Skip to Content
SELinux by Example: Using Security Enhanced Linux
book

SELinux by Example: Using Security Enhanced Linux

by Frank Mayer, Karl MacMillan, David Caplan
July 2006
Intermediate to advanced content levelIntermediate to advanced
456 pages
9h 45m
English
Pearson
Content preview from SELinux by Example: Using Security Enhanced Linux

Chapter 6. Roles and Users

In this chapter

• 6.1 Role-Based Access Control in SELinux

• 6.2 Roles and Role Statements

• 6.3 Users and User Statements

• 6.4 Exploring Roles and Users with Apol

• 6.5 Summary

• Exercises

SELinux provides a form of role-based access control (RBAC) that builds upon type enforcement (TE). Roles are used to group domain types and to restrict relationships between domain types and users. Users in SELinux associate one or more roles with a Linux user. Using roles and users, the RBAC features allow for the efficient definition and management of the privileges ultimately granted to Linux users.

6.1 Role-Based Access Control in SELinux

Roles and users exist in SELinux as the basis for its RBAC feature. It may be surprising ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Android Security Internals

Android Security Internals

Nikolay Elenkov
SELinux Cookbook

SELinux Cookbook

Sven Vermeulen
CentOS Quick Start Guide

CentOS Quick Start Guide

Shiwang Kalkhanda
Security Superstream: Ransomware

Security Superstream: Ransomware

Chloé Messdaghi, Alissa Knight, Cynthia Brumfield, Edna Conway, Kellyn Wagner Ramsdell, Laurie Iacono

Publisher Resources

ISBN: 0131963694Purchase book