Understanding SELinux, Part 9
Understanding how subjects (or processes) that have been created in memory get their SELinux security contexts.
read moreUnderstanding SELinux, Part 8
Let’s look at how to set default security contexts for files using policy modules. We will also use policy modules to set rules that will automatically transition the default type assigned to files and folders at the time of creation.s
read moreUnderstanding SELinux, Part 7
Let’s explore how to go about creating real-life policy modules.
read moreUnderstanding SELinux, Part 6
In this article, we will learn about the basics of policy modules.
read moreUnderstanding SELinux, Part 5
In Part 4, we looked at allow rules in an SELinux policy. This time we will discuss SELinux error logs in order to decipher them and take corrective action.
read moreUnderstanding SELinux, Part 4
Let’s explore how Allow Rules are applied for access permissions to objects based on their Security Contexts.
read moreUnderstanding SELinux, Part 3
In Part 2 we barely scratched the surface of the SELinux Targeted Policy that’s shipped with RHEL 5. This month we will try to delve deeper into it’s building blocks.
read moreUnderstanding SELinux, Part 2
Let’s explore SELinux modes, and learn a few commands that will help in understanding SELinux policies better.
read moreUnderstanding SELinux, Part 1
In this introductory article, our focus will be on SELinux Type Enforcement to give you a feel of SELinux.
read more