from small one page howto to huge articles all in one place

search text in:




Other .linuxhowtos.org sites:gentoo.linuxhowtos.org



Last additions:
using iotop to find disk usage hogs

using iotop to find disk usage hogs

words:

887

views:

209819

userrating:


May 25th. 2007:
Words

486

Views

258811

why adblockers are bad


Workaround and fixes for the current Core Dump Handling vulnerability affected kernels

Workaround and fixes for the current Core Dump Handling vulnerability affected kernels

words:

161

views:

150141

userrating:


April, 26th. 2006:

Druckversion
You are here: manpages





DOVEAD-ACL

Section: Dovecot (1)
Updated: February 2026
Index Return to Main Contents
 

NAME

dovead-acl- Manage Access Control List (ACL)  

SYNOPSIS

doveadm [lB]GLOBAL OPTIONS[rB] acl command [lB]OPTIONS[rB] [lB]ARGUMENTS[rB]  

DESCRIPTION

The doveadm acl COMMANDS can be used to execute various Access Control List related actions.  

GLOBAL OPTIONS

Global doveadm(1) -D
Enables verbosity and debug messages.

-O

Do not read any config file, just use defaults. The dovecot_storage_version setting defaults to the latest version, but can be overridden with

-k

Preserve entire environment for doveadm, not just import_environment setting.

-v

Enables verbosity, including progress counter.

-i instanc-name

If using multiple Dovecot instances, choose the config file based on this instance name. See instance_name setting for more information.

-c confi-file

Read configuration from the given confi-file. By default it first reads config socket, and then falls back to /etc/dovecot/dovecot.conf. You can also point this to config socket of some instance running compatible version.

-o setting=value

Overrides the configuration setting from /etc/dovecot/dovecot.conf and from the userdb with the given value. In order to override multiple settings, the -o option may be specified multiple times.

-f formatter

Specifies the formatter for formatting the output. Supported formatters are: flow
prints each line with key=value pairs.

json

prints a JSON array of JSON objects.

pager

prints each key: value pair on its own line and separates records with form feed character (^L).

tab

prints a table header followed by tab separated value lines.

table

prints a table header followed by adjusted value lines.

This command uses by default the output formatter table.  

OPTIONS

-A
If the -A option is present, the command will be performed for all users. Using this option in combination with system users from userdb { driver = passwd } is not recommended, because it contains also users with a lower UID than the one configured with the first_valid_uid setting. When the SQL userdb module is used, make sure that the userdb_sql_iterate_query setting setting matches your database layout. When using the LDAP userdb module, make sure that the userdb_fields setting and userdb_ldap_iterate_fields setting settings match your LDAP schema. Otherwise doveadm(1) will be unable to iterate over all users.

-F file

Execute the command for all the users in the file. This is similar to the -A option, but instead of getting the list of users from the userdb, they are read from the given file. The file contains one username per line.

-n-userd-lookup

Do not perform userdb lookup. Use the USER environment variable to specify the username.

-S socket_path

The option's argument is either an absolute path to a local UNIX domain socket, or a hostname and port (hostname:port), in order to connect a remote host via a TCP socket. This allows an administrator to execute doveadm(1) mail commands through the given socket.

-u user/mask

Run the command only for the given user. It's also possible to use '*' and '?' wildcards (e.g.-u *@example.org).

 

ARGUMENTS

id
The id (identifier) is one of:
*
grou-override = group_name
*
user = user_name
*
owner
*
group = group_name
*
authenticated
*
anyone
*
anonymous, which is an alias for anyone

The ACLs are processed in the precedence given above, so for example if you have given rea-access to a group, you can still remove that from specific users inside the group. Grou-override identifier allows you to override users' ACLs. Probably the most useful reason to do this is to temporarily disable access for some users. For example:

user=timo rw
grou-override=tempdisabled

Now if timo is a member of the tempdisabled group, he has no access to the mailbox. This wouldn't be possible with a normal group identifier, because the user=timo would override it. mailbox

The name of the mailbox, for which the ACL manipulation should be done. It's also possible to use the wildcard characters "*" and/or "?" in the mailbox name.

right

Dovecot ACL right name. This isn't the same as the IMAP ACL letters, which aren't currently supported. Here is a mapping of the IMAP ACL letters to Dovecot ACL names:
l-> lookup : Mailbox is visible in mailbox list. Mailbox can be subscribed to.

r-> read : Mailbox can be opened for reading.

w-> write : Message flags and keywords can be changed, except [rs]Seen and [rs]Deleted.

s-> writ-seen : [rs]Seen flag can be changed.

t-> writ-deleted : [rs]Deleted flag can be changed.

i-> insert : Messages can be written or copied to the mailbox.

p-> post : Messages can be posted to the mailbox by doveco-lda, e.g. from Sieve scripts.

e-> expunge : Messages can be expunged.


 (but not necessarily under its children, see acl_inheritance. Note: Renaming also requires the delete right.

x-> delete : Mailbox can be deleted.

a-> admin : Administration rights to the mailbox (currently: ability to change ACLs for mailbox).

 

COMMANDS

 

acl add

doveadm [lB]GLOBAL OPTIONS[rB] acl add [lB]-u user | -A | -F file | -n-userd-lookup[rB] [lB]-S socket_path[rB] mailbox id right [lB]right ...[rB] Add ACL rights to the mailbox/id. If the id already exists, the existing rights are preserved.  

acl debug

doveadm [lB]GLOBAL OPTIONS[rB] acl debug [lB]-u user | -A | -F file | -n-userd-lookup[rB] [lB]-S socket_path[rB] mailbox This command can be used to debug why a shared mailbox isn't accessible to the user. It will list exactly what the problem is.  

acl delete

doveadm [lB]GLOBAL OPTIONS[rB] acl delete [lB]-u user | -A | -F file | -n-userd-lookup[rB] [lB]-S socket_path[rB] mailbox id Remove the whole ACL entry for the mailbox/id.  

acl get

doveadm [lB]GLOBAL OPTIONS[rB] acl get [lB]-u user | -A | -F file | -n-userd-lookup[rB] [lB]-S socket_path[rB] [lB]-m[rB] mailbox Show all the ACLs for the mailbox. -m
Only show ACLs that match the mailbox.

 

acl recalc

doveadm [lB]GLOBAL OPTIONS[rB] acl recalc [lB]-u user | -A | -F file | -n-userd-lookup[rB] [lB]-S socket_path[rB] Make sure the user's shared mailboxes exist correctly in the acl_sharing_map.  

acl remove

doveadm [lB]GLOBAL OPTIONS[rB] acl remove [lB]-u user | -A | -F file | -n-userd-lookup[rB] [lB]-S socket_path[rB] mailbox id right [lB]right ...[rB] Remove the specified ACL rights from the mailbox/id. If all rights are removed, the entry still exists without any rights.  

acl rights

doveadm [lB]GLOBAL OPTIONS[rB] acl rights [lB]-u user | -A | -F file | -n-userd-lookup[rB] [lB]-S socket_path[rB] mailbox Show the user's current ACL rights for the mailbox.  

acl set

doveadm [lB]GLOBAL OPTIONS[rB] acl set [lB]-u user | -A | -F file | -n-userd-lookup[rB] [lB]-S socket_path[rB] mailbox id right [lB]right ...[rB] Set ACL rights to the mailbox/id. If the id already exists, the existing rights are replaced.  

REPORTING BUGS

Report bugs, including doveconf-n output, to the Dovecot Mailing List ladovecot@dovecot.orgra. Information about reporting bugs is available at: https://dovecot.org/bugreport.html  

SEE ALSO

doveadm(1) Additional resources:
*
acl_inheritance


 

Index

NAME
SYNOPSIS
DESCRIPTION
GLOBAL OPTIONS
OPTIONS
ARGUMENTS
COMMANDS
acl add
acl debug
acl delete
acl get
acl recalc
acl remove
acl rights
acl set
REPORTING BUGS
SEE ALSO





Support us on Content Nation
rdf newsfeed | rss newsfeed | Atom newsfeed
- Powered by LeopardCMS - Running on Gentoo -
Copyright 2004-2025 Sascha Nitsch Unternehmensberatung GmbH
Valid XHTML1.1 : Valid CSS
- Level Triple-A Conformance to Web Content Accessibility Guidelines 1.0 -
- Copyright and legal notices -
Time to create this page: 16.1 ms