1NetworkManager_diSsEpLaitncuhxerP_oclliocuyd_NseetlwionrNukexMt(aw8no)argkeMra_ndaigsepra_tdcihsepra_tcclhoeurd_cloud_selinux(8)
2
3
4

NAME

6       NetworkManager_dispatcher_cloud_selinux  - Security Enhanced Linux Pol‐
7       icy for the NetworkManager_dispatcher_cloud processes
8

DESCRIPTION

10       Security-Enhanced  Linux  secures  the  NetworkManager_dispatcher_cloud
11       processes via flexible mandatory access control.
12
13       The NetworkManager_dispatcher_cloud processes execute with the Network‐
14       Manager_dispatcher_cloud_t SELinux type. You  can  check  if  you  have
15       these  processes running by executing the ps command with the -Z quali‐
16       fier.
17
18       For example:
19
20       ps -eZ | grep NetworkManager_dispatcher_cloud_t
21
22
23

ENTRYPOINTS

25       The NetworkManager_dispatcher_cloud_t SELinux type can be  entered  via
26       the NetworkManager_dispatcher_cloud_script_t file type.
27
28       The  default entrypoint paths for the NetworkManager_dispatcher_cloud_t
29       domain are the following:
30
31       /etc/NetworkManager/dispatcher.d/hook-network-manager, /etc/NetworkMan‐
32       ager/dispatcher.d/cloud-init-azure-hook,   /usr/lib/NetworkManager/dis‐
33       patcher.d/90-nm-cloud-setup.sh,            /usr/lib/NetworkManager/dis‐
34       patcher.d/no-wait.d/90-nm-cloud-setup.sh
35

PROCESS TYPES

37       SELinux defines process types (domains) for each process running on the
38       system
39
40       You can see the context of a process using the -Z option to ps
41
42       Policy governs the access confined processes have  to  files.   SELinux
43       NetworkManager_dispatcher_cloud  policy is very flexible allowing users
44       to setup their NetworkManager_dispatcher_cloud processes in as secure a
45       method as possible.
46
47       The   following  process  types  are  defined  for  NetworkManager_dis‐
48       patcher_cloud:
49
50       NetworkManager_dispatcher_cloud_t
51
52       Note: semanage permissive -a NetworkManager_dispatcher_cloud_t  can  be
53       used to make the process type NetworkManager_dispatcher_cloud_t permis‐
54       sive. SELinux does not deny access to permissive process types, but the
55       AVC (SELinux denials) messages are still generated.
56
57

BOOLEANS

59       SELinux  policy  is  customizable based on least access required.  Net‐
60       workManager_dispatcher_cloud policy is extremely flexible and has  sev‐
61       eral  booleans that allow you to manipulate the policy and run Network‐
62       Manager_dispatcher_cloud with the tightest access possible.
63
64
65
66       If you want to allow all domains to execute in fips_mode, you must turn
67       on the fips_mode boolean. Enabled by default.
68
69       setsebool -P fips_mode 1
70
71
72

MANAGED FILES

74       The  SELinux  process type NetworkManager_dispatcher_cloud_t can manage
75       files labeled with the following file types.  The paths listed are  the
76       default  paths for these file types.  Note the processes UID still need
77       to have DAC permissions.
78
79       systemd_passwd_var_run_t
80
81            /var/run/systemd/ask-password(/.*)?
82            /var/run/systemd/ask-password-block(/.*)?
83
84

FILE CONTEXTS

86       SELinux requires files to have an extended attribute to define the file
87       type.
88
89       You can see the context of a file using the -Z option to ls
90
91       Policy  governs  the  access  confined  processes  have to these files.
92       SELinux NetworkManager_dispatcher_cloud policy is very flexible  allow‐
93       ing  users  to setup their NetworkManager_dispatcher_cloud processes in
94       as secure a method as possible.
95
96       The  following  file  types   are   defined   for   NetworkManager_dis‐
97       patcher_cloud:
98
99
100
101       NetworkManager_dispatcher_cloud_script_t
102
103       -  Set files with the NetworkManager_dispatcher_cloud_script_t type, if
104       you want to treat the files as NetworkManager dispatcher  cloud  script
105       data.
106
107
108       Paths:
109            /etc/NetworkManager/dispatcher.d/hook-network-manager,   /etc/Net‐
110            workManager/dispatcher.d/cloud-init-azure-hook,  /usr/lib/Network‐
111            Manager/dispatcher.d/90-nm-cloud-setup.sh,    /usr/lib/NetworkMan‐
112            ager/dispatcher.d/no-wait.d/90-nm-cloud-setup.sh
113
114
115       Note: File context can be temporarily modified with the chcon  command.
116       If  you want to permanently change the file context you need to use the
117       semanage fcontext command.  This will modify the SELinux labeling data‐
118       base.  You will need to use restorecon to apply the labels.
119
120

COMMANDS

122       semanage  fcontext  can also be used to manipulate default file context
123       mappings.
124
125       semanage permissive can also be used to manipulate  whether  or  not  a
126       process type is permissive.
127
128       semanage  module can also be used to enable/disable/install/remove pol‐
129       icy modules.
130
131       semanage boolean can also be used to manipulate the booleans
132
133
134       system-config-selinux is a GUI tool available to customize SELinux pol‐
135       icy settings.
136
137

AUTHOR

139       This manual page was auto-generated using sepolicy manpage .
140
141

SEE ALSO

143       selinux(8),  NetworkManager_dispatcher_cloud(8),  semanage(8), restore‐
144       con(8), chcon(1), sepolicy(8), setsebool(8)
145
146
147
148NetworkManager_dispatcher_cloud    23N-e0t2w-o0r3kManager_dispatcher_cloud_selinux(8)
Impressum