ProductsDesktop Server For Scientific Computing For IBM POWER For IBM System z For SAP Business Applications Red Hat Network Satellite ManagementExtended Update Support High Availability High Performance Network Load Balancer Resilient Storage Scalable File System Smart Management Extended Lifecycle SupportDeveloper Studio Portfolio Edition Web Framework Kit Application Platform Web Server Data Grid Portal Platform Red Hat JBoss A-MQ Red Hat JBoss Fuse SOA Platform Business Rules Management System (BRMS) Data Services Platform Messaging JBoss Operations Network JBoss Community or JBoss enterprise
SolutionsApplication development Business process management Enterprise application integration Interoperability Operational efficiency Security VirtualizationSolaris to Red Hat Enterprise Linux Migration overview Migrate from your UNIX platform How to migrate to Red Hat Enterprise Linux Upgrade to the latest Red Hat Enterprise Linux release JBoss Enterprise Middleware Benefits of migrating to Red Hat Enterprise Linux Migration services Start a conversation with Red Hat
TrainingPopular and new courses Red Hat JBoss Administration curriculum Core System Administration curriculum JBoss Middleware Development curriculum Advanced System Administration curriculum Linux Development curriculum Cloud Computing, Virtualization, and Storage curriculum
ConsultingBusiness Process Management Cloud and Virtualization Custom Software Development Enterprise Data and Storage Systems Management Migrations
Security: Access control
Control use of systems and data
Security support and updates
Granting access to a resource is contingent on authenticating the user requesting the access and determining whether they are authorized to make the kind of access that they are requesting.
SELinux and MAC
Some operating systems rely on password protection, course-grained permissions, or ad hoc application controls to implement access control. Red Hat® Enterprise Linux® offers Security-Enhanced Linux (SELinux), a revolutionary and more powerful approach, built directly into the Linux kernel. SELinux provides mandatory access control (MAC), a security feature crucial for a trusted operating system. And Red Hat Enterprise Linux 4 and 5 have both received Common Criteria validation as such.
JBoss Enterprise Data Services Platform
JBoss® Enterprise Data Services Platform provides operations that are consistent with the datacenter-wide view of identity and authentication. This lets applications apply fine-grained access controls directly to information processing business logic.
SELinux: A strong access control architecture incorporated into the Linux kernel
JBoss Enterprise Business Rules Management System (BRMS) Platform: Business policy and rules development, access, and change management