aclCommands for Manipulating POSIX Access Control Lists
For more information visit the acl website.
These versions of acl are available on the BEAR systems (BlueBEAR, BEARCloud VMs, and CaStLeS VMs). These will be retained in accordance with our Applications Support and Retention Policy.
|Version||BEAR Apps Version|