Unix Permissions Converter
Convert between numeric and symbolic Unix file permissions with interactive toggles.
Permission Matrix
| Category | Read (4) | Write (2) | Execute (1) | Octal | Symbolic |
|---|---|---|---|---|---|
| Owner (u) | 6 | rw- | |||
| Group (g) | 4 | r-- | |||
| Others (o) | 4 | r-- |
Enter Numeric Permission
Common Permission Presets
Related Tools
Chmod CalcNEW
Calculate Unix/Linux file permissions interactively. Convert between numeric (755) and symbolic (rwxr-xr-x) notation.
Crontab GenNEW
Build cron expressions visually with dropdowns. See next 5 run times and human-readable schedule descriptions.
Hash GenNEW
Generate MD5, SHA-1, SHA-256, and SHA-512 hashes from text instantly.
IP InfoNEW
Analyze IP addresses: class (A/B/C/D/E), binary representation, subnet mask, private/public check, IPv4/IPv6 detection.
Frequently Asked Questions
What are Unix file permissions?
How does numeric (octal) notation work?
What does chmod do?
What is the difference between 644 and 755?
Why does a directory need execute permission?
What is the sticky bit?
How to Use the Unix Permissions Converter
Unix file permissions are a critical security concept that every developer and system administrator must understand. Our interactive converter makes it easy to translate between the three common permission formats: numeric (octal) notation like 644, symbolic notation like rw-r--r--, and the ls-style output like -rw-r--r-- that you see when running ls -l in the terminal.
Visual checkboxes: Use the interactive permission matrix to set read, write, and execute permissions for the owner, group, and others. The numeric value, symbolic string, and chmod command update instantly as you toggle each permission.
Numeric input: Enter an octal permission number like 644 or 755 and see the corresponding symbolic representation and permission breakdown. The visual checkboxes update to reflect the entered permissions.
Chmod command: The tool generates the complete chmod command you need to apply the selected permissions. Copy the command directly into your terminal or deployment script.
Understanding Unix Permission Model
The Unix permission model is elegant in its simplicity. Every file and directory has an owner (user), a group, and a set of permissions for three categories: the owner, the group members, and everyone else (others/world). Each category can independently have read (r=4), write (w=2), and execute (x=1) permissions.
The numeric (octal) notation represents permissions as a three-digit number where each digit is the sum of the permission values for that category. A digit of 7 (4+2+1) means full read+write+execute access. A digit of 6 (4+2) means read+write but no execute. A digit of 5 (4+1) means read+execute but no write. A digit of 4 means read-only.
Common Permission Patterns
644 (rw-r--r--): The standard permission for regular files. The owner can read and modify the file, while everyone else can only read it. This is appropriate for web content (HTML, CSS, JS), configuration files, and data files. Using 644 prevents unauthorized modification while allowing the web server to serve the files.
755 (rwxr-xr-x): The standard permission for executable files and directories. The owner has full control, while group and others can read and execute. Scripts, compiled programs, and directory structures typically need 755. For web servers, public directories like document roots use 755 so the server process can traverse them.
600 (rw-------): Restrictive permission for sensitive files. Only the owner can read and write; no one else has any access. Use this for SSH private keys (~/.ssh/id_rsa), environment files with secrets, and any file containing passwords or API keys. SSH will refuse to use a private key file with permissions more permissive than 600.
700 (rwx------): Restrictive permission for directories containing sensitive data. Only the owner can access the directory and its contents. Used for ~/.ssh directories, private configuration directories, and any directory that should be completely private to one user.