User-based access control policy
This module is required to be included in all policies.
Constrain by user-based access control (UBAC).
Constrain the specified type by user-based access control (UBAC). Typically, these are user processes or user files that need to be differentiated by SELinux user. Normally this does not include administrative or privileged programs. For the UBAC rules to be enforced, both the subject (source) type and the object (target) types must be UBAC constrained.
Parameter: | Description: |
---|---|
type |
Type to be constrained by UBAC. |
Exempt user-based access control for databases.
Parameter: | Description: |
---|---|
domain |
Domain to be exempted. |
Exempt user-based access control for dbus.
Parameter: | Description: |
---|---|
domain |
Domain to be exempted. |
Exempt user-based access control for file descriptors.
Parameter: | Description: |
---|---|
domain |
Domain to be exempted. |
Exempt user-based access control for files.
Parameter: | Description: |
---|---|
domain |
Domain to be exempted. |
Exempt user-based access control for keys.
Parameter: | Description: |
---|---|
domain |
Domain to be exempted. |
Exempt user-based access control for processes.
Parameter: | Description: |
---|---|
domain |
Domain to be exempted. |
Exempt user-based access control for sockets.
Parameter: | Description: |
---|---|
domain |
Domain to be exempted. |
Exempt user-based access control for SysV IPC.
Parameter: | Description: |
---|---|
domain |
Domain to be exempted. |
Exempt user-based access control for X Windows.
Parameter: | Description: |
---|---|
domain |
Domain to be exempted. |