Multilevel Security with Red Hat Enterprise Linux and SELinux - Part 8, Using SSH
In part eight of the MLS series, Dave Egts shows how to use ssh with MLS, including how to configure users with sensitivities and categories within an ssh session.
Additional videos in the series:
Part 1, Background
Part 2, MLS with RHEL 6
Part 3, Basic Setup
Part 4, Separating System and Security Admin Roles
Part 5, Mapping Sensitivities and Categories to Mission-Specific Names
Part 6, Optionally Relaxing Security
Part 7, Adding an MLS User
Part 8, Using SSH
Part 9, MLS on RHEL 6 in Action
Comments