User StatementsuserDeclares an SELinux user identifier in the current namespace.Statement definition:Where:userThe user keyword.user_idThe SELinux user identifier.Example:This will declare an SELinux user as unconfined.user:userroleAssociates a previously declared user identifier with a previously declared role identifier.Statement definition:Where:userroleThe userrole keyword.user_idA previously declared SELinux user identifier.role_idA previously declared role or roleattribute identifier.Example:This example will associate unconfined.user to unconfined.role:userlevelAssociates a previously declared user identifier with a previously declared level identifier. The level may be named or anonymous.Statement definition:Where:userlevelThe userlevel keyword.user_idA previously declared SELinux user identifier.level_idA previously declared level identifier. This may consist of a single sensitivity with zero or more mixed named and anonymous category's as discussed in the level statement.Example:This example will associate unconfined.user with a named level of systemlow:userrangeAssociates a previously declared user identifer with a previously declared levelrange identifier. The levelrange may be named or anonymous.Statement definition:Where:userrangeThe userrange keyword.user_idA previously declared SELinux user identifier.levelrange_idA previously declared levelrange identifier. This may be formed by named or anonymous components as discussed in the levelrange statement and shown in the examples.Example:This example will associate unconfined.user with a named levelrange of low_high, other anonymous examples are also shown:userboundsDefines a hierarchical relationship between users where the child user cannot have more priviledges than the parent.Notes:It is not possible to bind the parent to more than one child.While this is added to the binary policy, it is not enforced by the SELinux kernel services.Statement definition:Where:userboundsThe userbounds keyword.parent_user_idA previously declared SELinux user identifier.child_user_idA previously declared SELinux user identifier.Example:The user test cannot have greater priviledges than unconfined.user:userprefixDeclare a user prefix that will be replaced by the file labeling utilities described at http://selinuxproject.org/page/PolicyStoreConfigurationFiles that details the file_contexts entries.Statement definition:Where:userprefixThe userprefix keyword.user_idA previously declared SELinux user identifier.prefixThe string to be used by the file labeling utilities.Example:This example will associate unconfined.admin user with a prefix of "user":selinuxuserAssociates a GNU/Linux user to a previously declared user identifier with a previously declared MLS userrange. Note that the userrange is required even if the policy is non-MCS/MLS.Statement definition:Where:selinuxuserThe selinuxuser keyword.user_nameA string representing the GNU/Linux user nameuser_idA previously declared SELinux user identifier.userrange_idA previously declared userrange identifier that has been associated to the user identifier. This may be formed by named or anonymous components as discussed in the userrange statement and shown in the examples.Example:This example will associate unconfined.admin user with a GNU / Linux user "admin_1":selinuxuserdefaultDeclares the default SELinux user. Only one selinuxuserdefault statement is allowed in the policy. Note that the userrange identifier is required even if the policy is non-MCS/MLS.Statement definition:Where:selinuxuserdefaultThe selinuxuserdefault keyword.user_idA previously declared SELinux user identifier.userrange_idA previously declared userrange identifier that has been associated to the user identifier. This may be formed by named or anonymous components as discussed in the userrange statement and shown in the examples.Example:This example will define the unconfined.user as the default SELinux user: