1.\" $NetBSD: posix1e.3,v 1.4 2020/06/28 21:37:05 wiz Exp $ 2.\"- 3.\" Copyright (c) 2000, 2009 Robert N. M. Watson 4.\" All rights reserved. 5.\" 6.\" Redistribution and use in source and binary forms, with or without 7.\" modification, are permitted provided that the following conditions 8.\" are met: 9.\" 1. Redistributions of source code must retain the above copyright 10.\" notice, this list of conditions and the following disclaimer. 11.\" 2. Redistributions in binary form must reproduce the above copyright 12.\" notice, this list of conditions and the following disclaimer in the 13.\" documentation and/or other materials provided with the distribution. 14.\" 15.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 16.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 17.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 18.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 19.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 20.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 21.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 22.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 23.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 24.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 25.\" SUCH DAMAGE. 26.\" 27.\" $FreeBSD: head/lib/libc/posix1e/posix1e.3 318704 2017-05-23 07:05:34Z ngie $ 28.\" 29.Dd February 25, 2016 30.Dt POSIX1E 3 31.Os 32.Sh NAME 33.Nm posix1e 34.Nd introduction to the POSIX.1e security API 35.Sh LIBRARY 36.Lb libc 37.Sh SYNOPSIS 38.In sys/types.h 39.In sys/acl.h 40.\" .In sys/mac.h 41.Sh DESCRIPTION 42POSIX.1e describes five security extensions to the POSIX.1 API: Access 43Control Lists (ACLs), Auditing, Capabilities, Mandatory Access Control, and 44Information Flow Labels. 45While IEEE POSIX.1e D17 specification has not been standardized, several of 46its interfaces are widely used. 47.Pp 48.Nx 49implements POSIX.1e interface for access control lists, described in 50.Xr acl 3 , 51and supports ACLs on the 52.Xr ffs 7 53file system; ACLs must be administratively enabled using 54.Xr tunefs 8 55or via 56.Xr mount 8 57options. 58.Pp 59.Nx 60does not implement the POSIX.1e mac, audit, privilege (capability), 61or information flow label APIs. 62.Sh ENVIRONMENT 63POSIX.1e assigns security attributes to all objects, extending the security 64functionality described in POSIX.1. 65These additional attributes store fine-grained discretionary access control 66information; for files, they are stored 67in extended attributes, described in 68.Xr extattr 3 . 69.Pp 70POSIX.2c describes 71a set of userland utilities for manipulating these attributes, including 72.Xr getfacl 1 73and 74.Xr setfacl 1 . 75.Sh SEE ALSO 76.Xr getfacl 1 , 77.Xr setfacl 1 , 78.Xr acl 3 , 79.Xr extattr 3 , 80.Xr ffs 7 , 81.Xr tunefs 8 , 82.Xr acl 9 , 83.Xr extattr 9 84.Sh STANDARDS 85POSIX.1e is described in IEEE POSIX.1e draft 17. 86.Sh HISTORY 87POSIX.1e support was introduced in 88.Nx 10.0 . 89.Sh AUTHORS 90.An Robert N M Watson 91.An Chris D. Faulhaber 92.An Thomas Moestl 93.An Ilmar S Habibulin 94