Home »
Full Forms »
Computer Acronyms/Abbreviations
What is the full form of ACL?
Full form of ACL: Here, we are going to learn what does ACL stands for? ACL – which is an abbreviation of "Access Control List" in Computer Acronyms/Abbreviations, etc.
Submitted by Anushree Goswami, on March 19, 2020
ACL: Access Control List
An ACL is an abbreviation of the "Access Control List", concerning a computer file system, which is a record list of permissions put together with an object. An ACL indicates which users or system processes are approved accesses to objects, at the same time what operations are enabled on specified objects.
ACE is an abbreviation of Access Control Entry. It is a particular distinct term included inside an ACL that includes information about the user or group and the related permissions. Every entry, which is an access control entry in a distinctive ACL, indicates a subject and an operation.
For Example:
In the case in a situation, if a file object has an ACL that includes (Amber: read, write; John: read), this would provide Amber permission to read and write the file and John to only read it.
Implementations
Various types of operating systems implement ACLs, or have a chronological implementation from the past, which comprise:
Filesystem ACLs
- A filesystem ACL is a data structure, generally, a table, which comprises entries that indicate individual user or group rights to particular system objects such as programs, processes, or files.
- These entries are known as access control entries (ACEs) in the Microsoft Windows NT, OpenVMS, Unix-like, and Mac OS X operating systems.
- Each available and reachable object comprises an identifier to its ACL.
Active Directory ACLs
- Microsoft's Active Directory Service implements an LDAP server that accumulates and spread widely configuration information about users and computers in a domain.
- Active Directory expands the LDAP specification by adding up together the similar category of access-control list mechanism as Windows NT uses for the NTFS filesystem.
Networking ACLs
- On a variety of categories of proprietary computer-hardware, specifically routers and switches, an access-control list makes an available set of rules that are applied to port numbers or IP addresses that are available on a host or other layer 3, each with a list of hosts and/or networks allowed to use the service.
- Even though it is furthermore probable to configure access-control lists based on network domain names, this is open to discussion idea for the reason that individual TCP, UDP, and ICMP headers do not comprise domain names.
SQL implementations
- ACL algorithms have been ported to SQL and relational database systems.
- A lot of "modern" (2000s and 2010s) SQL-based systems, like enterprise resource planning and content management systems, have used ACL models in their administration modules.