<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://www.rsbac.org/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://www.rsbac.org/feed.php">
        <title>RSBAC: Extending Linux Security Beyond the Limits documentation:rsbac_handbook</title>
        <description></description>
        <link>https://www.rsbac.org/</link>
        <image rdf:resource="https://www.rsbac.org/lib/tpl/rsbac/images/favicon.ico" />
       <dc:date>2026-05-12T20:57:44+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://www.rsbac.org/documentation/rsbac_handbook/appendixes?rev=1153494871&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.rsbac.org/documentation/rsbac_handbook/architecture_implementation?rev=1158675271&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.rsbac.org/documentation/rsbac_handbook/configuration_basics?rev=1267203186&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.rsbac.org/documentation/rsbac_handbook/first_boot?rev=1146577225&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.rsbac.org/documentation/rsbac_handbook/installation?rev=1193756731&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.rsbac.org/documentation/rsbac_handbook/introduction?rev=1167869129&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.rsbac.org/documentation/rsbac_handbook/maintenance?rev=1170950532&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.rsbac.org/documentation/rsbac_handbook/preface?rev=1150124415&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.rsbac.org/documentation/rsbac_handbook/security_models?rev=1392283550&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.rsbac.org/documentation/rsbac_handbook/user_management?rev=1232007465&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://www.rsbac.org/lib/tpl/rsbac/images/favicon.ico">
        <title>RSBAC: Extending Linux Security Beyond the Limits</title>
        <link>https://www.rsbac.org/</link>
        <url>https://www.rsbac.org/lib/tpl/rsbac/images/favicon.ico</url>
    </image>
    <item rdf:about="https://www.rsbac.org/documentation/rsbac_handbook/appendixes?rev=1153494871&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2006-07-21T15:14:31+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>documentation:rsbac_handbook:appendixes</title>
        <link>https://www.rsbac.org/documentation/rsbac_handbook/appendixes?rev=1153494871&amp;do=diff</link>
        <description>Appendixes

	*  RSBAC Reference
			*  Kernel Boot Parameters
			*  proc Interface
			*  Targets and Requests
			*  Error Codes

		*  RSBAC Benchmarks
		*  CCPL License</description>
    </item>
    <item rdf:about="https://www.rsbac.org/documentation/rsbac_handbook/architecture_implementation?rev=1158675271&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2006-09-19T14:14:31+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>documentation:rsbac_handbook:architecture_implementation</title>
        <link>https://www.rsbac.org/documentation/rsbac_handbook/architecture_implementation?rev=1158675271&amp;do=diff</link>
        <description>Architecture and Implementation

The RSBAC system architecture has been derived and extended from the Generalized Framework for Access Control (GFAC).

In his essay Rule Set Modeling of a Trusted Computer System, Leonard LaPadula describes how this Generalized Framework for Access Control (GFAC) approach could be implemented in the Unix System V operating system. He introduced the clear separation between Access Enforcement Facility (AEF), Access Decision Facility (ADF) with Access Control Rules…</description>
    </item>
    <item rdf:about="https://www.rsbac.org/documentation/rsbac_handbook/configuration_basics?rev=1267203186&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2010-02-26T16:53:06+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>documentation:rsbac_handbook:configuration_basics</title>
        <link>https://www.rsbac.org/documentation/rsbac_handbook/configuration_basics?rev=1267203186&amp;do=diff</link>
        <description>Configuration

You should now have a bootable and usable RSBAC system. You are probably able to boot with the rsbac_softmode boot parameter or rsbac_auth_enable_login (see First Boot)

The next step is to understand what needs to be taken care of, i.e.: to be secured on your system.</description>
    </item>
    <item rdf:about="https://www.rsbac.org/documentation/rsbac_handbook/first_boot?rev=1146577225&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2006-05-02T13:40:25+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>documentation:rsbac_handbook:first_boot</title>
        <link>https://www.rsbac.org/documentation/rsbac_handbook/first_boot?rev=1146577225&amp;do=diff</link>
        <description>DEP
PLEASE DELETE ME</description>
    </item>
    <item rdf:about="https://www.rsbac.org/documentation/rsbac_handbook/installation?rev=1193756731&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2007-10-30T15:05:31+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>documentation:rsbac_handbook:installation</title>
        <link>https://www.rsbac.org/documentation/rsbac_handbook/installation?rev=1193756731&amp;do=diff</link>
        <description>Installation

RSBAC installation is pretty straight forward. You do not need to reinstall a complete system, thus, upgrading your Linux system to RSBAC is an easy task.

	*  Installing from packages is the easy way and supported for your Linux distribution.</description>
    </item>
    <item rdf:about="https://www.rsbac.org/documentation/rsbac_handbook/introduction?rev=1167869129&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2007-01-04T00:05:29+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>documentation:rsbac_handbook:introduction</title>
        <link>https://www.rsbac.org/documentation/rsbac_handbook/introduction?rev=1167869129&amp;do=diff</link>
        <description>RSBAC, an introduction

Linux systems, as many others in the Unix family, have a well-known lack of access control. There is a small granularity of discretionary access rights, only dividing between read, write and execute rights for file owner, and file group members.</description>
    </item>
    <item rdf:about="https://www.rsbac.org/documentation/rsbac_handbook/maintenance?rev=1170950532&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2007-02-08T16:02:12+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>documentation:rsbac_handbook:maintenance</title>
        <link>https://www.rsbac.org/documentation/rsbac_handbook/maintenance?rev=1170950532&amp;do=diff</link>
        <description>Maintenance

RSBAC maintenance might get complex when you are installing new packages everyday.
On a secure system, we recommand that you test and evaluate packages, and decide on a reduced set of packages and software that will be the best for you.</description>
    </item>
    <item rdf:about="https://www.rsbac.org/documentation/rsbac_handbook/preface?rev=1150124415&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2006-06-12T15:00:15+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>documentation:rsbac_handbook:preface</title>
        <link>https://www.rsbac.org/documentation/rsbac_handbook/preface?rev=1150124415&amp;do=diff</link>
        <description>RSBAC Handbook Preface

Dear Reader,

This handbook is meant to give you all required information to install and configure RSBAC on your Linux system. It has been written and compiled by volunteers, and we always look for more people to help document this powerful system.</description>
    </item>
    <item rdf:about="https://www.rsbac.org/documentation/rsbac_handbook/security_models?rev=1392283550&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-02-13T09:25:50+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>documentation:rsbac_handbook:security_models</title>
        <link>https://www.rsbac.org/documentation/rsbac_handbook/security_models?rev=1392283550&amp;do=diff</link>
        <description>RSBAC Security Modules

RSBAC is module based. It means every decision module implements a different kind of policy.
If you need MAC, ACL, just User Management, or even writing your own, the choice is yours!

Everything in RSBAC is implemented as a module, with a very flexible and easy to use framework.</description>
    </item>
    <item rdf:about="https://www.rsbac.org/documentation/rsbac_handbook/user_management?rev=1232007465&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2009-01-15T08:17:45+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>documentation:rsbac_handbook:user_management</title>
        <link>https://www.rsbac.org/documentation/rsbac_handbook/user_management?rev=1232007465&amp;do=diff</link>
        <description>User Management (UM)

Unlike all traditional user and group schemes in Linux, the User (and group) Management in RSBAC is completely kernel based. It can be used as a more powerful and much more secure replacement.

Note: This functionality is of course, optional, but recommended. For configuration see</description>
    </item>
</rdf:RDF>
