Could you briefly explain a bit more context about the goals for implementing access control? That is, is it for compliance to some standard, to address a security need, or something else?
Thanks, Gedare On Tue, Nov 18, 2014 at 9:37 AM, Sebastian Huber <sebastian.hu...@embedded-brains.de> wrote: > This patch set adds access control to the RTEMS shell. The command visibility > and ability to execute are determined by the current user environment and per > command mode, UID and GID values. The user environment is set up by the > rtems_shell_login_check() handler. Commands to alter the mode, UID and GID of > commands are added. > > _______________________________________________ > devel mailing list > devel@rtems.org > http://lists.rtems.org/mailman/listinfo/devel _______________________________________________ devel mailing list devel@rtems.org http://lists.rtems.org/mailman/listinfo/devel