
If requests to add hats appear, proceed to
Chapter 5, Profiling Your Web Appli-
cations Using ChangeHat
(page 75).
The questions fall into two categories:
• A resource is requested by a profiled program that is not in the profile (see
Figure 3.1, “Learning Mode Exception: Controlling Access to Specific Re-
sources”
(page 28)). Allow or deny access to a specific resource.
• A program is executed by the profiled program and the security domain
transition has not been defined (see
Figure 3.2, “Learning Mode Exception:
Defining Execute Permissions for an Entry”
(page 28)). Define execute
permissions for an entry.
Each of these cases results in a series of questions that you must answer to add
the resource to the profile or to add the program into the profile. The following
two figures show an example of each case. Subsequent steps describe your options
in answering these questions.
NOTE: Varying Processing Options
Not all of the options introduced below are always present. The options
displayed depend on the type of entry processed.
Building and Managing Profiles With YaST
27