semanage-user - Man Page
SELinux Policy Management SELinux User mapping tool
Synopsis
semanage user [-h] [-n] [-N] [-S STORE] [ --add ( -L LEVEL -R ROLES -r RANGE SEUSER) | --delete SEUSER | --deleteall | --extract | --list [-C] | --modify ( -L LEVEL -R ROLES -r RANGE SEUSER ) ]
Description
semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage user controls the mapping between an SELinux User and the roles and MLS/MCS levels.
Options
- -h, --help
Show this help message and exit
- -n, --noheading
Do not print heading when listing the specified object type
- -N, --noreload
Do not reload policy after commit
- -S STORE, --store STORE
Select an alternate SELinux Policy Store to manage
- -C, --locallist
List local customizations
- -a, --add
Add a record of the specified object type
- -d, --delete
Delete a record of the specified object type
- -m, --modify
Modify a record of the specified object type
- -l, --list
List records of the specified object type
- -E, --extract
Extract customizable commands, for use within a transaction
- -D, --deleteall
Remove all local customizations
- -L LEVEL, --level LEVEL
Default SELinux Level for SELinux user, s0 Default. (MLS/MCS Systems only)
- -r RANGE, --range RANGE
MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0.
- -R [ROLES], --roles [ROLES]
SELinux Roles. You must enclose multiple roles within quotes, separate by spaces. Or specify -R multiple times.
Example
List SELinux users # semanage user -l Modify groups for staff_u user # semanage user -m -R "system_r unconfined_r staff_r" staff_u Assign user topsecret_u role staff_r and range s0-TopSecret # semanage user -a -R "staff_r" -rs0-TopSecret topsecret_u
See Also
Author
This man page was written by Daniel Walsh <dwalsh@redhat.com>
Referenced By
semanage(8), semanage-login(8).