Index: sepgsql/doc/src/sgml/security.sgml
===================================================================
*** sepgsql/doc/src/sgml/security.sgml	(revision 1467)
--- sepgsql/doc/src/sgml/security.sgml	(working copy)
***************
*** 684,692 ****
         From this, the client can infer the existence of the invisible foreign
         key, an inference to which he is not entitled.
  
! 	   As a practical matter, this scenario can sometimes be avoided by using
! 	   non-natural primary and foreign keys, such as UUIDs.  This may make it
! 	   impossible to infer any meaningful data.
       </para>
     </sect2>
  </sect1>
--- 684,692 ----
         From this, the client can infer the existence of the invisible foreign
         key, an inference to which he is not entitled.
  
!        As a practical matter, this scenario can sometimes be avoided by using
!        non-natural primary and foreign keys, such as UUIDs.  This may make it
!        impossible to infer any meaningful data.
       </para>
     </sect2>
  </sect1>
***************
*** 702,729 ****
  	 We need the following packages to build and install
  	 SE-PostgreSQL properly. Please check it at first.
         </para>
!        <itemizedlist>
! 	 <listitem>
! 	   <para>
! 	     Linux kernel (2.6.23, or later)
! 	   </para>
! 	 </listitem>
! 	 <listitem>
! 	   <para>
! 	     libselinux and libselinux-devel (2.0.43, or later)
! 	   </para>
! 	 </listitem>
! 	 <listitem>
! 	   <para>
! 	     selinux-policy (3.4.2, or later)
! 	   </para>
! 	 </listitem>
! 	 <listitem>
! 	   <para>
! 	     policycoreutils (2.0.16, or later)
! 	   </para>
! 	 </listitem>
!        </itemizedlist>
       </sect3>
  
       <sect3>
--- 702,796 ----
  	 We need the following packages to build and install
  	 SE-PostgreSQL properly. Please check it at first.
         </para>
! 
!        <variablelist>
! 	 <varlistentry>
! 	   <term><literal>Linux kernel</literal></term>
! 	   <listitem>
! 	     <para>
! 	       Linux kernel has to support SELinux feature, at least.
! 	       In addition, it is necessary to provide an interface to
! 	       obtain a list of supported object classes and permissions
! 	       via <filename>/selinux/class</filename>, which is available
! 	       on the Linux kernel 2.6.23 or later.
! 	     </para>
! 	   </listitem>
! 	 </varlistentry>
! 
! 	 <varlistentry>
! 	   <term><literal>Security policy</literal></term>
! 	   <listitem>
! 	     <para>
! 	       The security policy of SELinux is neccesary to contain access
! 	       control rules related to database objects.
! 	       The recent upstreamed security policy already has a set of
! 	       rules for SE-PostgreSQL, as a part of policy for PostgreSQL.
! 	     </para>
! 	     <para>
! 	       In <literal>Red Hat EL</literal> or <literal>Fedora</literal>,
! 	       check the version number of <literal>selinux-policy</literal>
! 	       rpm package is <literal>3.4.2</literal>, or later.
! 	     </para>
! 	   </listitem>
! 	 </varlistentry>
! 
! 	 <varlistentry>
! 	   <term><literal>libselinux</literal></term>
! 	   <listitem>
! 	     <para>
! 	       <literal>libselinux</literal> is a library to communicate
! 	       between applications and in-kernel SELinux, so it provides
! 	       us various kind of APIs and header definitions.
! 	       It is necessary to provide header definitions of object
! 	       classes and permissions related to database. Rest of
! 	       requirements are already included in older version.
! 	     </para>
! 	     <para>
! 	       In <literal>Red Hat EL</literal> or <literal>Fedora</literal>,
! 	       check the version number of <literal>libselinux</literal>
! 	       and <literal>libselinux-devel</literal> rpm packages are
! 	       <literal>2.0.46</literal>, or later.
! 	     </para>
! 	   </listitem>
! 	 </varlistentry>
! 
! 	 <varlistentry>
! 	   <term><command>checkmodule</command></term>
! 	   <listitem>
! 	     <para>
! 	       The <command>checkmodule</command> is a policy compiler for
! 	       a modular policy package, such as
! 	       <literal>sepostgresql-devel.pp</literal> we provided.
! 	     </para>
! 	   </listitem>
! 	 </varlistentry>
! 
! 	 <varlistentry>
! 	   <term><command>semodule</command></term>
! 	   <listitem>
! 	     <para>
! 	       The <command>semodule</command> is a command to manage
! 	       modular policy packages. It enables to link/unlink,
! 	       upgrade or load/unload modular policy packages, such as
! 	       <literal>sepostgresql-devel.pp</literal> we provided.
! 	     </para>
! 	   </listitem>
! 	 </varlistentry>
! 
! 	 <varlistentry>
! 	   <term><command>restorecon</command></term>
! 	   <listitem>
! 	     <para>
! 	       The <command>restorecon</command> enables to assign
! 	       correct security context for files, directories and
! 	       any other objects on filesystem, based on the security
! 	       policy configuration.
! 	       It helps to assign correct security context on
! 	       installed files by hand.
! 	     </para>
! 	   </listitem>
! 	 </varlistentry>
!        </variablelist>
       </sect3>
  
       <sect3>
***************
*** 740,749 ****
  <prompt>$ </prompt><userinput>make -C src/backend/security/sepgsql/policy</userinput>
  </screen>
         <para>
! 	 The current default security policy of SELinux contains a set of
! 	 rules for SE-PostgreSQL on <literal>selinux-policy-3.4.2</literal>
! 	 or later. So, we don't need to install special purpose security
! 	 policy module now.
         </para>
         <para>
  	 However, SE-PostgreSQL also provides an optinal policy module
--- 807,815 ----
  <prompt>$ </prompt><userinput>make -C src/backend/security/sepgsql/policy</userinput>
  </screen>
         <para>
! 	 Please note that the recent upstreamed security policy of SELinux
! 	 contains a set of rules for SE-PostgreSQL, so we are not always 
! 	 necessary to build security policy module.
         </para>
         <para>
  	 However, SE-PostgreSQL also provides an optinal policy module
***************
*** 914,922 ****
         </para>
  
         <para>
! 	 This section introduces the steps to set up labeled ipsec.
! 
! 	 For more detailed information, visit <ulink url="http://www.redhat.com/docs/manuals/enterprise/RHEL-4-Manual/en-US/Security_Guide/s1-vpn-ipsec.html">Red Hat Enterprise Linux 4 - Security Guide</ulink>
         </para>
  
         <sect4>
--- 980,989 ----
         </para>
  
         <para>
! 	 This section introduces the steps to set up labeled ipsec,
! 	 but it is necessity minimum configuration, so we recommend
! 	 you to refer external technical documents related to ipsec
! 	 for more details.
         </para>
  
         <sect4>
Index: sepgsql/doc/src/sgml/user-manag.sgml
===================================================================
*** sepgsql/doc/src/sgml/user-manag.sgml	(revision 1467)
--- sepgsql/doc/src/sgml/user-manag.sgml	(working copy)
***************
*** 29,34 ****
--- 29,40 ----
    <xref linkend="ddl">.
   </para>
  
+  <para>
+   PostgreSQL has an enhancement of database roles and privileges mechanism
+   which allows to set database ACLs in row-level granuality.
+   See, <xref linkend="security-row-level-acl"> for more details.
+  </para>
+ 
   <sect1 id="database-roles">
    <title>Database Roles</title>
  
Index: sepgsql/doc/src/sgml/config.sgml
===================================================================
*** sepgsql/doc/src/sgml/config.sgml	(revision 1467)
--- sepgsql/doc/src/sgml/config.sgml	(working copy)
***************
*** 750,756 ****
          specified mode, independent from kernel setting. Please note
          that those configuration requires in-kernel SELinux is not
          disabled. The <literal>disabled</literal> disables SE-PostgreSQL.
! 	This parameter can only be set at server start.
         </para>
        </listitem>
       </varlistentry>
--- 750,758 ----
          specified mode, independent from kernel setting. Please note
          that those configuration requires in-kernel SELinux is not
          disabled. The <literal>disabled</literal> disables SE-PostgreSQL.
! 	This parameter is available on a binary with SELinux support
! 	(<literal>--enable-selinux</literal>), and can only be set at
! 	server start.
         </para>
        </listitem>
       </varlistentry>
***************
*** 770,776 ****
  	  for saving storage consumption.
  	  The default is <literal>on</literal> which means row-level access
  	  controls are available.
! 	  This parameter can only be set at server start.
  	 </para>
         </listitem>
       </varlistentry>
--- 772,780 ----
  	  for saving storage consumption.
  	  The default is <literal>on</literal> which means row-level access
  	  controls are available.
! 	  This parameter is available on a binary with SELinux support
! 	  (<literal>--enable-selinux</literal>), and can only be set at
! 	  server start.
  	 </para>
         </listitem>
       </varlistentry>
