{"id":52051,"date":"2022-08-11T16:34:24","date_gmt":"2022-08-11T16:34:24","guid":{"rendered":"https:\/\/dbtut.com\/?p=52051"},"modified":"2022-08-11T16:40:33","modified_gmt":"2022-08-11T16:40:33","slug":"authorization-definition","status":"publish","type":"post","link":"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/","title":{"rendered":"Authorization Definition"},"content":{"rendered":"<p>In this article, I will talk about how to do operations such as granting and receiving Authorization Definition with the help of the chmod command on the directory.<\/p>\n<p>Let&#8217;s explain some parameters used with chmod.<\/p>\n<p>u : Used for operations related to file -directory owner.<\/p>\n<p>g : File &#8211; Used for operations to be performed for users in the same group as the owner of the directory.<\/p>\n<p>o : Used for actions to be taken for other users.<\/p>\n<p>a : Public transactions are also used.<\/p>\n<p>= : It is used in authorization synchronization operations.<\/p>\n<p>+ : It is used in adding authorization operations.<\/p>\n<p>\u2013 : Used in authorization operations.<\/p>\n<p>Let&#8217;s reinforce it with examples.<\/p>\n<p>First, we go into our directory and look at the permissions of the files in it with the ls -l command.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"http:\/\/www.farukerdem.com\/wp-content\/uploads\/2020\/12\/yetkitanimlama1.png\" \/><\/p>\n<p>Let&#8217;s read the authority of our files above and get their authority as follows,<\/p>\n<p>but before that, let&#8217;s make a small reminder as you can remember from my previous articles,<\/p>\n<p>W (write)<\/p>\n<p>R (read)<\/p>\n<p>X (execute)<\/p>\n<p>it meant.<\/p>\n<p>After making a small reminder, let&#8217;s get the privileges of the gray text documents above with the help of the following command.<\/p>\n<p>The &#8220;*&#8221; at the end of the command below means do it for all under that directory.<\/p>\n<pre class=\"lang:default decode:true \">chmod -wr *\r\n<\/pre>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"http:\/\/www.farukerdem.com\/wp-content\/uploads\/2020\/12\/yetkitanimlama2.png\" \/><\/p>\n<p id=\"KQVWYGA\">As we can see when we do ls -l again after receiving the permissions, we see that they do not have permissions, but we see that our directory has execute(x) permission.<\/p>\n<p>To change it, we can change it by typing the following command.<\/p>\n<pre class=\"lang:default decode:true \">chmod -x postgresqlall\r\n<\/pre>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"http:\/\/www.farukerdem.com\/wp-content\/uploads\/2020\/12\/yetkitanimlama3.png\" \/><\/p>\n<p>Above, we can see that we can only get the execute permission of the relevant file by giving the file name instead of *.<\/p>\n<p>We have authorized the files and directories, now let&#8217;s talk about how they are given.<\/p>\n<pre class=\"lang:default decode:true \">chmod +r *\r\n<\/pre>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"http:\/\/www.farukerdem.com\/wp-content\/uploads\/2020\/12\/yetkitanimlama4.png\" \/><\/p>\n<p>As seen above, we have given read permission to all files and directories. You can also do this for execute and write permissions.<\/p>\n<p>We will use the above-mentioned u parameter to define the read, write and execute privileges for the frk user who owns the file.<\/p>\n<pre class=\"lang:default decode:true \">chmod u+rwx *\r\n<\/pre>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"http:\/\/www.farukerdem.com\/wp-content\/uploads\/2020\/12\/yetkitanimlama5.png\" \/><\/p>\n<p>As seen above, read, write and execute permissions are given for all directories and files.<\/p>\n<p>You can use the following command to grant writes for users in the frk group.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"http:\/\/www.farukerdem.com\/wp-content\/uploads\/2020\/12\/yetkitanimlama6.png\" \/><\/p>\n<p>We have given and received authorization using the wrx parameters so far, but it is also possible to give them with the help of numbers.<\/p>\n<p>*\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 File_Owner\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Group Authority\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Other Users<br \/>\nReading ( r )\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 4\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 4\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a04<br \/>\nWriting ( w )\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 2\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 2\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02<br \/>\nExecute ( x )\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 1\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a01\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 1<\/p>\n<p>Let&#8217;s get the permissions we have given using the above commands.<\/p>\n<p>For this we need to type chmod -700 but what does it mean? We can do the expansion like this:<\/p>\n<p>r (4)+ w (2)+ x (1)=700<\/p>\n<p>As above, it is defined as 700 by adding 4 for read, 2 for write, and 1 for execute.<\/p>\n<p>*\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0File_Owner\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Group Authority\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Other Users<br \/>\nReading ( r )\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 4\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 4\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a04<br \/>\nWriting ( w )\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02<br \/>\nExecute ( x )\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a01\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a01\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 1<\/p>\n<p>TOTAL\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a07\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a00\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a00<\/p>\n<p>To get the privileges of the file owner, we will use the 700 parameter as follows.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"http:\/\/www.farukerdem.com\/wp-content\/uploads\/2020\/12\/yetkitanimlama7.png\" \/><\/p>\n<p id=\"cAYgMud\">As seen above, authorizations have been obtained.<\/p>\n<p>If we wanted to get the authorization of all of them, that is, if we wanted to get the authorization of File_Owner, Group Authorization and Other Users, as a result of adding all of them as follows, a number like 777 comes out.<\/p>\n<p>With this number, we can get all authorizations as follows.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"http:\/\/www.farukerdem.com\/wp-content\/uploads\/2020\/12\/yetkitanimlama9.png\" \/><\/p>\n<p>As seen above, all authorizations have been taken.<\/p>\n<p>Let&#8217;s grant read permission for file_owner , users in the group, and other users.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"http:\/\/www.farukerdem.com\/wp-content\/uploads\/2020\/12\/yetkitanimlama10.png\" \/><\/p>\n<p id=\"gAqEMTJ\">As can be seen above, we have defined read authorization for all of them by typing 444.<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_52051\" class=\"pvc_stats all  \" data-element-id=\"52051\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/dbtut.com\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In this article, I will talk about how to do operations such as granting and receiving Authorization Definition with the help of the chmod command on the directory. Let&#8217;s explain some parameters used with chmod. u : Used for operations related to file -directory owner. g : File &#8211; Used for operations to be performed &hellip;<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_52051\" class=\"pvc_stats all  \" data-element-id=\"52051\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/dbtut.com\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":366,"featured_media":52061,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[299],"tags":[],"class_list":["post-52051","post","type-post","status-publish","format-standard","has-post-thumbnail","","category-linux"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Authorization Definition - Database Tutorials<\/title>\n<meta name=\"description\" content=\"In this article, I will talk about how to do operations such as granting and receiving Authorization Definition with the help of the chmod command on the directory.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Authorization Definition - Database Tutorials\" \/>\n<meta property=\"og:description\" content=\"In this article, I will talk about how to do operations such as granting and receiving Authorization Definition with the help of the chmod command on the directory.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/\" \/>\n<meta property=\"og:site_name\" content=\"Database Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-11T16:34:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-11T16:40:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/08\/Ekran-goruntusu-2022-08-11-192707.png\" \/>\n\t<meta property=\"og:image:width\" content=\"707\" \/>\n\t<meta property=\"og:image:height\" content=\"387\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Faruk Erdem\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Faruk Erdem\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/\"},\"author\":{\"name\":\"Faruk Erdem\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/a7dfc5684c116e536b4e93ee214ccbfb\"},\"headline\":\"Authorization Definition\",\"datePublished\":\"2022-08-11T16:34:24+00:00\",\"dateModified\":\"2022-08-11T16:40:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/\"},\"wordCount\":573,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/dbtut.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/08\/Ekran-goruntusu-2022-08-11-192707.png\",\"articleSection\":[\"Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/\",\"url\":\"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/\",\"name\":\"Authorization Definition - Database Tutorials\",\"isPartOf\":{\"@id\":\"https:\/\/dbtut.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/08\/Ekran-goruntusu-2022-08-11-192707.png\",\"datePublished\":\"2022-08-11T16:34:24+00:00\",\"dateModified\":\"2022-08-11T16:40:33+00:00\",\"description\":\"In this article, I will talk about how to do operations such as granting and receiving Authorization Definition with the help of the chmod command on the directory.\",\"breadcrumb\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/#primaryimage\",\"url\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/08\/Ekran-goruntusu-2022-08-11-192707.png\",\"contentUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/08\/Ekran-goruntusu-2022-08-11-192707.png\",\"width\":707,\"height\":387},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dbtut.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Authorization Definition\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dbtut.com\/#website\",\"url\":\"https:\/\/dbtut.com\/\",\"name\":\"Database Tutorials\",\"description\":\"MSSQL, Oracle, PostgreSQL, MySQL, MariaDB, DB2, Sybase, Teradata, Big Data, NOSQL, MongoDB, Couchbase, Cassandra, Windows, Linux\",\"publisher\":{\"@id\":\"https:\/\/dbtut.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dbtut.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dbtut.com\/#organization\",\"name\":\"dbtut\",\"url\":\"https:\/\/dbtut.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg\",\"contentUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg\",\"width\":223,\"height\":36,\"caption\":\"dbtut\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/a7dfc5684c116e536b4e93ee214ccbfb\",\"name\":\"Faruk Erdem\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ad1e61fb5a7c9a590e765f7cad8f2dc8332090f1ceb9a5ee2aa95c69213f0c50?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ad1e61fb5a7c9a590e765f7cad8f2dc8332090f1ceb9a5ee2aa95c69213f0c50?s=96&d=mm&r=g\",\"caption\":\"Faruk Erdem\"},\"url\":\"https:\/\/dbtut.com\/index.php\/author\/farukerdem\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Authorization Definition - Database Tutorials","description":"In this article, I will talk about how to do operations such as granting and receiving Authorization Definition with the help of the chmod command on the directory.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/","og_locale":"en_US","og_type":"article","og_title":"Authorization Definition - Database Tutorials","og_description":"In this article, I will talk about how to do operations such as granting and receiving Authorization Definition with the help of the chmod command on the directory.","og_url":"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/","og_site_name":"Database Tutorials","article_published_time":"2022-08-11T16:34:24+00:00","article_modified_time":"2022-08-11T16:40:33+00:00","og_image":[{"width":707,"height":387,"url":"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/08\/Ekran-goruntusu-2022-08-11-192707.png","type":"image\/png"}],"author":"Faruk Erdem","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Faruk Erdem","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/#article","isPartOf":{"@id":"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/"},"author":{"name":"Faruk Erdem","@id":"https:\/\/dbtut.com\/#\/schema\/person\/a7dfc5684c116e536b4e93ee214ccbfb"},"headline":"Authorization Definition","datePublished":"2022-08-11T16:34:24+00:00","dateModified":"2022-08-11T16:40:33+00:00","mainEntityOfPage":{"@id":"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/"},"wordCount":573,"commentCount":0,"publisher":{"@id":"https:\/\/dbtut.com\/#organization"},"image":{"@id":"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/#primaryimage"},"thumbnailUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/08\/Ekran-goruntusu-2022-08-11-192707.png","articleSection":["Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/","url":"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/","name":"Authorization Definition - Database Tutorials","isPartOf":{"@id":"https:\/\/dbtut.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/#primaryimage"},"image":{"@id":"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/#primaryimage"},"thumbnailUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/08\/Ekran-goruntusu-2022-08-11-192707.png","datePublished":"2022-08-11T16:34:24+00:00","dateModified":"2022-08-11T16:40:33+00:00","description":"In this article, I will talk about how to do operations such as granting and receiving Authorization Definition with the help of the chmod command on the directory.","breadcrumb":{"@id":"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/#primaryimage","url":"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/08\/Ekran-goruntusu-2022-08-11-192707.png","contentUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/08\/Ekran-goruntusu-2022-08-11-192707.png","width":707,"height":387},{"@type":"BreadcrumbList","@id":"https:\/\/dbtut.com\/index.php\/2022\/08\/11\/authorization-definition\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dbtut.com\/"},{"@type":"ListItem","position":2,"name":"Authorization Definition"}]},{"@type":"WebSite","@id":"https:\/\/dbtut.com\/#website","url":"https:\/\/dbtut.com\/","name":"Database Tutorials","description":"MSSQL, Oracle, PostgreSQL, MySQL, MariaDB, DB2, Sybase, Teradata, Big Data, NOSQL, MongoDB, Couchbase, Cassandra, Windows, Linux","publisher":{"@id":"https:\/\/dbtut.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dbtut.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dbtut.com\/#organization","name":"dbtut","url":"https:\/\/dbtut.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/#\/schema\/logo\/image\/","url":"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg","contentUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg","width":223,"height":36,"caption":"dbtut"},"image":{"@id":"https:\/\/dbtut.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/dbtut.com\/#\/schema\/person\/a7dfc5684c116e536b4e93ee214ccbfb","name":"Faruk Erdem","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ad1e61fb5a7c9a590e765f7cad8f2dc8332090f1ceb9a5ee2aa95c69213f0c50?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1e61fb5a7c9a590e765f7cad8f2dc8332090f1ceb9a5ee2aa95c69213f0c50?s=96&d=mm&r=g","caption":"Faruk Erdem"},"url":"https:\/\/dbtut.com\/index.php\/author\/farukerdem\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts\/52051","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/users\/366"}],"replies":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/comments?post=52051"}],"version-history":[{"count":0,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts\/52051\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/media\/52061"}],"wp:attachment":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/media?parent=52051"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/categories?post=52051"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/tags?post=52051"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}