Information
This change creates an at.allow file with a root user entry and removes the at.deny file, if it exists.
This ensures that only the root user has the ability to schedule jobs through the at command. A hacker may exploit use of at to execute programs or processes automatically. Limiting access to the root account only reduces this risk.
Solution
Create the /var/adm/cron/at.allow file and remove /var/adm/cron/at.deny (if it exists):
echo "root" > /var/adm/cron/at.allow
rm /var/adm/cron/at.deny