Chapter 3. Managing User Logins
When we log in to an SELinux enabled system, we are assigned with a default context to work in. This context contains a SELinux user part, a SELinux role, a domain, and optionally a sensitivity range.
In this chapter, we will:
Define users that have sufficient rights to do their jobs, ranging from unprivileged users to fully privileged users, running almost without SELinux protection
Create and assign categories and sensitivities
Assign roles to users and use various tools to switch roles
We end the chapter by learning how SELinux integrates with the Linux authentication process.