Search results

From SELinux Wiki
Jump to: navigation, search

Page title matches

  • = SELinux Users = ...e generally groups or classes of user. For example all the standard system users could be assigned an SELinux user name of <tt>user_u</tt> and administratio
    1 KB (214 words) - 13:21, 7 December 2014

Page text matches

  • ...ty Enhanced Linux (SELinux) project page. Here you will find resources for users, administrators, vendors and developers. SELinux is a security enhancement to Linux which allows users and administrators more control over access control.
    2 KB (244 words) - 01:12, 30 November 2017
  • organizers/packagers, and power users. The format will be a set of
    3 KB (385 words) - 21:59, 16 July 2008
  • ...otection from broken software or malware running as a normal user or root. Users can grant risky levels of access to files they own. ...under SELinux allows you to provide granular permissions for all subjects (users, programs, processes) and objects (files, devices). In practice, think of s
    3 KB (500 words) - 06:24, 24 May 2008
  • == Administrators and users ==
    461 B (50 words) - 13:17, 2 December 2009
  • be consistent across all users of the interface. Thus
    1 KB (210 words) - 14:14, 29 October 2009
  • * users/dpquigl/lnfs * users/dpquigl/lnfs-patchset
    11 KB (1,725 words) - 13:02, 5 October 2010
  • ...www.slideshare.net/PaulWay/selinux-for-everyday-users SELinux for Everyday Users] (Slides by Paul Wayper) ...ing-policy-for-confined-selinux-users/ Writing policy for confined SELinux users] Red Hat Magazine article by Dan Walsh.
    9 KB (1,259 words) - 07:26, 27 June 2019
  • reseptionist_printer_t? Allow users of email clients to specify
    15 KB (2,267 words) - 10:18, 13 May 2008
  • This is a resource for new users, it explains in very broad terms what SELinux does, how to get it and so on ...curity goals of the system regardless of whether applications misbehave or users act carelessly.
    5 KB (714 words) - 09:07, 7 April 2017
  • ** Lock down users * Document Confined Users
    3 KB (472 words) - 20:29, 27 November 2009
  • documentation, users will also be able to make more use of the MAC An example of this would be to safely allow different users on the
    10 KB (1,342 words) - 02:20, 11 August 2008
  • The network users are mapped between the Kerberos, NFS, and LDAP * PAM is used to authenticate users, which is configured to use Kerberos.
    5 KB (832 words) - 18:24, 11 December 2008
  • The client component of the demonstration utilizes these services to provide users with login access. Automated installation scripts allow clients to be rapi users to access their files from anywhere within the demo enterprise
    10 KB (1,566 words) - 16:46, 6 January 2009
  • ...a password change before it can be changed again. Without a minimum time, users can change their password multiple times and overflow the history (see belo
    12 KB (1,806 words) - 15:15, 12 December 2008
  • # Users can change their shell, anyone else can see it Now 2 nodes need to be added; one for groups and one for users. Create <code>/tmp/usernodes.ldif</code>
    11 KB (1,819 words) - 15:26, 12 December 2008
  • sefos:/ /mnt/nfs4 nfs4 users,sec=krb5 0 0
    8 KB (1,230 words) - 15:53, 15 December 2008
  • = Adding Users = * The GUI 'system-config-users' can also be used.
    11 KB (1,726 words) - 14:16, 11 December 2008
  • users. The format will consist of brief presentations, moderated discussion
    3 KB (341 words) - 22:17, 26 July 2009
  • *Users/Groups **Configure one of the virtual hosts to allow sharing of files from users's public_html directories
    8 KB (1,241 words) - 15:29, 30 September 2009
  • ...ing the Apache HTTP Server to execute scripts can be a security risk. Some users require the Apache HTTP Server to execute CGI scripts. To allow this, first
    2 KB (388 words) - 18:28, 31 August 2010

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)