当前位置:网站首页>Redis6.0 new feature - ACL (permission control list) implements the restriction of user executable commands and keys
Redis6.0 new feature - ACL (permission control list) implements the restriction of user executable commands and keys
2022-06-26 02:16:00 【Zhaiwenbiao】
List of articles
ACL brief introduction
ACL yes Access Control List( Access control list ) Abbreviation , This function allows some connections to be restricted according to the commands that can be executed and the keys that can be accessed
Compare the old version with the new one
- Redis 5 Before the release :Redis The security rule is only password control And through rename To adjust high-risk orders, such as flushdb , KEYS* , shutdown etc.
- Redis 6 After the version : Provide ACL More fine-grained permission control for users :
(1) Access rights : User name and password
(2) Orders that can be executed
(3) It can be operated KEY
Common commands
acl list
Display the user permission list
127.0.0.1:6379> acl list
1) "user default on nopass ~* &* [email protected]"
2) "user zwb off resetchannels [email protected]"

acl cat
- View add permission instruction category
- Add the parameter type name to view the specific commands under the type
acl whoami
View the current user
acl set user
Create and edit users ACL
- ACL The rules
Here are the valid ACL List of rules . Some rules are only used to activate or delete flags , Or to users ACL A single word that performs a given change . Other rules are character prefixes , They are the same as the command or category name 、 Key mode, etc .
- Create new user default permissions by command
acl setuser ***
The user doesn't exist : Use just created To create a user
The user already exists : The above command does nothing - Set user name 、 password 、ACL jurisdiction 、 And enabled users
acl setuser *** on >password ~cached:* +get
- Switching users , Verify permission effect
- Switching users :auth *** password

- Verify permission effect

边栏推荐
- 连接投影仪
- Implementation of image binary morphological filtering based on FPGA -- Corrosion swelling
- jenkins汉化及汉化无效解决方案
- Pointnet/pointnet++ learning
- One minute to understand the difference between synchronous, asynchronous, blocking and non blocking
- Disruptor (I) sequence
- Back to top case
- Redis6.0新特性——ACL(权限控制列表)实现限制用户可执行命令和KEY
- In depth good article: what is supernetting?
- 连接投影仪
猜你喜欢
随机推荐
socket demo01
Data analysis - data source, field type, data collection trap
基于邻接表的广度优先遍历
[untitled] vsbiji ESP thirty-two
vtk初始化代码学习1
Implementation of image binary morphological filtering based on FPGA -- Corrosion swelling
Three factors affecting personal growth
Characteristics and related specificity of Papain
Scala 基础 (二):变量和数据类型
Use of static library and dynamic library
cv==biaoding---open----cv001
树莓派 + AWS IoT Greengrass
Computer shortcut keys commonly used by experts
Prompt to update to the latest debug version during vscode debugging
Simplex method (1)
Prometeus 2.33.0 new features
Chrome browser developer tool usage
奶牛排序问题
Is the securities account recommended by qiniu safe?
shell学习记录(四)








