O'Reilly logo

SELinux by Example: Using Security Enhanced Linux by David Caplan, Karl MacMillan, Frank Mayer

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13. Managing an SELinux System

In this chapter

• 13.1 SELinux Configuration and Policy Management Files

• 13.2 Impact of SELinux on System Administration

• 13.3 Summary

• Exercises

An SELinux system looks and feels like any other Linux system in many ways. Indeed, Red Hat Enterprise Linux (RHEL) is an SELinux system whether you know it or not. However, with the enhanced security, “something” can break or not work for more reasons than before. Fixing problems may require additional administration procedures, and normal operations may now require additional steps. In this chapter, we discuss the way in which SELinux affects a Linux administrator and how to accomplish the most common important tasks.

13.1 SELinux Configuration and Policy ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required