
This patch adds an exception for SELinux user confinement since it's not possible to determine admin and non-admin users within the security role itself. Implements: blueprint security-rhel7-stig Change-Id: Ifbcc88c3b8f862bead7710140234678f7287ec09
662 B
662 B
---id: RHEL-07-020090 status: exception - manual intervention tag: auth ---
The tasks in the security role cannot determine the access levels of individual users.
Deployers are strongly encouraged to configure SELinux user
confinement on compatible systems using semanage login
.
Refer to the Confining
Existing Linux Users documentation from Red Hat for detailed
information and command line examples.