Next:
Introduction
Up:
A Security Policy Configuration
Previous:
A Security Policy Configuration
Contents
Contents
Introduction
Overview
TE Configuration
Global Macros
Type Attributes
General Types
Domains
Assertions
RBAC Configuration
Macros
Roles
User Configuration
Constraints Configuration
Security Context Configuration
Initial SID Contexts
File System Contexts
Network Contexts
File Contexts
Extensions for Installing
Bibliography