ALERT

[LAST CHANCE] Data Layer: Modern Business, Defined

Java Access Control List (Java ACL)

Definition - What does Java Access Control List (Java ACL) mean?

A Java access control list (ACL) is a data structure that grants or denies permission to access resources based on its object entries. The ACL is independent of authentication or encryption schemes, as well as other guarded resources. A typical ACL entry includes a principal or group object, associated permission objects and a positive or negative value. The entry must have a positive value to allow the principal object to perform the action.

The java.security.acl package contains all interfaces required to implement the Java ACL, while the sun.security.acl data structure specifies the default java.security.acl package implementation. The Java ACL principal or group object is a human or system process, and the permission object is a user-allowed operation.

Techopedia explains Java Access Control List (Java ACL)

In the Java ACL model, a user may need to request a specific data operation. The ACL checks its entries to determine user permissions and if the user is authorized, the user may perform the operation. The ACL is a guard that grants or denies access permission by acting on contained data entries.

Java ACL may be explained with the following example: An individual named John wants to delete a particular piece of data. When John makes a request to delete the data, the ACL checks its entries to verify whether or not John may perform this action. If an entry confirms that John is authorized, John may delete the data. If John does not have the appropriate user permission, he is unable to perform the deletion and is denied access.

Techopedia Deals

Connect with us

Techopedia on Linkedin
Techopedia on Linkedin
Tweat cdn.techopedia.com
"Techopedia" on Twitter


'@Techopedia'
Sign up for Techopedia's Free Newsletter!

Email Newsletter

Join thousands of others with our weekly newsletter

Resources
The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.