Summary
SELinux maps Linux users onto SELinux users and defines the roles a user can be assigned through the SELinux user definitions. We learned how to manage those mappings and SELinux users with the semanage
application, and how to grant the right roles to the right people.
We also saw how the same commands are used to grant the proper sensitivity to the user and how we can describe these levels in the setrans.conf
file. We used the chcat
tool to do most of the category-related management activities.
After assigning roles to the users, we saw how to jump from one role to another using newrole
, sudo
, runcon
, and run_init
. We ended this chapter with important insights into how SELinux is integrated into the Linux authentication process and how to tune a Linux system further using a couple of SELinux-aware PAM modules.
In the next chapter, we will learn to manage the labels on files and processes, and see how we can query the SELinux policy rules.