security attributes
Overrides to security policy that enable an administrative command to succeed when the
command is run by a user other than superuser. In the superuser model, the setuid
root
and setgid
programs are security attributes. When these
attributes are applied to a command, the command succeeds no matter who runs the command. In
the privilege model, kernel privileges and other
rights replace setuid root
programs as security attributes. The privilege model is compatible with the superuser model,
in that the privilege model also recognizes the setuid
and
setgid
programs as security attributes.