Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

seusers(5) [debian man page]

seusers(5)						       SELinux configuration							seusers(5)

NAME
seusers - The SELinux GNU/Linux user to SELinux user mapping configuration file. DESCRIPTION
The seusers file contains a list GNU/Linux user to SELinux user mapping for use by SELinux-aware login applications such as PAM(8). selinux_usersconf_path(3) will return the active policy path to this file. The default SELinux users mapping file is located at: /etc/selinux/{SELINUXTYPE}/seusers Where {SELINUXTYPE} is the entry from the selinux configuration file config (see selinux_config(5)). getseuserbyname(3) reads this file to map a GNU/Linux user or group to an SELinux user. FILE FORMAT
Each line of the seusers configuration file consists of the following: [%group_id]|[user_id]:seuser_id[:range] Where: group_id|user_id The GNU/Linux user id, or if preceded by the percentage (%) symbol, then a GNU/Linux group id. An optional entry set to __default__ can be provided as a fall back if required. seuser_id The SELinux user identity. range The optional level or range for an MLS/MCS policy. EXAMPLE
# ./seusers system_u:system_u:s0-s15:c0.c255 root:root:s0-s15:c0.c255 fred:user_u:s0 __default__:user_u:s0 %user_group:user_u:s0 SEE ALSO
selinux(8), PAM(8), selinux_usersconf_path(3), getseuserbyname(3), selinux_config(5) Security Enhanced Linux 28-Nov-2011 seusers(5)

Check Out this Related Man Page

seusers(5)						       SELinux configuration							seusers(5)

NAME
seusers - The SELinux GNU/Linux user to SELinux user mapping configuration file DESCRIPTION
The seusers file contains a list GNU/Linux user to SELinux user mapping for use by SELinux-aware login applications such as PAM(8). selinux_usersconf_path(3) will return the active policy path to this file. The default SELinux users mapping file is located at: /etc/selinux/{SELINUXTYPE}/seusers Where {SELINUXTYPE} is the entry from the selinux configuration file config (see selinux_config(5)). getseuserbyname(3) reads this file to map a GNU/Linux user or group to an SELinux user. FILE FORMAT
Each line of the seusers configuration file consists of the following: [%group_id]|[user_id]:seuser_id[:range] Where: group_id|user_id The GNU/Linux user id, or if preceded by the percentage (%) symbol, then a GNU/Linux group id. An optional entry set to __default__ can be provided as a fall back if required. seuser_id The SELinux user identity. range The optional level or range for an MLS/MCS policy. EXAMPLE
# ./seusers system_u:system_u:s0-s15:c0.c255 root:root:s0-s15:c0.c255 fred:user_u:s0 __default__:user_u:s0 %user_group:user_u:s0 SEE ALSO
selinux(8), PAM(8), selinux_usersconf_path(3), getseuserbyname(3), selinux_config(5) Security Enhanced Linux 28-Nov-2011 seusers(5)
Man Page

4 More Discussions You Might Find Interesting

1. Linux

New Linux user

(8 Replies)
Discussion started by: stav
8 Replies

2. Virtualization and Cloud Computing

anyone running SELinux on amazon EC2?

Hi, Has anyone enabled SELinux on Amazon EC2? I tried to enable SELinux using a CentOS image, and the steps in the following post, but it didn't work!! Amazon Web Services Developer Community : Has anyone successfully enabled SELinux ... The steps i took: 1)I started with CentOS 5.3 base... (5 Replies)
Discussion started by: fun_indra
5 Replies

3. Solaris

Building OpenSolaris from sources

Everyone knows the project LFS (Linux from scratch), it is a book-assembly instructions GNU / Linux from source code. I managed to gather, then my knowledge of GNU / Linux grew, learned many new commands, edit config-files, base packages, kernel, etc. .. Now I would like also to explore... (0 Replies)
Discussion started by: Geekon
0 Replies

4. Red Hat

SELinux Security Context-External Drive

I have an external drive (1 TB) attached via usb to a server running Red Hat Linux 6.2. During an application install one step requires perms set by root. Even though I could ls -l and see that root was able to do the 4755 but the install would fail. Someone pointed out the dot in the permission... (3 Replies)
Discussion started by: rsheikh01
3 Replies