Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(497)

Side by Side Diff: chrome/app/policy/policy_templates.json

Issue 10825149: [Chromoting] Add new Chromoting enterprise policies (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: #def -> const char[] Created 8 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 { 1 {
2 # policy_templates.json - Metafile for policy templates 2 # policy_templates.json - Metafile for policy templates
3 # 3 #
4 # The content of this file is evaluated as a Python expression. 4 # The content of this file is evaluated as a Python expression.
5 # 5 #
6 # This file is used as input to generate the following policy templates: 6 # This file is used as input to generate the following policy templates:
7 # ADM, ADMX+ADML, MCX/plist and html documentation. 7 # ADM, ADMX+ADML, MCX/plist and html documentation.
8 # 8 #
9 # Policy templates are user interface definitions or documents about the 9 # Policy templates are user interface definitions or documents about the
10 # policies that can be used to configure Chrome. Each policy is a name-value 10 # policies that can be used to configure Chrome. Each policy is a name-value
(...skipping 94 matching lines...) Expand 10 before | Expand all | Expand 10 after
105 # templates and documentation. The policy definition list that Chrome sees 105 # templates and documentation. The policy definition list that Chrome sees
106 # will include policies marked with 'future'. If a WIP policy isn't meant to 106 # will include policies marked with 'future'. If a WIP policy isn't meant to
107 # be seen by the policy providers either, the 'supported_on' key should be set 107 # be seen by the policy providers either, the 'supported_on' key should be set
108 # to an empty list. 108 # to an empty list.
109 # 109 #
110 # IDs: 110 # IDs:
111 # Since a Protocol Buffer definition is generated from this file, unique and 111 # Since a Protocol Buffer definition is generated from this file, unique and
112 # persistent IDs for all fields (but not for groups!) are needed. These are 112 # persistent IDs for all fields (but not for groups!) are needed. These are
113 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, 113 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs,
114 # because doing so would break the deployed wire format! 114 # because doing so would break the deployed wire format!
115 # For your editing convenience: highest ID currently used: 153 115 # For your editing convenience: highest ID currently used: 156
116 # 116 #
117 # Placeholders: 117 # Placeholders:
118 # The following placeholder strings are automatically substituted: 118 # The following placeholder strings are automatically substituted:
119 # $1 -> Google Chrome / Chromium 119 # $1 -> Google Chrome / Chromium
120 # $2 -> Google Chrome OS / Chromium OS 120 # $2 -> Google Chrome OS / Chromium OS
121 # $3 -> Google Chrome Frame / Chromium Frame 121 # $3 -> Google Chrome Frame / Chromium Frame
122 # $6 is reserved for doc_writer 122 # $6 is reserved for doc_writer
123 # 123 #
124 # Device Policy: 124 # Device Policy:
125 # An additional flag device_only (optional, defaults to False) indicates 125 # An additional flag device_only (optional, defaults to False) indicates
(...skipping 321 matching lines...) Expand 10 before | Expand all | Expand 10 after
447 'id': 95, 447 'id': 95,
448 'caption': '''Enable firewall traversal from remote access host''', 448 'caption': '''Enable firewall traversal from remote access host''',
449 'desc': '''Enables usage of STUN and relay servers when remote clients are trying to establish a connection to this machine. 449 'desc': '''Enables usage of STUN and relay servers when remote clients are trying to establish a connection to this machine.
450 450
451 If this setting is enabled, then remote clients can discover and conne ct to this machines even if they are separated by a firewall. 451 If this setting is enabled, then remote clients can discover and conne ct to this machines even if they are separated by a firewall.
452 452
453 If this setting is disabled and outgoing UDP connections are filtered by the firewall, then this machine will only allow connections from client machi nes within the local network. 453 If this setting is disabled and outgoing UDP connections are filtered by the firewall, then this machine will only allow connections from client machi nes within the local network.
454 454
455 If this policy is left not set the setting will be enabled.''', 455 If this policy is left not set the setting will be enabled.''',
456 }, 456 },
457 {
458 'name': 'RemoteAccessHostDomain',
459 'type': 'string',
460 'schema': { 'type': 'string' },
461 'supported_on': ['chrome.*:22-', 'chrome_os:0.22-'],
462 'features': {'dynamic_refresh': True},
463 'example_value': 'my-awesome-domain.com',
464 'id': 154,
465 'caption': '''Configure the required host domain name''',
466 'desc': '''Configures the required host domain name and prevents users from changing it.
467
468 If this setting is enabled, then hosts can be shared only using accoun ts registered on the specified domain name.
469
470 If this setting is disabled or not set, then hosts can be shared using any account.''',
471 },
472 {
473 'name': 'RemoteAccessHostRequireTwoFactor',
474 'type': 'main',
475 'schema': { 'type': 'boolean' },
476 'supported_on': ['chrome.*:22-', 'chrome_os:0.22-'],
477 'features': {'dynamic_refresh': True},
478 'example_value': False,
479 'id': 155,
480 'caption': '''Enable two-factor authentication on host''',
481 'desc': '''Enables two-factor authentication on the host instead of a user-specified PIN.
482
483 If this setting is enabled, then users must provide a valid two-factor code when accessing the host.
484
485 If this setting is disabled or not set, then two-factor will not be en abled and the default behavior of having a user-defined PIN will be used.''',
486 },
487 {
488 'name': 'RemoteAccessHostTalkGadgetPrefix',
489 'type': 'string',
490 'schema': { 'type': 'string' },
491 'supported_on': ['chrome.*:22-', 'chrome_os:0.22-'],
492 'features': {'dynamic_refresh': True},
493 'example_value': 'chromoting-host',
494 'id': 156,
495 'caption': '''Configure the TalkGadget prefix for hosts''',
496 'desc': '''Configures the host TalkGadget prefix and prevents users fr om changing it.
497
498 If specified, this prefix is prepended to the base TalkGadget name to create a full domain name for the TalkGadget. The base TalkGadget domain name is '.talkgadget.google.com'.
499
500 If this setting is enabled, then hosts will use the custom domain name when accessing the TalkGadget instead of the default domain name.
501
502 If this setting is disabled or not set, then the default TalkGadget do main name ('chromoting-host.talkgadget.google.com') will be used.
503
504 Remote access clients are not affected by this policy setting. They wi ll always use 'chromoting-client.talkgadget.google.com' to access the TalkGadget .''',
505 },
457 ], 506 ],
458 }, 507 },
459 { 508 {
460 'name': 'PrintingEnabled', 509 'name': 'PrintingEnabled',
461 'type': 'main', 510 'type': 'main',
462 'schema': { 'type': 'boolean' }, 511 'schema': { 'type': 'boolean' },
463 'supported_on': ['chrome.*:8-', 'chrome_os:0.11-'], 512 'supported_on': ['chrome.*:8-', 'chrome_os:0.11-'],
464 'features': {'dynamic_refresh': True}, 513 'features': {'dynamic_refresh': True},
465 'example_value': True, 514 'example_value': True,
466 'id': 12, 515 'id': 12,
(...skipping 2724 matching lines...) Expand 10 before | Expand all | Expand 10 after
3191 'desc': '''Text appended in parentheses to the policy name to indicate tha t it has been deprecated''', 3240 'desc': '''Text appended in parentheses to the policy name to indicate tha t it has been deprecated''',
3192 'text': 'deprecated', 3241 'text': 'deprecated',
3193 }, 3242 },
3194 'doc_recommended': { 3243 'doc_recommended': {
3195 'desc': '''Text appended in parentheses next to the policies top-level con tainer to indicate that those policies are of the Recommended level''', 3244 'desc': '''Text appended in parentheses next to the policies top-level con tainer to indicate that those policies are of the Recommended level''',
3196 'text': 'Recommended', 3245 'text': 'Recommended',
3197 }, 3246 },
3198 }, 3247 },
3199 'placeholders': [], 3248 'placeholders': [],
3200 } 3249 }
OLDNEW
« no previous file with comments | « no previous file | chrome/browser/policy/configuration_policy_handler_list.cc » ('j') | chrome/test/functional/policy_test_cases.py » ('J')

Powered by Google App Engine
This is Rietveld 408576698