Chapter Contents |
Previous |
Next |
Developing Applications for Use with UNIX System Services OS/390 |
If a process executes another process, the access rights
are normally determined by the effective UID and GID of the calling process
and not the access privileges of the owner of the executable. This can create
undesirable situations, such as the situation in which a running program must
have the ability to change a file that you do not want the user who executed
the program to be able to modify directly. This problem is overcome by allowing
a program to be defined to execute with the UID or GID of the program owner
rather than that of the calling process. Also, suitably authorized programs
can use the
setuid
and
setgid
functions to change the current process's effective UID and
GID respectively.
Chapter Contents |
Previous |
Next |
Top of Page |
Copyright © 2001 by SAS Institute Inc., Cary, NC, USA. All rights reserved.