In SSSD there is a new feature which writes SSSD config files into /etc/selinux/<policy>/logins/ for SELinux PAM module which then uses this information to set correct context for remote user logging in. I'd like to ask for update of SELinux policy so SSSD can write into this directory. I've set permissive mode on my machine, tried to log in several times and these are the rules that audit2allow returned: allow sssd_t selinux_config_t:dir { write remove_name add_name }; allow sssd_t selinux_config_t:file { write rename create unlink }; Please note that we don't write directly to final config files but we rather use mkstemp-style temporary files which are then renamed to the final name.
There is one mistake in my initial description. SSSD of course writes SELinux config files into /etc/selinux/<policy>/logins/, not SSSD config files.
We need a new label for the logins directory and then allowd sssd to write there.
How about selinux_login_conf_t?
Fine.
I have just added fixes. It is going to be in today's build.
(In reply to comment #5) > I have just added fixes. It is going to be in today's build. Miroslav, can you please back port the changes to Fedora 17, too?