Viewing posts for the category Omarine User's Manual
Using audit2allow to generate rules
audit2allow is a utility that generates rules from logs of denied operations. It suggests rules for those operations to succeed. To see the suggested rules, run the following command, as the
Unlike Linux users where each user has a specific name like tho, emin, SELinux user is a group of users that have the same capabilities in terms of security context. For example, the standard SELinux user is user_u, the administration staff is staff_u. By convention, SELinux user names usually end with _u. The special case, the Linux root user corresponds to root in SELinux, still. The SELinux user name is the first part of the security context.
Adding constraints to the rules - practice
Adding constraints to the rules
Transitioning domain directly by designing SELinux-aware program
Can't see mail in Inbox? Check your Spam folder.