Skip to Content
SELinux
book

SELinux

by Bill McCarty
October 2004
Intermediate to advanced
256 pages
8h 16m
English
O'Reilly Media, Inc.
Content preview from SELinux

Chapter 6. Role-Based Access Control

Up to this point in the book, we’ve looked at the functions SELinux provides and the configuration files that direct its operation. However, we’ve merely glanced at the SELinux policy language that’s used to specify the SELinux security policy. Our situation is akin to that of a 15th or 16th century explorer who has studied maps of the New World and dreamed of the exotic sights that may be found there but has not yet ventured to sea. In this chapter, we at last embark upon our sea voyage.

In this chapter and the following two chapters, you’ll find a detailed explanation of the SELinux policy language and several related languages, such as those used to specify file and security contexts. This chapter explains the SELinux role-based access control policies, Chapter 7 explains the SELinux type-enforcement policies, and Chapter 8 explains other elements of the SELinux policy. Of course, most likely your goal is not merely to understand the SELinux policy language or SELinux security policies themselves, though such skills are useful to the SELinux system administrator. Instead, it’s more likely that you want to be able to specify new and modified SELinux security policies. If that is your goal, Chapter 6 through Chapter 8 won’t quite take you to the end of your voyage, though you’ll make landfall near the end of Chapter 8. Then you’ll be ready for Chapter 9, which explains how you can customize existing SELinux policies and implement your own policies. ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Mastering Security-Enhanced Linux (SELinux)

Mastering Security-Enhanced Linux (SELinux)

Sander van Vugt
Kubernetes Security and Observability

Kubernetes Security and Observability

Brendan Creane, Amit Gupta
Hacking Kubernetes

Hacking Kubernetes

Andrew Martin, Michael Hausenblas

Publisher Resources

ISBN: 0596007167Catalog PageErrata