Create security policy files using the programming language to:

  • Control the tasks a user or group of users may perform
  • Control the systems from which a task may be submitted
  • Control the systems from which a task may be run
  • Determine when a specific task may be run (day and time)
  • Determine where a task may be run from
  • Determine if secondary security checks, such as passwords or checksums, are required to run a task
  • Determine if one or more supplemental security programs are run before a task is started

This guide assumes that you have a basic understanding of Unix or Linux system administration and some experience with a scripting or other computer language. We recommend that you have experience in these areas before you attempt to create or modify security policy files.

Specific font and line spacing conventions are used to ensure readability and to highlight important information, such as commands, syntax, and examples.