When we log in to a SELinux-enabled system, we are assigned a default context to work in. This context contains a SELinux user, a SELinux role, a domain, and optionally, a sensitivity range.
In this chapter, we will:
We will end the chapter by learning how SELinux integrates with the Linux authentication process.
Once logged in to a system, our user will run inside a certain context. This user context ...