1secadm_selinux(8)     secadm SELinux Policy documentation    secadm_selinux(8)
2
3
4

NAME

6       secadm_r - Security administrator role - Security Enhanced Linux Policy
7
8

DESCRIPTION

10       SELinux  supports  Roles  Based Access Control (RBAC), some Linux roles
11       are login roles, while other roles need to be transition into.
12
13       Note: Examples in this man page will use the staff_u SELinux user.
14
15       Non login roles are usually used for administrative tasks. For example,
16       tasks  that  require root privileges.  Roles control which types a user
17       can run processes with. Roles often  have  default  types  assigned  to
18       them.
19
20       The default type for the secadm_r role is secadm_t.
21
22       The newrole program to transition directly to this role.
23
24       newrole -r secadm_r -t secadm_t
25
26       sudo is the preferred method to do transition from one role to another.
27       You setup sudo to transition to secadm_r by adding a  similar  line  to
28       the /etc/sudoers file.
29
30       USERNAME ALL=(ALL) ROLE=secadm_r TYPE=secadm_t COMMAND
31
32       sudo will run COMMAND as staff_u:secadm_r:secadm_t:LEVEL
33
34       When  using  a a non login role, you need to setup SELinux so that your
35       SELinux user can reach secadm_r role.
36
37       Execute the following to see all of the assigned SELinux roles:
38
39       semanage user -l
40
41       You need to add secadm_r to the staff_u  user.   You  could  setup  the
42       staff_u user to be able to use the secadm_r role with a command like:
43
44       $ semanage user -m -R 'staff_r system_r secadm_r' staff_u
45
46
47
48       SELinux  policy also controls which roles can transition to a different
49       role.  You can list these rules using the following command.
50
51       sesearch --role_allow
52
53       SELinux policy allows the auditadm_r, staff_r, sysadm_r roles can tran‐
54       sition to the secadm_r role.
55
56
57

BOOLEANS

59       SELinux  policy is customizable based on least access required.  secadm
60       policy is extremely flexible and has several booleans that allow you to
61       manipulate the policy and run secadm with the tightest access possible.
62
63
64
65       If you want to allow users to resolve user passwd entries directly from
66       ldap rather then using a sssd server, you  must  turn  on  the  authlo‐
67       gin_nsswitch_use_ldap boolean. Disabled by default.
68
69       setsebool -P authlogin_nsswitch_use_ldap 1
70
71
72
73       If you want to deny user domains applications to map a memory region as
74       both executable and writable, this  is  dangerous  and  the  executable
75       should be reported in bugzilla, you must turn on the deny_execmem bool‐
76       ean. Enabled by default.
77
78       setsebool -P deny_execmem 1
79
80
81
82       If you want to deny any process from ptracing or  debugging  any  other
83       processes,  you  must  turn  on  the  deny_ptrace  boolean.  Enabled by
84       default.
85
86       setsebool -P deny_ptrace 1
87
88
89
90       If you want to allow any process  to  mmap  any  file  on  system  with
91       attribute  file_type,  you must turn on the domain_can_mmap_files bool‐
92       ean. Enabled by default.
93
94       setsebool -P domain_can_mmap_files 1
95
96
97
98       If you want to allow all domains write to kmsg_device, while kernel  is
99       executed  with  systemd.log_target=kmsg parameter, you must turn on the
100       domain_can_write_kmsg boolean. Disabled by default.
101
102       setsebool -P domain_can_write_kmsg 1
103
104
105
106       If you want to allow all domains to use other domains file descriptors,
107       you must turn on the domain_fd_use boolean. Enabled by default.
108
109       setsebool -P domain_fd_use 1
110
111
112
113       If  you  want to allow all domains to have the kernel load modules, you
114       must  turn  on  the  domain_kernel_load_modules  boolean.  Disabled  by
115       default.
116
117       setsebool -P domain_kernel_load_modules 1
118
119
120
121       If you want to allow all domains to execute in fips_mode, you must turn
122       on the fips_mode boolean. Enabled by default.
123
124       setsebool -P fips_mode 1
125
126
127
128       If you want to enable reading of urandom for all domains, you must turn
129       on the global_ssp boolean. Disabled by default.
130
131       setsebool -P global_ssp 1
132
133
134
135       If  you  want  to allow confined applications to run with kerberos, you
136       must turn on the kerberos_enabled boolean. Enabled by default.
137
138       setsebool -P kerberos_enabled 1
139
140
141
142       If you want to allow logging in and using the system from /dev/console,
143       you must turn on the login_console_enabled boolean. Enabled by default.
144
145       setsebool -P login_console_enabled 1
146
147
148
149       If  you  want  to  allow  system  to run with NIS, you must turn on the
150       nis_enabled boolean. Disabled by default.
151
152       setsebool -P nis_enabled 1
153
154
155
156       If you want to allow confined applications to use nscd  shared  memory,
157       you must turn on the nscd_use_shm boolean. Disabled by default.
158
159       setsebool -P nscd_use_shm 1
160
161
162
163       If  you  want to disallow programs, such as newrole, from transitioning
164       to administrative user domains, you must turn on the secure_mode  bool‐
165       ean. Enabled by default.
166
167       setsebool -P secure_mode 1
168
169
170
171       If  you want to boolean to determine whether the system permits loading
172       policy, setting enforcing mode, and changing boolean values.  Set  this
173       to  true  and  you  have to reboot to set it back, you must turn on the
174       secure_mode_policyload boolean. Enabled by default.
175
176       setsebool -P secure_mode_policyload 1
177
178
179
180       If you want to allow unconfined executables to make  their  stack  exe‐
181       cutable.   This  should  never, ever be necessary. Probably indicates a
182       badly coded executable, but could indicate an attack.  This  executable
183       should  be reported in bugzilla, you must turn on the selinuxuser_exec‐
184       stack boolean. Enabled by default.
185
186       setsebool -P selinuxuser_execstack 1
187
188
189
190       If you want to allow ssh logins as sysadm_r:sysadm_t, you must turn  on
191       the ssh_sysadm_login boolean. Disabled by default.
192
193       setsebool -P ssh_sysadm_login 1
194
195
196
197       If  you  want  to  support  NFS  home directories, you must turn on the
198       use_nfs_home_dirs boolean. Disabled by default.
199
200       setsebool -P use_nfs_home_dirs 1
201
202
203
204       If you want to support SAMBA home directories, you  must  turn  on  the
205       use_samba_home_dirs boolean. Disabled by default.
206
207       setsebool -P use_samba_home_dirs 1
208
209
210
211       If  you  want to allow the graphical login program to login directly as
212       sysadm_r:sysadm_t, you must turn on the xdm_sysadm_login boolean.  Dis‐
213       abled by default.
214
215       setsebool -P xdm_sysadm_login 1
216
217
218

MANAGED FILES

220       The  SELinux  process  type  secadm_t can manage files labeled with the
221       following file types.  The paths listed are the default paths for these
222       file types.  Note the processes UID still need to have DAC permissions.
223
224       boolean_type
225
226
227       default_context_t
228
229            /etc/selinux/([^/]*/)?contexts(/.*)?
230            /root/.default_contexts
231
232       dosfs_t
233
234
235       etc_runtime_t
236
237            /[^/]+
238            /etc/mtab.*
239            /etc/blkid(/.*)?
240            /etc/nologin.*
241            /etc/.fstab.hal..+
242            /halt
243            /fastboot
244            /poweroff
245            /etc/cmtab
246            /forcefsck
247            /.autofsck
248            /.suspended
249            /fsckoptions
250            /var/.updated
251            /etc/.updated
252            /.autorelabel
253            /etc/securetty
254            /etc/nohotplug
255            /etc/killpower
256            /etc/ioctl.save
257            /etc/fstab.REVOKE
258            /etc/network/ifstate
259            /etc/sysconfig/hwconf
260            /etc/ptal/ptal-printd-like
261            /etc/sysconfig/iptables.save
262            /etc/xorg.conf.d/00-system-setup-keyboard.conf
263            /etc/X11/xorg.conf.d/00-system-setup-keyboard.conf
264
265       file_context_t
266
267            /etc/selinux/([^/]*/)?contexts/files(/.*)?
268
269       screen_home_t
270
271            /root/.screen(/.*)?
272            /home/[^/]+/.screen(/.*)?
273            /home/[^/]+/.screenrc
274            /home/[^/]+/.tmux.conf
275
276       selinux_config_t
277
278            /etc/selinux(/.*)?
279            /etc/selinux/([^/]*/)?seusers
280            /etc/selinux/([^/]*/)?users(/.*)?
281            /etc/selinux/([^/]*/)?setrans.conf
282            /var/lib/sepolgen(/.*)?
283
284       selinux_login_config_t
285
286            /etc/selinux/([^/]*/)?logins(/.*)?
287
288       semanage_store_t
289
290            /etc/selinux/([^/]*/)?policy(/.*)?
291            /etc/selinux/(minimum|mls|targeted)/active(/.*)?
292            /etc/selinux/([^/]*/)?modules/(active|tmp|previous)(/.*)?
293            /var/lib/selinux(/.*)?
294            /etc/share/selinux/mls(/.*)?
295            /etc/share/selinux/targeted(/.*)?
296
297       systemd_passwd_var_run_t
298
299            /var/run/systemd/ask-password(/.*)?
300            /var/run/systemd/ask-password-block(/.*)?
301
302       user_tmp_type
303
304            all user tmp files
305
306

COMMANDS

308       semanage  fcontext  can also be used to manipulate default file context
309       mappings.
310
311       semanage permissive can also be used to manipulate  whether  or  not  a
312       process type is permissive.
313
314       semanage  module can also be used to enable/disable/install/remove pol‐
315       icy modules.
316
317       semanage boolean can also be used to manipulate the booleans
318
319
320       system-config-selinux is a GUI tool available to customize SELinux pol‐
321       icy settings.
322
323

AUTHOR

325       This manual page was auto-generated using sepolicy manpage .
326
327

SEE ALSO

329       selinux(8),  secadm(8),  semanage(8),  restorecon(8),  chcon(1), sepol‐
330       icy(8)        ,         setsebool(8),         secadm_screen_selinux(8),
331       secadm_screen_selinux(8),  secadm_su_selinux(8),  secadm_su_selinux(8),
332       secadm_sudo_selinux(8), secadm_sudo_selinux(8)
333
334
335
336mgrepl@redhat.com                   secadm                   secadm_selinux(8)
Impressum