mirror of
https://gitlab.com/apparmor/apparmor.git
synced 2025-03-04 08:24:42 +01:00
AppArmorUserDefinedPolicy: initial markdown conversion
parent
6f5cde6b51
commit
f47979bbeb
1 changed files with 32 additions and 0 deletions
32
AppArmorUserDefinedPolicy.md
Normal file
32
AppArmorUserDefinedPolicy.md
Normal file
|
@ -0,0 +1,32 @@
|
|||
WARNING
|
||||
=======
|
||||
|
||||
This document is a work in progress and requires at a minimum the
|
||||
development version of apparmor 4.x???
|
||||
|
||||
Requirements
|
||||
============
|
||||
|
||||
- AppArmor Kernel module - 4.x??
|
||||
- AppArmor Userspace - 4.x???
|
||||
|
||||
Related Documentation
|
||||
=====================
|
||||
|
||||
- [Stacking profiles in AppArmor](AppArmorStacking)
|
||||
- [AppArmor Policy Namespaces](AppArmorNamespaces)
|
||||
- [Confining Users with Stacking](StackingConfiningUsers)
|
||||
- [Applying system wide restrictions in AppArmor](AppArmorSystemWideRestrictions)
|
||||
- [User defined policy in AppArmor](AppArmorUserDefinedPolicy)
|
||||
- [Programatic application policy in AppArmor](AppArmorProgramaticApplicationPolicy)
|
||||
- [Putting it all together](AppArmorPolicy)
|
||||
|
||||
Introduction
|
||||
============
|
||||
|
||||
The addition of [stacking](AppArmorStacking) to AppArmor and [Policy
|
||||
Namespaces](AppArmorNamespaces) opens up the ability tfor users to
|
||||
define their own policy to restrict the applications they run.
|
||||
|
||||
1. ???
|
||||
======
|
Loading…
Add table
Reference in a new issue