Product SiteDocumentation Site

15.4. Troubleshooting SELinux Login Problems

SELinux maps only work for remote users, not for users with a local account.
When a remote user logs in, authenticating against the FreeIPA server, then the PAM SElinux modules create a file for that user in /etc/selinux/policy_name/logins/login.
If that file does not exist, then it means that SSSD is not properly configured to use the FreeIPA server as one of its identity providers. This is required for SELinux mapping to work. Configuring SSSD is covered in the Red Hat 6 Deployment Guide.
If the file exists but the remote user was given the wrong SELinux context, then the pam_selinux module may not be properly configured in the PAM stack. This is the module that reads the SELinux information and sets the user context. If the module is missing, then nothing processes the SELinux map and the user is defined a default context on the system.