`
hongbochen1223
  • 浏览: 44053 次
文章分类
社区版块
存档分类
最新评论

The role of Roles

 
阅读更多

SELinux也提供了可一种基于角色的访问控制(RBAC,Role-based access control)。SELinux的RBAC的特征是建立在TE基础上的。在SELinux中的访问控制在根本上是TE,即类型强制访问策略。角色能够限制一个进程转换后的类型,该类型是在进程安全上下文中基于角色标识符转换的。通过这种方式,一个策略定义者能够创建一个角色,该角色被允许转换成一系列的域类型(假设TE规则允许这种转换),因此来定义角色的限制。同样,使用我们在图表2-5中的密码程序的例子。虽然根据类型强制访问策略规则,密码程序被允许从user_t的域类型转换成新的passwd_t域,joe的角色也一定被允许该转换的发生。为了能够阐述清楚,我们扩展了密码程序的例子。

这里写图片描述

我们已经添加了描述进程的安全上下文的角色部分(user_r)。我们也添加了一个新的规则,role声明:

role user_r type passwd_t

role语句声明了角色标识符,并且将声明的角色和类型联系起来。上一个描述声明了角色user_r(如果它在策略中还没有被声明的话),并且将标识符passwd_t和角色user_r联系起来。该联系意味着passwd_t类型在安全上下文中被允许和角色user_r共存。如果没有这个role声明的话,新的上下文joe:user_r:user_t将不能被创建,并且execve()系统调用也将会失败,即使TE策略允许joe的类型(user_t)所有必要的访问。

一个策略定义者能够定义有约束的角色并且将这些角色和特定的用户联系起来。例如,想象一下,在我们的策略中,我们也创建了一个叫做retricted_user_r角色,在所有方面和user_r是一样的,除了他没有和passwd_t类型相联系。因此,如果joe的角色是restricted_user_r而不是user_r,joe将不能运行密码程序
即使TE规则允许该域标识的访问。

在第六章中,”角色和用户”详细的讨论了在SELinux中角色的意义,特别指出了角色是如何被创建的,并且又是如何和用户相联系的。

<script type="text/javascript"> $(function () { $('pre.prettyprint code').each(function () { var lines = $(this).text().split('\n').length; var $numbering = $('<ul/>').addClass('pre-numbering').hide(); $(this).addClass('has-numbering').parent().append($numbering); for (i = 1; i <= lines; i++) { $numbering.append($('<li/>').text(i)); }; $numbering.fadeIn(1700); }); }); </script>

版权声明:本文为博主原创文章,未经博主允许不得转载。

分享到:
评论

相关推荐

    The internet of things

    One chapter discusses smart airports and highlights the role of IoT integration. It explains how mobile devices, mobile technology, wearables, RFID sensors, and beacons work together as the core ...

    The ARBAC97 Model for Role-Based Administration of Roles

    George Mason University. 业界供人最全面的RGAC模型,RBAC97模型的原始发表论文。最权威的解释资料。

    Role-basedAccess Control by RAVl S. SANDHU

    The basic concept of role-based access control (RBAC) is that permissions are associated with roles, and users are made members of appropriate roles, thereby acquiring the roles’ permissions....

    The role of interleukin-13 in infectious diseases and allergy

    The role of interleukin-13 in infectious diseases and allergy ...on and emerging models of the biological roles of the double-edged sword interleukin-13 (IL-13), which have been principally

    Different Roles of Top-down and Bottom-up Controls in a Bargaining Game Uncovered by Time-varying Granger Causality

    在讨价还价游戏中大脑从上到下和至下而上的控制发挥了不同的作用,罗强,,大脑网络的时变特性又其生物物理可塑特性决定,但是在有效连接的分析中还没有得到足够的重视.特别地,常用的格兰杰因果分析在时变网

    基于角色权限的管理系统的外文文献

    the strengths of role-based access control and trustmanagement systems and is especially suitable for attributebased access control. Using a few simple credential forms, RT provides localized ...

    a project model for the FreeBSD Project.7z

    After providing definitions of terms used, this document will outline the organisational structure (including role descriptions and communication lines), discuss the methodology model and after ...

    IT as a Service (ITaaS) Framework-Cisco(2018).epub

    From there, the success of the ITaaS framework will hinge on the successful introduction of Service Roles such as Service Owners, Service Executives, and more taken up by professionals across the IT ...

    Object-Role.Modeling.Fundamentals.A.Practical.Guide.to.Data.Modeling.with.ORM

    Object-Role Modeling (ORM) is a fact-based approach to data modeling that expresses the information requirements of any business domain simply in terms of objects that play roles in relationships....

    Oracle Security

    The Composition of the Views Chapter 5 Oracle Default Roles and User Accounts About the Defaults The CONNECT Role The RESOURCE Role The DBA Role The SYSDBA and SYSOPER Roles Using the Default ...

    Software Development From A to Z

    we discussed different ideas and we’ve seen how ...important role during the course of this book. In the next chapter, we will talk about the roles whose hats we are going to wear throughout this book

    Uipath Orchestrator组件本地部署全步骤.zip

    this is part of the Web Server (IIS) role and is automatically enabled by the provided InstallRolesAndFeatures.ps1script, which can be found in this archive. URL Rewrite - Enables the website to ...

    Introduction.to.DevOps.with.Chocolate.LEGO.and.Scrum.Game

    Working with LEGO and chocolate, using avatars, personas, and role cards, you will gain an understanding of the Dev and Ops roles as well as their interdependencies. Throughout the game, players go ...

    Electrical and Electronic Technology, 11ed, 2012.pdf

    intellectually, whatever the particular role chosen. There are exciting roles for every personality, both for men and women, in manufacturing, produc- tion, design, R&D, teaching, management...the ...

    Air and Spaceborne Radar Systems: An Introduction

    The book examines radar's role within the system when carrying out is assigned missions, showing the possibilities of radar as well as its limitations. Finally, given the changing operational ...

    微软内部资料-SQL性能优化5

    The only source of any storage location information is the sysindexes table, which keeps track of the address of the root page for every index, and the first IAM page for the index or table....

    Learning.Node.js.for..NET.Developers.epub

    This gives him an excellent all-round view of the role of a technical lead and its relationship with other roles as well as insight into every stage of project delivery, from initial analysis to long...

    Authorization in ASP.Net MVC using XML Configuration.

    side your compiled code, I have always preferred simple abstraction either using roles and their corresponding mappings in the database or using simple xml file to store action to role mappings. ...

    Org.Design.for.Design.Orgs.epub

    Why design’s role has evolved in the digital age How to infuse design into every product and service experience The 12 qualities of effective design organizations How to structure your design team ...

    tomcat-user

    &lt;!-- Licensed to the Apache Software Foundation (ASF) under one or more contributor license agreements.... &lt;user username="role1" password="tomcat" roles="role1"/&gt; --&gt; &lt;/tomcat-users&gt;

Global site tag (gtag.js) - Google Analytics