Summary
SELinux maps Linux users onto SELinux users and defines the roles that a user is allowed to be in through the SELinux user definitions. We learned how to manage those mappings and the SELinux users with the semanage
application and were able to grant the right roles to the right people.
We also saw how the same commands are used to grant proper sensitivity to the user and how we can describe these levels in the setrans.conf
file. We used the chcat
tool to do most of the category-related management activities.
After assigning roles to the users, we saw how to jump from one role to another using newrole
, sudo
, runcon
, and run_init
. We ended this chapter with the important insight on how SELinux integrates in the Linux authentication process and how it implements application-specific contexts.
In the next chapter, we will learn to manage the labels on files and processes and see how we can query the SELinux policy rules.