SELinux maps Linux users onto SELinux users and defines the roles that a user is allowed to be in through the SELinux user definitions. We learned how to manage those mappings and SELinux users with the semanage
application and were able to grant the right roles to the right people.
We also saw how the same commands are used to grant the proper sensitivity to the user and how we can describe these levels in the setrans.conf
file. We used the chcat
tool to do most of the category-related management activities.
After assigning roles to the users, we saw how to jump from one role to another using newrole
, sudo
, runcon
, and run_init
. We ended this chapter with important insight into how SELinux integrates in the Linux authentication process and how to tune a Linux system further using a couple of SELinux-aware PAM modules.
In the next chapter, we will learn to manage the labels on files and processes and see how we can query the SELinux policy rules.