Policy for user domains
false
Allow users to connect to mysql
false
Allow users to connect to PostgreSQL
false
Allow regular users direct mouse access
false
Allow users to read system messages.
false
Allow user to execute files on filesystems that do not have extended attributes (FAT, CDROM, FLOPPY)
false
Allow user to r/w files on filesystems that do not have extended attributes (FAT, CDROM, FLOPPY)
false
Allow w to display everyone
false
Allow user to write files on removable devices (e.g. external USB memory devices or floppies)
Allow append on inherited user home files.
Parameter: | Description: |
---|---|
domain |
Domain to allow. |
Associate the specified domain to be a domain capable of executing other applications on behalf of the specified user.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
userdomain_prefix |
The prefix of the user domain (e.g., user is the prefix for user_t). |
Allow domain to attach to TUN devices created by administrative users.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Execute bin_t in the unprivileged user domains. This is an explicit transition, requiring the caller to use setexeccon().
Parameter: | Description: |
---|---|
domain |
Domain allowed to transition. |
Create keys for all user domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create user home directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create a user pty.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Send a dbus message to all user domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete all user home content directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete all user home content files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete all user home content symbolic links.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
delete user runtime blk files
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
delete user runtime chr files
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
delete user runtime directories
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
delete user runtime files
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
delete user runtime fifo files
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
delete user runtime socket files
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
delete user runtime symlink files
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete directories in a user home subdirectory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete files in a user home subdirectory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete symbolic links in a user home directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
delete user runtime files
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete users temporary directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete users temporary files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete users temporary named pipes.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete users temporary named sockets.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete users temporary symbolic links.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete user tmpfs files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Do not audit attempts to append user home files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to append users temporary files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to execute user home files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of user home directories.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of a user domain tty.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to list user home subdirectories.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to list user temporary directories.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to manage the user SSL certificates.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Do not audit attempts to create, read, write, and delete directories in a user home subdirectory.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to manage user home directories.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to manage users temporary directories.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to manage users temporary files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read user home files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read users temporary files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
dontaudit Read attempts of user tmpfs files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Do not audit attempts to relabel user home files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to relabel files from user pty types.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read and write unserdomain stream.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read and write temporary pipes.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Do not audit attempts to search user home content directories.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search user home directories.
Do not audit attempts to search user home directories. This will suppress SELinux denial messages when the specified domain is denied the permission to search these directories.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search user runtime root directories.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to set the attributes of user home files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to set the attributes of a user domain tty.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to inherit the file descriptors from any user domains.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to inherit the file descriptors from unprivileged user domains.
Do not audit attempts to inherit the file descriptors from unprivileged user domains. This will suppress SELinux denial messages when the specified domain is denied the permission to inherit these file descriptors.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to use user ptys.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read and write a user domain tty and pty.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to use user ttys.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to write user home files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to write users temporary files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Execute all entrypoint files in unprivileged user domains. This is an explicit transition, requiring the caller to use setexeccon().
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Execute user executable files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Execute user home files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
The execute access user temporary files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
execute and execmod user tmpfs files
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of all user domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of user home directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of a user domain tty.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create directories in the home dir root with the user home directory type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
name |
The name of the object being created. |
List all users home content directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List user runtime directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List contents of users home directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List user home directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List user temporary directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Manage all user home content, including application-specific resources.
Parameter: | Description: |
---|---|
domain |
Domain allowed access |
Manage keys for all user domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow a home directory for which the role has full access.
Allow a home directory for which the role has full access.
This does not allow execute access.
Parameter: | Description: |
---|---|
role |
The user role |
userdomain |
The user domain |
Manage user temporary files
Parameter: | Description: |
---|---|
role |
Role allowed access. |
domain |
Domain allowed access. |
Role access for the user tmpfs type that the user has full access.
Role access for the user tmpfs type that the user has full access.
This does not allow execute access.
Parameter: | Description: |
---|---|
role |
Role allowed access. |
domain |
Domain allowed access. |
Manage unpriviledged user SysV sempaphores.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Manage unpriviledged user SysV shared memory segments.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Manage user executable files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Manage user SSL certificates.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete directories in a user home subdirectory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete files in a user home subdirectory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete named pipes in a user home subdirectory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete named sockets in a user home subdirectory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete symbolic links in a user home subdirectory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Manage user home directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete user runtime dirs.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete user runtime root dirs.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete user temporary directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete user temporary files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete user temporary named pipes.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete user temporary named sockets.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete user temporary symbolic links.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete user tmpfs files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Map all user home content, including application-specific resources.
Parameter: | Description: |
---|---|
domain |
Domain allowed access |
Map user home files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Map user temporary files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Map user tmpfs files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Mmap user home files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Mount a filesystem on user runtime dir directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read all user home content, including application-specific resources.
Parameter: | Description: |
---|---|
domain |
Domain allowed access |
Read keys for all user domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read the process state of all user domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read user SSL certificates.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read user home files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read user home subdirectory symbolic links.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read user temporary files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read user temporary symbolic links.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read user tmpfs files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel generic user home dirs.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel generic user home files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel to and from user runtime root dirs.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
relabel to/from user tmpfs dirs
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
relabel to/from user tmpfs files
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel from user runtime directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel to user home directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel files to unprivileged user pty types.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel to user runtime directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow a home directory for which the role has read-only access.
Allow a home directory for which the role has read-only access.
This does not allow execute access.
Parameter: | Description: |
---|---|
role |
The user role |
userdomain |
The user domain |
Create objects in the runtime directory with an automatic type transition to the user runtime root type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
object_class |
The class of the object to be created. |
name |
The name of the object being created. |
Read and write keys for all user domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read and write unpriviledged user SysV sempaphores.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read and write unpriviledged user SysV shared memory segments.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read and write user temporary files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read and write user tmpfs files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search users runtime directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search users home directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search user home directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search users runtime directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search user runtime root directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow user to run as a secadm
Create objects in a user home directory with an automatic type transition to a specified private type.
This is a templated interface, and should only be called from a per-userdomain template.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
role |
The role of the object to create. |
Set attributes of all user home content directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Set the attributes of a user pty.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Set the attributes of a user domain tty.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Send a SIGCHLD signal to all user domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Send general signals to all user domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Send general signals to unprivileged user domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Send signull to unprivileged user domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Execute a shell in all user domains. This is an explicit transition, requiring the caller to use setexeccon().
Parameter: | Description: |
---|---|
domain |
Domain allowed to transition. |
Execute a shell in all unprivileged user domains. This is an explicit transition, requiring the caller to use setexeccon().
Parameter: | Description: |
---|---|
domain |
Domain allowed to transition. |
Create objects in the temporary directory with an automatic type transition to the user temporary type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
object_class |
The class of the object to be created. |
name |
The name of the object being created. |
Delete user_tmp_t device nodes (probably should not have been created in the first place)
Parameter: | Description: |
---|---|
domain |
Domain to allow deleting |
Inherit the file descriptors from all user domains
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read and write a user TTYs and PTYs.
Allow the specified domain to read and write user TTYs and PTYs. This will allow the domain to interact with the user via the terminal. Typically all interactive applications will require this access.
However, this also allows the applications to spy on user sessions or inject information into the user session. Thus, this access should likely not be allowed for non-interactive domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Inherit the file descriptors from unprivileged user domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read and write a user domain pty.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read, write and open a user TTYs and PTYs.
Allow the specified domain to read and write user TTYs and PTYs. This will allow the domain to interact with the user via the terminal. Typically all interactive applications will require this access.
This interface will also allow to open these user terminals, which should not be necessary in general and userdom_use_inherited_user_terminals() should be sufficient.
However, this also allows the applications to spy on user sessions or inject information into the user session. Thus, this access should likely not be allowed for non-interactive domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read and write a user domain tty.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Make the specified type usable as a user application domain.
Parameter: | Description: |
---|---|
type |
Type to be used as a user application domain. |
type |
Type to be used as the domain entry point. |
Make the specified type usable as a user application domain type.
Parameter: | Description: |
---|---|
type |
Type to be used as a user application domain. |
Make the specified type usable in a user home directory.
Parameter: | Description: |
---|---|
type |
Type to be used as a file in the user home directory. |
Create objects in a directory located in a user home directory with an automatic type transition to a specified private type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
private_type |
The type of the object to create. |
object_class |
The class of the object to be created. |
name |
The name of the object being created. |
Create objects in a user home directory with an automatic type transition to a specified private type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
private_type |
The type of the object to create. |
object_class |
The class of the object to be created. |
name |
The name of the object being created. |
Automatically use the user_cert_t label for selected resources created in a users home directory
Parameter: | Description: |
---|---|
domain |
Domain allowed access |
class |
Resource type(s) for which the label should be used |
filename |
Name of the resource that is being created |
Create objects in a user home directory with an automatic type transition to the user home file type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
object_class |
The class of the object to be created. |
name |
The name of the object being created. |
Do a domain transition to the specified domain when executing a program in the user home directory.
Do a domain transition to the specified domain when executing a program in the user home directory.
No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.
Parameter: | Description: |
---|---|
source_domain |
Domain allowed to transition. |
target_domain |
Domain to transition to. |
Create objects in the user runtime root directory with an automatic type transition to the user runtime dir type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
object_class |
The class of the object to be created. |
name |
The name of the object being created. |
Make the specified type usable in the directory /run/user/%{USERID}/.
Parameter: | Description: |
---|---|
type |
Type to be used as a file in the user_runtime_content_dir_t. |
Create objects in a user runtime directory with an automatic type transition to a specified private type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
private_type |
The type of the object to create. |
object_class |
The class of the object to be created. |
name |
The name of the object being created. |
Create objects in the user runtime directory with an automatic type transition to the user temporary type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
object_class |
The class of the object to be created. |
name |
The name of the object being created. |
Create objects in the user runtime root directory with an automatic type transition to the user runtime dir type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
object_class |
The class of the object to be created. |
name |
The name of the object being created. |
Make the specified type usable as a user temporary file.
Parameter: | Description: |
---|---|
type |
Type to be used as a file in the temporary directories. |
Create objects in a user temporary directory with an automatic type transition to a specified private type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
private_type |
The type of the object to create. |
object_class |
The class of the object to be created. |
name |
The name of the object being created. |
Make the specified type usable as a user tmpfs file.
Parameter: | Description: |
---|---|
type |
Type to be used as a file in tmpfs directories. |
watch users home directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
write user runtime socket files
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Write keys for all user domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
write user runtime sockets
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Write all users files in /tmp
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Write to user temporary named sockets.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Execute an Xserver session in all user domains. This is an explicit transition, requiring the caller to use setexeccon().
Parameter: | Description: |
---|---|
domain |
Domain allowed to transition. |
Execute an Xserver session in all unprivileged user domains. This is an explicit transition, requiring the caller to use setexeccon().
Parameter: | Description: |
---|---|
domain |
Domain allowed to transition. |
The template for creating an administrative user.
This template creates a user domain, types, and rules for the user's tty, pty, home directories, tmp, and tmpfs files.
The privileges given to administrative users are:
Raw disk access
Set all sysctls
All kernel ring buffer controls
Create, read, write, and delete all files but shadow
Manage source and binary format SELinux policy
Run insmod
Parameter: | Description: |
---|---|
userdomain_prefix |
The prefix of the user domain (e.g., sysadm is the prefix for sysadm_t). |
The template containing the most basic rules common to all users.
The template containing the most basic rules common to all users.
This template creates a user domain, types, and rules for the user's tty and pty.
Parameter: | Description: |
---|---|
userdomain_prefix |
The prefix of the user domain (e.g., user is the prefix for user_t). |
The template allowing the user basic network permissions
Parameter: | Description: |
---|---|
userdomain_prefix |
The prefix of the user domain (e.g., user is the prefix for user_t). |
The template for allowing the user to change passwords.
Parameter: | Description: |
---|---|
userdomain_prefix |
The prefix of the user domain (e.g., user is the prefix for user_t). |
The template containing rules common to unprivileged users and administrative users.
This template creates a user domain, types, and rules for the user's tty, pty, tmp, and tmpfs files.
Parameter: | Description: |
---|---|
userdomain_prefix |
The prefix of the user domain (e.g., user is the prefix for user_t). |
The template for creating a login user.
This template creates a user domain, types, and rules for the user's tty, pty, home directories, tmp, and tmpfs files.
Parameter: | Description: |
---|---|
userdomain_prefix |
The prefix of the user domain (e.g., user is the prefix for user_t). |
The template for creating a unprivileged login user.
This template creates a user domain, types, and rules for the user's tty, pty, home directories, tmp, and tmpfs files.
Parameter: | Description: |
---|---|
userdomain_prefix |
The prefix of the user domain (e.g., user is the prefix for user_t). |
The template for creating a unprivileged xwindows login user.
The template for creating a unprivileged xwindows login user.
This template creates a user domain, types, and rules for the user's tty, pty, home directories, tmp, and tmpfs files.
Parameter: | Description: |
---|---|
userdomain_prefix |
The prefix of the user domain (e.g., user is the prefix for user_t). |
The template for creating a unprivileged user roughly equivalent to a regular linux user.
The template for creating a unprivileged user roughly equivalent to a regular linux user.
This template creates a user domain, types, and rules for the user's tty, pty, home directories, tmp, and tmpfs files.
Parameter: | Description: |
---|---|
userdomain_prefix |
The prefix of the user domain (e.g., user is the prefix for user_t). |
Template for handling user content through standard tunables
This template generates the tunable blocks for accessing end user content, either the generic one (user_home_t) or the complete one (based on user_home_content_type).
It calls the *_read_generic_user_content, *_read_all_user_content, *_manage_generic_user_content, and *_manage_all_user_content booleans.
Parameter: | Description: |
---|---|
prefix |
The application domain prefix to use, meant for the boolean calls |
domain |
The application domain which is granted the necessary privileges |
Allow user to interact with xdg content types
Create rules to allow a user to manage xdg content in a user home directory with an automatic type transition to those types.
This is a templated interface, and should only be called from a per-userdomain template.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |