' to 'n2'. |
DomainAction:
Action to perform on domain specified:
| remdom: |
Remove all ACEs belonging to trustees of domain specified. |
| repldom: |
Replace trustees from domain 'n1' by trustees with same name from domain 'n2' in all ACEs. |
| cpydom: |
Copy permissions from trustees from domain 'n1' to trustees with same name from domain 'n2' in all ACEs. |
Trustee:
Name or SID of trustee (user or group). Format:
a) [(computer | domain)\]name
| Where: |
|
| computer: |
DNS or NetBIOS name of a computer -> 'name' must be a local account on that computer. |
| domain: |
DNS or NetBIOS name of a domain -> 'name' must be a domain user or group. |
| name: |
user or group name |
If no computer or domain name is given, SetACL tries to find a SID for 'name' in the following order:
1. built-in accounts and well-known SIDs
2. local accounts
3. primary domain
4. trusted domains
b) SID string
Domain:
Name of a domain (NetBIOS or DNS name).
Permission:
Permission to set. Validity of permissions depends on the object type (see below). Comma separated list.
Example: 'read,write_ea,write_dacl'
IsSID:
Is the trustee name a SID?
y:Yes
n:No
DisplaySID:
Display trustee names as SIDs?
| y: |
Yes |
| n: |
No |
| b: |
Both (names and SIDs) |
Inheritance:
Inheritance flags for the ACE. This may be a comma separated list containing the following:
| so: |
sub-objects |
| sc: |
sub-containers |
| np: |
no propagation |
| io: |
inherit only |
Example:'io,so'
Mode:
a) DACL:
| set: |
Replace all permissions for given trustee by those specified. |
| grant: |
Add permissions specified to existing permissions for given trustee. |
| deny: |
Deny permissions specified. |
| revoke: |
Remove permissions specified from existing permissions for given trustee. |
b) SACL:
| aud_succ: |
Add an audit success ACE. |
| aud_fail: |
Add an audit failure ACE. |
| revoke: |
Remove permissions specified from existing permissions for given trustee. |
Where:
Apply settings to DACL, SACL, or both (comma separated list):
dacl
sacl
dacl,sacl
Recursion:
Recursion settings, depends on object type:
a) file:
| no: |
No recursion. |
| cont: |
Recurse, and process directories only. |
| obj: |
Recurse, and process files only. |
| cont_obj: |
Recurse, and process directories and files. |
b) reg:
| no: |
Do not recurse. |
| yes: |
Do Recurse. |
Protection:
Controls the flag 'allow inheritable permissions from the parent object to propagate to this object':
| nc: |
Do not change the current setting. |
| np: |
Object is not protected, i.e. inherits from parent. |
| p_c: |
Object is protected, ACEs from parent are copied. |
| p_nc: |
Object is protected, ACEs from parent are not copied. |
Format:
Which list format to use:
| sddl: |
Standardized SDDL format. Only listings in this format can be restored. |
| csv: |
SetACL's csv format. |
| tab: |
SetACL's tabular format. |
What:
Which components of security descriptors to include in the listing. (comma separated list):
| d: |
DACL |
| s: |
SACL |
| o: |
Owner |
| g: |
Primary group |
Example: 'd,s'
ListInherited:
List inherited permissions?
Filename:
Name of a (unicode) file used for list/backup/restore operations or logging.
Keyword:
Keyword to filter object names by. Names containing this keyword are not processed.
REMARKS
Required parameters (all others are optional):
| -on |
(Object name) |
| -ot |
(Object type) |
Parameters that may be specified more than once:
| -actn |
(Action) |
| -ace |
(Access control entry) |
| -trst |
(Trustee) |
| -dom |
(Domain) |
| -fltr |
(Filter keyword) |
Only actions specified by parameter(s) '-actn' are actually performed,regardless of the other options set.
Order in which multiple actions are processed:
1.restore
2.clear
3.trustee
4.domain
5.ace, setowner, setgroup, setprot
6.rstchldrn
7.list
VALID PERMISSIONS
a) Standard permission sets (combinations of specific permissions)
Files / Directories:
| read: |
Read |
| write: |
Write |
| list_folder: |
List folder |
| read_ex: |
Read, execute |
| change: |
Change |
| profile: |
= change + write_dacl |
| full: |
Full access |
Printers:
| print: |
Print |
| man_printer: |
Manage printer |
| man_docs: |
Manage documents |
| full: |
Full access |
Registry:
| read: |
Read |
| full: |
Full access |
Service:
| read: |
Read |
| start_stop: |
Start / Stop |
| full: |
Full access |
Share:
| read: |
Read |
| change: |
Change |
| full: |
Full access |
b) Specific permissions
Files / Directories:
| traverse: |
Traverse folder / execute file |
| list_dir: |
List folder / read data |
| read_attr: |
Read attributes |
| read_ea: |
Read extended attributes |
| add_file: |
Create files / write data |
| add_subdir: |
Create folders / append data |
| write_attr: |
Write attributes |
| write_ea: |
Write extended attributes |
| del_child: |
Delete subfolders and files |
| delete: |
Delete |
| read_dacl: |
Read permissions |
| write_dacl: |
Write permissions |
| write_owner: |
Take ownership |
Registry:
| query_val: |
Query value |
| set_val: |
Set value |
| create_subkey: |
Create subkeys |
| enum_subkeys: |
Enumerate subkeys |
| notify: |
Notify |
| create_link: |
Create link |
| delete: |
Delete |
| write_dacl: |
Write permissions |
| write_owner: |
Take ownership |
| read_access: |
Read control |
最終更新:2008年01月25日 13:13