Novell APPARMOR Admin Manual page 82

Hide thumbs Also See for APPARMOR:
Table of Contents

Advertisement

U s e r ' s G u i d e
7. In our demo, Logprof first prompts us with Add Requested Hat or
Use Default Hat because it noticed that a URI was accessed php-
sysinfo-dev. Select Add Requested Hat.
8. Click the Allow button. Choosing Add Requested Hat in the previ-
ous step creates a new hat in the profile and specifies that subse-
q u e n t q u e s t i o n s a b o u t t h e s c r i p t ' s a c t i o n s w i l l b e a d d e d t o t h e n e w l y
created hat rather than the default hat for this application.
In the next screen, Novell AppArmor displays an external program
that the script executed. You can specify that the program should
run confined by the phpsysinfo-dev hat [Inherit], confined by a
separate profile [Profile], or that it should run unconfined or without
any security profile [Unconfined]. For the case of the Profile option,
a new profile will be created for the program if one does not already
exist.
82

Advertisement

Table of Contents
loading

Table of Contents