Chapter 4. Setting a custom cryptographic policy by using the crypto-policies RHEL system role