![]() |
Configuring the SELinux Policy |
Security Enhanced Linux
![]() Employment Opportunities ![]() NSA Home Page |
Stephen Smalley (NAI Labs) Initial version: February 2002, Last revised: January 2003 AbstractThis technical report describes how to configure the SELinux security policy for the example security server. It begins by explaining concepts defined by the Flask architecture that are important to configuring the policy. The report then describes the security model implemented by the example security server. The policy language and the example policy configuration are then described. The report explains how the policy is built and applied to the system. Security-aware applications and their configurations are discussed. Finally, the report describes how to customize the policy for various purposes. |