Every user, file, or device in Enterprise Linux has a security context. Knowing how to list this security context will go a long way to troubleshooting access problems.
- [Instructor] SELinux subjects…are usually users and processes.…All subjects and objects in SELinux…have a security context or label.…To get the security context of our user,…we'll use the id command.…In a terminal, type in "id -Z."…"-Z" is usually used for SELinux.…Our SELinux user is unconfined_u.…Our role for role-based access control is unconfined_r,…and our type for type enforcement is unconfined_t.…
We're using the type enforcement portion of SELinx…for mandatory access control so this last bit…of information is very important to us.…The last section is a security level used…by multi-level and multi-category security.…Now let's take a look at the security context…of a running process using the ps command.…Type in "ps -e" for everything,…"Z" for security context and hit enter.…Using the -eZ options shows all processes…and their security contexts.…
Pay special attention to the type portion…of the security context.…Files also have a security context as they are objects.…Get the security context of files…in your home directory by typing in "ls -lZ."…
Author
Released
8/31/2017Instructor Grant McWilliams covers network and internet services administration, kernel management, and intrusion prevention. He shows how to make your systems more efficient with virtualization, manage users and groups, and lock everything down with SELinux mandatory access control. Plus, get access to 25 PDF "cheat sheets" and 100 practice questions so you can solidify and test your knowledge.
- Installing Linux on a physical machine
- Managing systemd services
- Managing reoccurring jobs with cron
- Limiting system access
- Configuring networking
- Creating, editing, and moving files and directories
- Analyzing text with grep and regular expressions
- Installing software and packages
- Managing the kernel
- Managing users, accounts, and groups
- Setting permissions
- Using access control lists
- Securing Linux with SELinux
- Accessing Linux remotely
- Configuring local storage
Skill Level Intermediate
Duration
Views
Related Courses
-
Setting Up a Red Hat Enterprise Linux Server
with Sandra Toner2h 46m Intermediate -
Linux: Desktops and Remote Access
with Grant McWilliams1h 44m Intermediate
-
Introduction
-
Welcome57s
-
What you should know3m 45s
-
About Red Hat Certifications2m 52s
-
-
1. Deploy Systems
-
Managing virtual machines6m 42s
-
2. System Config and Services
-
Get systemd service status3m 56s
-
Manage systemd services2m 33s
-
Configure networking3m 52s
-
Manage one-time jobs with at4m 16s
-
3. Essential Tools
-
Archive files using tar4m 40s
-
Compress files and archives4m 14s
-
Create files and directories5m 18s
-
Copy files and directories5m 48s
-
Move files and directories4m 59s
-
Create hard and soft links4m 55s
-
Introduction to vim3m 33s
-
Editing text with vim2m 45s
-
Reading the system journal3m 26s
-
4. Manage System Software
-
Query with RPM7m 14s
-
RPM query formatting6m 5s
-
Overview of yum2m 20s
-
Get info on package groups5m 15s
-
Search for packages1m 47s
-
Install and remove packages6m 59s
-
Manage OS updates6m 48s
-
Update the kernel4m 29s
-
Manage kernel modules5m 18s
-
5. Users and Accounts
-
Modify local user accounts4m 57s
-
6. File Access Control
-
File and directory modes1m 19s
-
Read access control lists3m 36s
-
Set access control lists5m 49s
-
Delete access control Lists4m 15s
-
-
7. Manage Security
-
Manage firewalls3m 15s
-
8. Accessing Linux Remotely
-
Configure Secure Shell2m 36s
-
-
9. Configure Local Storage
-
Conclusion
-
Next steps1m 20s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: List and identify SELinux file and process context