Search results
From SELinux Wiki
Create the page "Users" on this wiki! See also the search results found.
Page title matches
- = SELinux Users = ...e generally groups or classes of user. For example all the standard system users could be assigned an SELinux user name of <tt>user_u</tt> and administratio1 KB (214 words) - 13:21, 7 December 2014
Page text matches
- ...ty Enhanced Linux (SELinux) project page. Here you will find resources for users, administrators, vendors and developers. SELinux is a security enhancement to Linux which allows users and administrators more control over access control.2 KB (244 words) - 01:12, 30 November 2017
- organizers/packagers, and power users. The format will be a set of3 KB (385 words) - 21:59, 16 July 2008
- ...otection from broken software or malware running as a normal user or root. Users can grant risky levels of access to files they own. ...under SELinux allows you to provide granular permissions for all subjects (users, programs, processes) and objects (files, devices). In practice, think of s3 KB (500 words) - 06:24, 24 May 2008
- == Administrators and users ==461 B (50 words) - 13:17, 2 December 2009
- be consistent across all users of the interface. Thus1 KB (210 words) - 14:14, 29 October 2009
- * users/dpquigl/lnfs * users/dpquigl/lnfs-patchset11 KB (1,725 words) - 13:02, 5 October 2010
- ...www.slideshare.net/PaulWay/selinux-for-everyday-users SELinux for Everyday Users] (Slides by Paul Wayper) ...ing-policy-for-confined-selinux-users/ Writing policy for confined SELinux users] Red Hat Magazine article by Dan Walsh.9 KB (1,259 words) - 07:26, 27 June 2019
- reseptionist_printer_t? Allow users of email clients to specify15 KB (2,267 words) - 10:18, 13 May 2008
- This is a resource for new users, it explains in very broad terms what SELinux does, how to get it and so on ...curity goals of the system regardless of whether applications misbehave or users act carelessly.5 KB (714 words) - 09:07, 7 April 2017
- ** Lock down users * Document Confined Users3 KB (472 words) - 20:29, 27 November 2009
- documentation, users will also be able to make more use of the MAC An example of this would be to safely allow different users on the10 KB (1,342 words) - 02:20, 11 August 2008
- The network users are mapped between the Kerberos, NFS, and LDAP * PAM is used to authenticate users, which is configured to use Kerberos.5 KB (832 words) - 18:24, 11 December 2008
- The client component of the demonstration utilizes these services to provide users with login access. Automated installation scripts allow clients to be rapi users to access their files from anywhere within the demo enterprise10 KB (1,566 words) - 16:46, 6 January 2009
- ...a password change before it can be changed again. Without a minimum time, users can change their password multiple times and overflow the history (see belo12 KB (1,806 words) - 15:15, 12 December 2008
- # Users can change their shell, anyone else can see it Now 2 nodes need to be added; one for groups and one for users. Create <code>/tmp/usernodes.ldif</code>11 KB (1,819 words) - 15:26, 12 December 2008
- sefos:/ /mnt/nfs4 nfs4 users,sec=krb5 0 08 KB (1,230 words) - 15:53, 15 December 2008
- = Adding Users = * The GUI 'system-config-users' can also be used.11 KB (1,726 words) - 14:16, 11 December 2008
- users. The format will consist of brief presentations, moderated discussion3 KB (341 words) - 22:17, 26 July 2009
- *Users/Groups **Configure one of the virtual hosts to allow sharing of files from users's public_html directories8 KB (1,241 words) - 15:29, 30 September 2009
- ...ing the Apache HTTP Server to execute scripts can be a security risk. Some users require the Apache HTTP Server to execute CGI scripts. To allow this, first2 KB (388 words) - 18:28, 31 August 2010