SELinux by Example: Using Security Enhanced Linux

In this chapter

  • 13.1 SELinux Configuration and Policy Management Files

  • 13.2 Impact of SELinux on System Administration

  • 13.3 Summary

  • Exercises

page 296

page 306

page 323

page 324

An SELinux system looks and feels like any other Linux system in many ways. Indeed, Red Hat Enterprise Linux (RHEL) is an SELinux system whether you know it or not. However, with the enhanced security, "something" can break or not work for more reasons than before. Fixing problems may require additional administration procedures, and normal operations may now require additional steps. In this chapter, we discuss the way in which SELinux affects a Linux administrator and how to accomplish the most common important tasks.

Категории