Chapter 9. Setting a custom cryptographic policy by using the crypto-policies RHEL system role