mirror of
https://gitlab.com/apparmor/apparmor.git
synced 2025-03-04 08:24:42 +01:00
AppArmorUserDefinedPolicy: initial markdown conversion
parent
6f5cde6b51
commit
f47979bbeb
1 changed files with 32 additions and 0 deletions
32
AppArmorUserDefinedPolicy.md
Normal file
32
AppArmorUserDefinedPolicy.md
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
WARNING
|
||||||
|
=======
|
||||||
|
|
||||||
|
This document is a work in progress and requires at a minimum the
|
||||||
|
development version of apparmor 4.x???
|
||||||
|
|
||||||
|
Requirements
|
||||||
|
============
|
||||||
|
|
||||||
|
- AppArmor Kernel module - 4.x??
|
||||||
|
- AppArmor Userspace - 4.x???
|
||||||
|
|
||||||
|
Related Documentation
|
||||||
|
=====================
|
||||||
|
|
||||||
|
- [Stacking profiles in AppArmor](AppArmorStacking)
|
||||||
|
- [AppArmor Policy Namespaces](AppArmorNamespaces)
|
||||||
|
- [Confining Users with Stacking](StackingConfiningUsers)
|
||||||
|
- [Applying system wide restrictions in AppArmor](AppArmorSystemWideRestrictions)
|
||||||
|
- [User defined policy in AppArmor](AppArmorUserDefinedPolicy)
|
||||||
|
- [Programatic application policy in AppArmor](AppArmorProgramaticApplicationPolicy)
|
||||||
|
- [Putting it all together](AppArmorPolicy)
|
||||||
|
|
||||||
|
Introduction
|
||||||
|
============
|
||||||
|
|
||||||
|
The addition of [stacking](AppArmorStacking) to AppArmor and [Policy
|
||||||
|
Namespaces](AppArmorNamespaces) opens up the ability tfor users to
|
||||||
|
define their own policy to restrict the applications they run.
|
||||||
|
|
||||||
|
1. ???
|
||||||
|
======
|
Loading…
Add table
Reference in a new issue