1sysadm_su_selinux(8)       SELinux Policy sysadm_su       sysadm_su_selinux(8)
2
3
4

NAME

6       sysadm_su_selinux  -  Security  Enhanced Linux Policy for the sysadm_su
7       processes
8

DESCRIPTION

10       Security-Enhanced Linux secures the sysadm_su  processes  via  flexible
11       mandatory access control.
12
13       The  sysadm_su processes execute with the sysadm_su_t SELinux type. You
14       can check if you have these processes running by executing the ps  com‐
15       mand with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep sysadm_su_t
20
21
22

ENTRYPOINTS

24       The  sysadm_su_t  SELinux  type  can  be entered via the su_exec_t file
25       type.
26
27       The default entrypoint paths for the sysadm_su_t domain are the follow‐
28       ing:
29
30       /usr/(local/)?bin/ksu, /bin/su, /usr/bin/su, /usr/bin/kdesu
31

PROCESS TYPES

33       SELinux defines process types (domains) for each process running on the
34       system
35
36       You can see the context of a process using the -Z option to ps
37
38       Policy governs the access confined processes have  to  files.   SELinux
39       sysadm_su  policy  is  very  flexible  allowing  users  to  setup their
40       sysadm_su processes in as secure a method as possible.
41
42       The following process types are defined for sysadm_su:
43
44       sysadm_su_t, sysadm_sudo_t
45
46       Note: semanage permissive -a  sysadm_su_t  can  be  used  to  make  the
47       process  type  sysadm_su_t  permissive. SELinux does not deny access to
48       permissive process types, but the AVC (SELinux  denials)  messages  are
49       still generated.
50
51

BOOLEANS

53       SELinux   policy  is  customizable  based  on  least  access  required.
54       sysadm_su policy is extremely flexible and has  several  booleans  that
55       allow  you to manipulate the policy and run sysadm_su with the tightest
56       access possible.
57
58
59
60       If you want to allow all domains to execute in fips_mode, you must turn
61       on the fips_mode boolean. Enabled by default.
62
63       setsebool -P fips_mode 1
64
65
66
67       If  you  want  to allow confined applications to run with kerberos, you
68       must turn on the kerberos_enabled boolean. Disabled by default.
69
70       setsebool -P kerberos_enabled 1
71
72
73
74       If you want to allow system to run with  NIS,  you  must  turn  on  the
75       nis_enabled boolean. Disabled by default.
76
77       setsebool -P nis_enabled 1
78
79
80

MANAGED FILES

82       The  SELinux process type sysadm_su_t can manage files labeled with the
83       following file types.  The paths listed are the default paths for these
84       file types.  Note the processes UID still need to have DAC permissions.
85
86       faillog_t
87
88            /var/log/btmp.*
89            /var/log/faillog.*
90            /var/log/tallylog.*
91            /var/run/faillock(/.*)?
92
93       initrc_var_run_t
94
95            /var/run/utmp
96            /var/run/random-seed
97            /var/run/runlevel.dir
98            /var/run/setmixer_flag
99
100       lastlog_t
101
102            /var/log/lastlog.*
103
104       security_t
105
106            /selinux
107
108

COMMANDS

110       semanage  fcontext  can also be used to manipulate default file context
111       mappings.
112
113       semanage permissive can also be used to manipulate  whether  or  not  a
114       process type is permissive.
115
116       semanage  module can also be used to enable/disable/install/remove pol‐
117       icy modules.
118
119       semanage boolean can also be used to manipulate the booleans
120
121
122       system-config-selinux is a GUI tool available to customize SELinux pol‐
123       icy settings.
124
125

AUTHOR

127       This manual page was auto-generated using sepolicy manpage .
128
129

SEE ALSO

131       selinux(8),  sysadm_su(8), semanage(8), restorecon(8), chcon(1), sepol‐
132       icy(8), setsebool(8)
133
134
135
136sysadm_su                          21-03-26               sysadm_su_selinux(8)
Impressum