From Fedora Project Wiki
(→‎Access Control: targeted policy overview ideas)
Line 20: Line 20:
== Targeted Policy Overview ==
== Targeted Policy Overview ==


Introduction to targeted policy: users and roles, and differences between confined and unconfined processes.
* Introduction to targeted policy: <http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.2/html/Deployment_Guide/sec-sel-policy-targeted-oview.html>.
<http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.2/html/Deployment_Guide/sec-sel-policy-targeted-oview.html>
 
* Confined and unconfined processes.
 
* Users and roles: user_u, user_r, system_r, and so on.

Revision as of 03:43, 30 July 2008

Content Specification (Draft-only)

SELinux Introduction

SELinux Basics

Someone suggested having a section, that detailed if you are not going to do anything else with SELinux, then at least do these 3-4 things...

Access Control

Describe the concepts of the following, using <http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.2/html/Deployment_Guide/selg-overview.html> as a guide:

  • Discretionary Access Control (DAC)
  • Mandatory Access Control (MAC)
  • Multi-Level Security (MLS)
  • Mutli-Category Security (MCS)
  • Type Enforcement (TE)
  • Role Based Access Control (RBAC)

Targeted Policy Overview

  • Confined and unconfined processes.
  • Users and roles: user_u, user_r, system_r, and so on.