Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(161)

Side by Side Diff: chromeos/docs/onc_spec.html

Issue 12255005: Adding rule frames to the ONC spec. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 7 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « chromeos/docs/onc_spec.css ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 <!DOCTYPE html> 1 <!DOCTYPE html>
2 <html> 2 <html>
3 <head> 3 <head>
4 <meta charset="utf-8"> 4 <meta charset="utf-8">
5 <link rel="stylesheet" href="onc_spec.css" > 5 <link rel="stylesheet" href="onc_spec.css" >
6 <script src="onc_spec.js"></script> 6 <script src="onc_spec.js"></script>
7 <title>Open Network Configuration Format</title> 7 <title>Open Network Configuration Format</title>
8 </head> 8 </head>
9 <body> 9 <body>
10 10
(...skipping 196 matching lines...) Expand 10 before | Expand all | Expand 10 after
207 <dt class="field">Certificates</dt> 207 <dt class="field">Certificates</dt>
208 <dd> 208 <dd>
209 <span class="field_meta"> 209 <span class="field_meta">
210 (optional) 210 (optional)
211 <span class="type">array of Certificate</span> 211 <span class="type">array of Certificate</span>
212 </span> 212 </span>
213 Contains certificates stored in X.509 or PKCS#12 format. 213 Contains certificates stored in X.509 or PKCS#12 format.
214 </dd> 214 </dd>
215 </dl> 215 </dl>
216 216
217 <p> 217 <p class="rule">
218 <span class="rule_id"></span>
218 At least one array (either <span class="field">NetworkConfigurations</span> 219 At least one array (either <span class="field">NetworkConfigurations</span>
219 and/or <span class="field">Certificates</span>) must be present. 220 and/or <span class="field">Certificates</span>) must be present.
220 </p> 221 </p>
221 222
222 <section> 223 <section>
223 <h1>Network Configuration</h1> 224 <h1>Network Configuration</h1>
224 <p> 225 <p>
225 Field <span class="field">NetworkConfigurations</span> is an array 226 Field <span class="field">NetworkConfigurations</span> is an array
226 of <span class="type">NetworkConfiguration</span> typed 227 of <span class="type">NetworkConfiguration</span> typed
227 objects. The <span class="type">NetworkConfiguration</span> type contains 228 objects. The <span class="type">NetworkConfiguration</span> type contains
(...skipping 75 matching lines...) Expand 10 before | Expand all | Expand 10 after
303 </dd> 304 </dd>
304 305
305 <dt class="field">SearchDomains</dt> 306 <dt class="field">SearchDomains</dt>
306 <dd> 307 <dd>
307 <span class="field_meta"> 308 <span class="field_meta">
308 (optional if <span class="field">Remove</span> is 309 (optional if <span class="field">Remove</span> is
309 <span class="value">false</span>, otherwise ignored) 310 <span class="value">false</span>, otherwise ignored)
310 <span class="type">array of string</span> 311 <span class="type">array of string</span>
311 </span> 312 </span>
312 Array of strings to append to names for resolution. Items in this array 313 Array of strings to append to names for resolution. Items in this array
313 should not start with a 314 should not start with a dot. Example:
314 dot. Example: <span class="snippet">["corp.acme.org", "acme.org"]</span>. If 315 <span class="snippet">["corp.acme.org", "acme.org"]</span>. If not
315 not specified, DHCP values will be used. 316 specified, DHCP values will be used.
316 </dd> 317 </dd>
317 318
318 <dt class="field">VPN</dt> 319 <dt class="field">VPN</dt>
319 <dd> 320 <dd>
320 <span class="field_meta"> 321 <span class="field_meta">
321 (required if <span class="field">Type</span> is 322 (required if <span class="field">Type</span> is
322 <span class="value">VPN</span>, otherwise ignored) 323 <span class="value">VPN</span>, otherwise ignored)
323 <span class="type">VPN</span> 324 <span class="type">VPN</span>
324 </span> 325 </span>
325 VPN settings. 326 VPN settings.
326 </dd> 327 </dd>
327 328
328 <dt class="field">WiFi</dt> 329 <dt class="field">WiFi</dt>
329 <dd> 330 <dd>
330 <span class="field_meta"> 331 <span class="field_meta">
331 (required if <span class="field">Type</span> is 332 (required if <span class="field">Type</span> is
332 <span class="value">WiFi</span>, otherwise ignored) 333 <span class="value">WiFi</span>, otherwise ignored)
333 <span class="type">WiFi</span> 334 <span class="type">WiFi</span>
334 </span> 335 </span>
335 Wi-Fi settings. 336 Wi-Fi settings.
336 </dd> 337 </dd>
337 338
338 <dt class="field">Type</dt> 339 <dt class="field">Type</dt>
339 <dd> 340 <dd>
340 <span class="field_meta"> 341 <span class="field_meta">
341 (required if <span class="field">Remove</span> is 342 (required if <span class="field">Remove</span> is
342 <span class="value">false</span>, otherwise ignored) 343 <span class="value">false</span>, otherwise ignored)
343 <span class="type">string</span> 344 <span class="type">string</span>
344 </span> 345 </span>
345 Indicates which kind of connection this is. Must be one 346 <span class="rule">
346 of <span class="value">Cellular</span>, 347 <span class="rule_id"></span>
347 <span class="value">Ethernet</span>, <span class="value">WiFi</span>, or 348 Allowed values are <span class="value">Cellular</span>,
348 <span class="value">VPN</span>. 349 <span class="value">Ethernet</span>, <span class="value">WiFi</span>,
350 and <span class="value">VPN</span>.
351 </span>
352 Indicates which kind of connection this is.
349 </dd> 353 </dd>
350 </dl> 354 </dl>
351 355
352 <section> 356 <section>
353 <h1>Ethernet networks</h1> 357 <h1>Ethernet networks</h1>
354 <p> 358 <p>
355 For Ethernet connections, <span class="field">Type</span> must be set to 359 For Ethernet connections, <span class="field">Type</span> must be set to
356 <span class="value">Ethernet</span> and the 360 <span class="value">Ethernet</span> and the
357 field <span class="field">Ethernet</span> must be set to an object of 361 field <span class="field">Ethernet</span> must be set to an object of
358 type <span class="type">Ethernet</span> containing the following fields: 362 type <span class="type">Ethernet</span> containing the following fields:
359 </p> 363 </p>
360 364
361 <dl class="field_list"> 365 <dl class="field_list">
362 <dt class="field">Authentication</dt> 366 <dt class="field">Authentication</dt>
363 <dd> 367 <dd>
364 <span class="field_meta"> 368 <span class="field_meta">
365 (optional) 369 (optional)
366 <span class="type">string</span> 370 <span class="type">string</span>
367 </span> 371 </span>
368 Either <span class="value">None</span> 372 <span class="rule">
369 or <span class="value">8021X</span>. 373 <span class="rule_id"></span>
374 Allowed values are <span class="value">None</span> and
375 <span class="value">8021X</span>.
376 </span>
370 </dd> 377 </dd>
371 378
372 <dt class="field">EAP</dt> 379 <dt class="field">EAP</dt>
373 <dd> 380 <dd>
374 <span class="field_meta"> 381 <span class="field_meta">
375 (required if <span class="field">Authentication</span> is 382 (required if <span class="field">Authentication</span> is
376 <span class="value">8021X</span>, otherwise ignored) 383 <span class="value">8021X</span>, otherwise ignored)
377 <span class="type">EAP</span> 384 <span class="type">EAP</span>
378 </span> 385 </span>
379 EAP settings. 386 EAP settings.
(...skipping 10 matching lines...) Expand all
390 particular static IP configuration and contains the following fields: 397 particular static IP configuration and contains the following fields:
391 </p> 398 </p>
392 399
393 <dl class="field_list"> 400 <dl class="field_list">
394 <dt class="field">Type</dt> 401 <dt class="field">Type</dt>
395 <dd> 402 <dd>
396 <span class="field_meta"> 403 <span class="field_meta">
397 (required) 404 (required)
398 <span class="type">string</span> 405 <span class="type">string</span>
399 </span> 406 </span>
400 Must be either <span class="value">IPv4</span> 407 <span class="rule">
401 or <span class="value">IPv6</span>, describing the type of configuration 408 <span class="rule_id"></span>
402 this is. 409 Allowed values are <span class="value">IPv4</span>
410 and <span class="value">IPv6</span>
411 </span>
412 Describes the type of configuration this is.
403 </dd> 413 </dd>
404 414
405 <dt class="field">IPAddress</dt> 415 <dt class="field">IPAddress</dt>
406 <dd> 416 <dd>
407 <span class="field_meta"> 417 <span class="field_meta">
408 (required) 418 (required)
409 <span class="type">string</span> 419 <span class="type">string</span>
410 </span> 420 </span>
411 Describes the IPv4 or IPv6 address of a connection, depending on the value 421 Describes the IPv4 or IPv6 address of a connection, depending on the value
412 of <span class="field">Type</span> field. It should not contain the 422 of <span class="field">Type</span> field. It should not contain the
413 routing prefix (i.e. should not end in something like /64). 423 routing prefix (i.e. should not end in something like /64).
414 </dd> 424 </dd>
415 425
416 <dt class="field">RoutingPrefix</dt> 426 <dt class="field">RoutingPrefix</dt>
417 <dd> 427 <dd>
418 <span class="field_meta"> 428 <span class="field_meta">
419 (required) 429 (required)
420 <span class="type">integer</span> 430 <span class="type">integer</span>
421 </span> 431 </span>
422 Describes the routing prefix. This is a number in the range [1, 32] for 432 <span class="rule">
423 IPv4 and [1, 128] for IPv6 addresses. 433 <span class="rule_id"></span> Must be a number in the range [1, 32] for
David Roche 2013/02/13 12:57:09 Previous lines keep the rule_id span on its own li
pneubeck (no reviews) 2013/02/13 13:09:15 Done.
434 IPv4 and [1, 128] for IPv6 addresses.
435 </span>
436 Describes the routing prefix.
424 </dd> 437 </dd>
425 438
426 <dt class="field">Gateway</dt> 439 <dt class="field">Gateway</dt>
427 <dd> 440 <dd>
428 <span class="field_meta"> 441 <span class="field_meta">
429 (optional) 442 (optional)
430 <span class="type">string</span> 443 <span class="type">string</span>
431 </span> 444 </span>
432 Describes the gateway address to use for the configuration. Must match 445 Describes the gateway address to use for the configuration. Must match
433 address type specified in 446 address type specified in <span class="field">Type</span> field. If not
434 <span class="field">Type</span> field. If not specified, DHCP values will 447 specified, DHCP values will be used.
435 be used. </dd> 448 </dd>
436 449
437 <dt class="field">NameServers</dt> 450 <dt class="field">NameServers</dt>
438 <dd> 451 <dd>
439 <span class="field_meta"> 452 <span class="field_meta">
440 (optional) 453 (optional)
441 <span class="type">array of string</span> 454 <span class="type">array of string</span>
442 </span> 455 </span>
443 Array of addresses to use for name servers. Address format must match that 456 Array of addresses to use for name servers. Address format must match that
444 specified in the <span class="field">Type</span> field. Overrides values 457 specified in the <span class="field">Type</span> field. Overrides values
445 in the top level NameServers field for this configuration. If not 458 in the top level NameServers field for this configuration. If not
(...skipping 68 matching lines...) Expand 10 before | Expand all | Expand 10 after
514 must be of the format 0x&lt;hex-number&gt;, where &lt;hex-number&gt; is 527 must be of the format 0x&lt;hex-number&gt;, where &lt;hex-number&gt; is
515 40, 104, 128, or 232 bits. 528 40, 104, 128, or 232 bits.
516 </dd> 529 </dd>
517 530
518 <dt class="field">Security</dt> 531 <dt class="field">Security</dt>
519 <dd> 532 <dd>
520 <span class="field_meta"> 533 <span class="field_meta">
521 (required) 534 (required)
522 <span class="type">string</span> 535 <span class="type">string</span>
523 </span> 536 </span>
524 One of <span class="value">None</span>, <span class="value">WEP-PSK</span> , 537 <span class="rule">
525 <span class="value">WEP-8021X</span>, <span class="value">WPA-PSK</span>, 538 <span class="rule_id"></span> Allowed values
526 <span class="value">WPA-EAP</span>. 539 are <span class="value">None</span>, <span class="value">WEP-PSK</span>,
David Roche 2013/02/13 12:57:09 rule_id on own line, and separating the two value
pneubeck (no reviews) 2013/02/13 13:09:15 Done.
540 <span class="value">WEP-8021X</span>,
541 <span class="value">WPA-PSK</span>, and
542 <span class="value">WPA-EAP</span>.
543 </span>
527 </dd> 544 </dd>
528 545
529 <dt class="field">SSID</dt> 546 <dt class="field">SSID</dt>
530 <dd> 547 <dd>
531 <span class="field_meta"> 548 <span class="field_meta">
532 (required) 549 (required)
533 <span class="type">string</span> 550 <span class="type">string</span>
534 </span> 551 </span>
535 SSID of the network. 552 SSID of the network.
536 </dd> 553 </dd>
(...skipping 69 matching lines...) Expand 10 before | Expand all | Expand 10 after
606 </span> 623 </span>
607 OpenVPN settings. 624 OpenVPN settings.
608 </dd> 625 </dd>
609 626
610 <dt class="field">Type</dt> 627 <dt class="field">Type</dt>
611 <dd> 628 <dd>
612 <span class="field_meta"> 629 <span class="field_meta">
613 (required) 630 (required)
614 <span class="type">string</span> 631 <span class="type">string</span>
615 </span> 632 </span>
616 Type of the VPN, one of 633 <span class="rule">
617 <span class="value">IPsec</span>, <span class="value">L2TP-IPsec</span>, 634 <span class="rule_id"></span>
618 or <span class="value">OpenVPN</span>. 635 Allowed values are <span class="value">IPsec</span>,
636 <span class="value">L2TP-IPsec</span>, and
637 <span class="value">OpenVPN</span>.
638 </span>
639 Type of the VPN.
619 </dd> 640 </dd>
620 </dl> 641 </dl>
621 642
622 <section> 643 <section>
623 <h1>IPsec-based VPN types</h1> 644 <h1>IPsec-based VPN types</h1>
624 <p> 645 <p>
625 The <span class="type">IPsec</span> type contains the following: 646 The <span class="type">IPsec</span> type contains the following:
626 </p> 647 </p>
627 648
628 <dl class="field_list"> 649 <dl class="field_list">
629 <dt class="field">AuthenticationType</dt> 650 <dt class="field">AuthenticationType</dt>
630 <dd> 651 <dd>
631 <span class="field_meta"> 652 <span class="field_meta">
632 (required) 653 (required)
633 <span class="type">string</span> 654 <span class="type">string</span>
634 </span> 655 </span>
635 Either <span class="value">PSK</span> or <span class="value">Cert</span> 656 <span class="rule">
657 <span class="rule_id"></span>
658 Allowed values are <span class="value">PSK</span> and
659 <span class="value">Cert</span>
660 </span>
636 </dd> 661 </dd>
637 662
638 <dt class="field">ClientCertPattern</dt> 663 <dt class="field">ClientCertPattern</dt>
639 <dd> 664 <dd>
640 <span class="field_meta"> 665 <span class="field_meta">
641 (required if <span class="field">ClientCertType</span> 666 (required if <span class="field">ClientCertType</span>
642 is <span class="value">Pattern</span>, otherwise ignored) 667 is <span class="value">Pattern</span>, otherwise ignored)
643 <span class="type">CertificatePattern</span> 668 <span class="type">CertificatePattern</span>
644 </span> 669 </span>
645 Pattern describing the client certificate. 670 Pattern describing the client certificate.
646 </dd> 671 </dd>
647 672
648 <dt class="field">ClientCertRef</dt> 673 <dt class="field">ClientCertRef</dt>
649 <dd> 674 <dd>
650 <span class="field_meta"> 675 <span class="field_meta">
651 (required if <span class="field">ClientCertType</span> 676 (required if <span class="field">ClientCertType</span>
652 is <span class="value">Ref</span>, otherwise ignored) 677 is <span class="value">Ref</span>, otherwise ignored)
653 <span class="type">string</span> 678 <span class="type">string</span>
654 </span> 679 </span>
655 Reference to client certificate stored in certificate section. 680 Reference to client certificate stored in certificate section.
656 </dd> 681 </dd>
657 682
658 <dt class="field">ClientCertType</dt> 683 <dt class="field">ClientCertType</dt>
659 <dd> 684 <dd>
660 <span class="field_meta"> 685 <span class="field_meta">
661 (required if <span class="field">AuthenticationType</span> 686 (required if <span class="field">AuthenticationType</span>
662 is <span class="value">Cert</span>, otherwise ignored) 687 is <span class="value">Cert</span>, otherwise ignored)
663 <span class="type">string</span> 688 <span class="type">string</span>
664 </span> 689 </span>
665 Either <span class="value">Ref</span> 690 <span class="rule">
666 or <span class="value">Pattern</span> 691 <span class="rule_id"></span>
692 Allowed values are <span class="value">Ref</span> and
693 <span class="value">Pattern</span>
694 </span>
667 </dd> 695 </dd>
668 696
669 <dt class="field">EAP</dt> 697 <dt class="field">EAP</dt>
670 <dd> 698 <dd>
671 <span class="field_meta"> 699 <span class="field_meta">
672 (optional if <span class="field">IKEVersion</span> is 2, otherwise 700 (optional if <span class="field">IKEVersion</span> is 2, otherwise
673 ignored) 701 ignored)
674 <span class="type">EAP</span> 702 <span class="type">EAP</span>
675 </span> 703 </span>
676 Indicating that EAP authentication should be used with the provided 704 Indicating that EAP authentication should be used with the provided
(...skipping 179 matching lines...) Expand 10 before | Expand all | Expand 10 after
856 </li> 884 </li>
857 <li>The field <span class="field">L2TP</span> must be present.</li> 885 <li>The field <span class="field">L2TP</span> must be present.</li>
858 </ul> 886 </ul>
859 </section> 887 </section>
860 888
861 </section> 889 </section>
862 890
863 <section> 891 <section>
864 <h1>OpenVPN connections and types</h1> 892 <h1>OpenVPN connections and types</h1>
865 <p> 893 <p>
866 <span class="field">VPN.Type</span> must 894 <span class="field">VPN.Type</span> must be
867 be <span class="value">OpenVPN</span>. 895 <span class="value">OpenVPN</span>.
868 </p> 896 </p>
869 897
870 <p> 898 <p>
871 <span class="type">OpenVPN</span> type contains the following: 899 <span class="type">OpenVPN</span> type contains the following:
872 </p> 900 </p>
873 901
874 <dl class="field_list"> 902 <dl class="field_list">
875 <dt class="field">Auth</dt> 903 <dt class="field">Auth</dt>
876 <dd> 904 <dd>
877 <span class="field_meta"> 905 <span class="field_meta">
878 (optional, defaults to <span class="value">SHA1</span>) 906 (optional, defaults to <span class="value">SHA1</span>)
879 <span class="type">string</span> 907 <span class="type">string</span>
880 </span> 908 </span>
881 </dd> 909 </dd>
882 910
883 <dt class="field">AuthRetry</dt> 911 <dt class="field">AuthRetry</dt>
884 <dd> 912 <dd>
885 <span class="field_meta"> 913 <span class="field_meta">
886 (optional, defaults to <span class="value">none</span>) 914 (optional, defaults to <span class="value">none</span>)
887 <span class="type">string</span> 915 <span class="type">string</span>
888 </span> 916 </span>
917 <span class="rule">
918 <span class="rule_id"></span>
919 Allowed values are <span class="value">none</span>,
920 <span class="value">nointeract</span>, and
921 <span class="value">interact</span>.
922 </span>
889 Controls how OpenVPN responds to username/password verification 923 Controls how OpenVPN responds to username/password verification
890 errors. Allowed values are <span class="value">none</span> (fail with 924 errors:<br> Either fail with error on retry
891 error on retry), <span class="value">nointeract</span> (retry without 925 (<span class="value">none</span>), retry without asking for authentication
892 asking for authentication), and <span class="value">interact</span> (ask 926 (<span class="value">nointeract</span>), or ask again for authentication
893 again for authentication each time). 927 each time (<span class="value">interact</span>).
894 </dd> 928 </dd>
895 929
896 <dt class="field">AuthNoCache</dt> 930 <dt class="field">AuthNoCache</dt>
897 <dd> 931 <dd>
898 <span class="field_meta"> 932 <span class="field_meta">
899 (optional, defaults to <span class="value">false</span>) 933 (optional, defaults to <span class="value">false</span>)
900 <span class="type">boolean</span> 934 <span class="type">boolean</span>
901 </span> 935 </span>
902 Disable caching of credentials in memory. 936 Disable caching of credentials in memory.
903 </dd> 937 </dd>
(...skipping 26 matching lines...) Expand all
930 </span> 964 </span>
931 Pattern to use to find the client certificate. 965 Pattern to use to find the client certificate.
932 </dd> 966 </dd>
933 967
934 <dt class="field">ClientCertType</dt> 968 <dt class="field">ClientCertType</dt>
935 <dd> 969 <dd>
936 <span class="field_meta"> 970 <span class="field_meta">
937 (required) 971 (required)
938 <span class="type">string</span> 972 <span class="type">string</span>
939 </span> 973 </span>
940 Either <span class="value">Ref</span>, <span class="value">Pattern</span>, 974 <span class="rule">
941 or <span class="value">None</span>. <span class="value">None</span> 975 <span class="rule_id"></span>
942 implies that the server is configured to not require client certificates. 976 Allowed values are <span class="value">Ref</span>,
977 <span class="value">Pattern</span>, and <span class="value">None</span>.
978 </span>
979 <span class="value">None</span> implies that the server is configured to
980 not require client certificates.
943 </dd> 981 </dd>
944 982
945 <dt class="field">CompLZO</dt> 983 <dt class="field">CompLZO</dt>
946 <dd> 984 <dd>
947 <span class="field_meta"> 985 <span class="field_meta">
948 (optional, defaults to <span class="value">adaptive</span>) 986 (optional, defaults to <span class="value">adaptive</span>)
949 <span class="type">string</span> 987 <span class="type">string</span>
950 </span> 988 </span>
951 Decides to fast LZO compression with <span class="value">true</span> 989 Decides to fast LZO compression with <span class="value">true</span>
952 and <span class="value">false</span> as other values. 990 and <span class="value">false</span> as other values.
(...skipping 81 matching lines...) Expand 10 before | Expand all | Expand 10 after
1034 Require the given array of key usage numbers. These are strings that are 1072 Require the given array of key usage numbers. These are strings that are
1035 hex encoded numbers. 1073 hex encoded numbers.
1036 </dd> 1074 </dd>
1037 1075
1038 <dt class="field">RemoteCertTLS</dt> 1076 <dt class="field">RemoteCertTLS</dt>
1039 <dd> 1077 <dd>
1040 <span class="field_meta"> 1078 <span class="field_meta">
1041 (optional, defaults to <span class="value">server</span>) 1079 (optional, defaults to <span class="value">server</span>)
1042 <span class="type">string</span> 1080 <span class="type">string</span>
1043 </span> 1081 </span>
1044 Require peer certificate signing based on RFC3280 TLS rules. May 1082 <span class="rule">
1045 be <span class="value">none</span> or <span class="value">server</span>. 1083 <span class="rule_id"></span>
1084 Allowed values are <span class="value">none</span> and
1085 <span class="value">server</span>.
1086 </span>
1087 Require peer certificate signing based on RFC3280 TLS rules.
1046 </dd> 1088 </dd>
1047 1089
1048 <dt class="field">RenegSec</dt> 1090 <dt class="field">RenegSec</dt>
1049 <dd> 1091 <dd>
1050 <span class="field_meta"> 1092 <span class="field_meta">
1051 (optional, defaults to <span class="value">3600</span>) 1093 (optional, defaults to <span class="value">3600</span>)
1052 <span class="type">integer</span> 1094 <span class="type">integer</span>
1053 </span> 1095 </span>
1054 Renegotiate data channel key after this number of seconds. 1096 Renegotiate data channel key after this number of seconds.
1055 </dd> 1097 </dd>
(...skipping 97 matching lines...) Expand 10 before | Expand all | Expand 10 after
1153 </dl> 1195 </dl>
1154 </section> 1196 </section>
1155 1197
1156 </section> 1198 </section>
1157 1199
1158 <section> 1200 <section>
1159 <h1>Client certificate patterns</h1> 1201 <h1>Client certificate patterns</h1>
1160 <p> 1202 <p>
1161 In order to allow clients to securely key their private keys and request 1203 In order to allow clients to securely key their private keys and request
1162 certificates through PKCS#10 format or through a web flow, we provide 1204 certificates through PKCS#10 format or through a web flow, we provide
1163 alternative CertificatePattern 1205 alternative CertificatePattern types. The
1164 types. The <span class="type">CertificatePattern</span> type contains the 1206 <span class="type">CertificatePattern</span> type contains the following:
1165 following:
1166 </p> 1207 </p>
1167 1208
1168 <dl class="field_list"> 1209 <dl class="field_list">
1169 <dt class="field">IssuerCARef</dt> 1210 <dt class="field">IssuerCARef</dt>
1170 <dd> 1211 <dd>
1171 <span class="field_meta"> 1212 <span class="field_meta">
1172 (optional) 1213 (optional)
1173 <span class="type">array of string</span> 1214 <span class="type">array of string</span>
1174 </span> 1215 </span>
1175 Array of references to certificates. At least one must have signed the 1216 Array of references to certificates. At least one must have signed the
(...skipping 78 matching lines...) Expand 10 before | Expand all | Expand 10 after
1254 <dd> 1295 <dd>
1255 <span class="field_meta"> 1296 <span class="field_meta">
1256 (optional) 1297 (optional)
1257 <span class="type">string</span> 1298 <span class="type">string</span>
1258 </span> 1299 </span>
1259 At least one of certificate subject's organizational units must match this 1300 At least one of certificate subject's organizational units must match this
1260 string if present. 1301 string if present.
1261 </dd> 1302 </dd>
1262 </dl> 1303 </dl>
1263 1304
1264 <p> 1305 <p class="rule">
1265 One field 1306 <span class="rule_id"></span>
1266 in <span class="field">Subject</span>, <span class="field">Issuer</span>, 1307 One field in <span class="field">Subject</span>,
1267 or <span class="field">IssuerCARef</span> must be given for a 1308 <span class="field">Issuer</span>, or <span class="field">IssuerCARef</span>
1268 <span class="type">CertificatePattern</span> typed field to be valid. For a 1309 must be given for a <span class="type">CertificatePattern</span> typed field
1269 certificate to be considered matching, it must match all the fields in the 1310 to be valid.
1270 certificate pattern. If multiple certificates match, the certificate with
1271 the latest issue date that is still in the past, and hence valid, will be
1272 used.
1273 </p> 1311 </p>
1274 1312
1275 <p> 1313 <p>
1314 For a certificate to be considered matching, it must match all
1315 the fields in the certificate pattern. If multiple certificates match, the
1316 certificate with the latest issue date that is still in the past, and hence
1317 valid, will be used.
1318 </p>
1319
1320 <p>
1276 If <span class="field">EnrollmentURI</span> is not given and no match is 1321 If <span class="field">EnrollmentURI</span> is not given and no match is
1277 found to this pattern, the importing tool may show an error to the user. 1322 found to this pattern, the importing tool may show an error to the user.
1278 </p> 1323 </p>
1279 </section> 1324 </section>
1280 1325
1281 <section> 1326 <section>
1282 <h1>Proxy settings</h1> 1327 <h1>Proxy settings</h1>
1283 <p> 1328 <p>
1284 Every network can be configured to use a 1329 Every network can be configured to use a
1285 proxy. The <span class="type">ProxySettings</span> type contains the 1330 proxy. The <span class="type">ProxySettings</span> type contains the
1286 following: 1331 following:
1287 </p> 1332 </p>
1288 1333
1289 <dl class="field_list"> 1334 <dl class="field_list">
1290 <dt class="field">Type</dt> 1335 <dt class="field">Type</dt>
1291 <dd> 1336 <dd>
1292 <span class="field_meta"> 1337 <span class="field_meta">
1293 (required) 1338 (required)
1294 <span class="type">string</span> 1339 <span class="type">string</span>
1295 </span> 1340 </span>
1296 One 1341 <span class="rule">
1297 of <span class="value">Direct</span>, <span class="value">Manual</span>, 1342 <span class="rule_id"></span>
1298 <span class="value">PAC</span>, or <span class="value">WPAD</span>. 1343 Allowed values are <span class="value">Direct</span>,
1344 <span class="value">Manual</span>, <span class="value">PAC</span>, and
1345 <span class="value">WPAD</span>.
1346 </span>
1299 <span class="value">PAC</span> indicates Proxy Auto-Configuration. 1347 <span class="value">PAC</span> indicates Proxy Auto-Configuration.
1300 <span class="value">WPAD</span> indicates Web Proxy Autodiscovery. 1348 <span class="value">WPAD</span> indicates Web Proxy Autodiscovery.
1301 </dd> 1349 </dd>
1302 1350
1303 <dt class="field">Manual</dt> 1351 <dt class="field">Manual</dt>
1304 <dd> 1352 <dd>
1305 <span class="field_meta"> 1353 <span class="field_meta">
1306 (required if <span class="field">Type</span> 1354 (required if <span class="field">Type</span>
1307 is <span class="value">Manual</span>, otherwise ignored) 1355 is <span class="value">Manual</span>, otherwise ignored)
1308 <span class="type">ManualProxySettings</span> 1356 <span class="type">ManualProxySettings</span>
(...skipping 131 matching lines...) Expand 10 before | Expand all | Expand 10 after
1440 <span class="type">string</span> 1488 <span class="type">string</span>
1441 </span> 1489 </span>
1442 Reference to client certificate stored in certificate section. 1490 Reference to client certificate stored in certificate section.
1443 </dd> 1491 </dd>
1444 1492
1445 <dt class="field">ClientCertType</dt> 1493 <dt class="field">ClientCertType</dt>
1446 <dd> 1494 <dd>
1447 <span class="field_meta"> 1495 <span class="field_meta">
1448 (optional) <span class="type">string</span> 1496 (optional) <span class="type">string</span>
1449 </span> 1497 </span>
1450 Must be either <span class="value">Ref</span> 1498 <span class="rule">
1451 or <span class="value">Pattern</span>. 1499 <span class="rule_id"></span>
1500 Allowed values are <span class="value">Ref</span>, and
1501 <span class="value">Pattern</span>.
1502 </span>
1452 </dd> 1503 </dd>
1453 1504
1454 <dt class="field">Identity</dt> 1505 <dt class="field">Identity</dt>
1455 <dd> 1506 <dd>
1456 <span class="field_meta"> 1507 <span class="field_meta">
1457 (optional) 1508 (optional)
1458 <span class="type">string</span> 1509 <span class="type">string</span>
1459 </span> 1510 </span>
1460 Identity of user. For tunneling outer protocols 1511 Identity of user. For tunneling outer protocols
1461 (<span class="value">PEAP</span>, <span class="value">EAP-TTLS</span>, and 1512 (<span class="value">PEAP</span>, <span class="value">EAP-TTLS</span>, and
1462 <span class="value">EAP-FAST</span>), this is used to authenticate inside 1513 <span class="value">EAP-FAST</span>), this is used to authenticate inside
1463 the tunnel, and <span class="field">AnonymousIdentity</span> is used for 1514 the tunnel, and <span class="field">AnonymousIdentity</span> is used for
1464 the EAP identity outside the tunnel. For non-tunneling outer protocols, 1515 the EAP identity outside the tunnel. For non-tunneling outer protocols,
1465 this is used for the EAP identity. This value is subject to string 1516 this is used for the EAP identity. This value is subject to string
1466 expansions. 1517 expansions.
1467 </dd> 1518 </dd>
1468 1519
1469 <dt class="field">Inner</dt> 1520 <dt class="field">Inner</dt>
1470 <dd> 1521 <dd>
1471 <span class="field_meta"> 1522 <span class="field_meta">
1472 (optional if <span class="field">Outer</span> is 1523 (optional if <span class="field">Outer</span> is
1473 <span class="value">EAP-FAST</span>, <span class="value">EAP-TTLS</span> 1524 <span class="value">EAP-FAST</span>, <span class="value">EAP-TTLS</span>
1474 or <span class="value">PEAP</span>, otherwise ignored, defaults to 1525 or <span class="value">PEAP</span>, otherwise ignored, defaults to
1475 <span class="value">Automatic</span>) 1526 <span class="value">Automatic</span>)
1476 <span class="type">string</span> 1527 <span class="type">string</span>
1477 </span> 1528 </span>
1478 Must be one of <span class="value">Automatic</span>, 1529 <span class="rule">
1479 <span class="value">MD5</span>, <span class="value">MSCHAPv2</span>, 1530 <span class="rule_id"></span>
1480 <span class="value">EAP-MSCHAPv2</span>, <span class="value">PAP</span>. 1531 Allowed values are <span class="value">Automatic</span>,
1532 <span class="value">MD5</span>, <span class="value">MSCHAPv2</span>,
1533 <span class="value">EAP-MSCHAPv2</span>, and
1534 <span class="value">PAP</span>.
1535 </span>
1481 For tunneling outer protocols. 1536 For tunneling outer protocols.
1482 </dd> 1537 </dd>
1483 1538
1484 <dt class="field">Outer</dt> 1539 <dt class="field">Outer</dt>
1485 <dd> 1540 <dd>
1486 <span class="field_meta"> 1541 <span class="field_meta">
1487 (required) 1542 (required)
1488 <span class="type">string</span> 1543 <span class="type">string</span>
1489 </span> 1544 </span>
1490 Must be one of <span class="value">LEAP</span>, 1545 <span class="rule">
1491 <span class="value">EAP-AKA</span>, <span class="value">EAP-FAST</span>, 1546 <span class="rule_id"></span>
1492 <span class="value">EAP-TLS</span>, <span class="value">EAP-TTLS</span>, 1547 Allowed values are <span class="value">LEAP</span>,
1493 <span class="value">EAP-SIM</span> or <span class="value">PEAP</span>. 1548 <span class="value">EAP-AKA</span>, <span class="value">EAP-FAST</span>,
1549 <span class="value">EAP-TLS</span>, <span class="value">EAP-TTLS</span>,
1550 <span class="value">EAP-SIM</span> and <span class="value">PEAP</span>.
1551 </span>
1494 </dd> 1552 </dd>
1495 1553
1496 <dt class="field">Password</dt> 1554 <dt class="field">Password</dt>
1497 <dd> 1555 <dd>
1498 <span class="field_meta"> 1556 <span class="field_meta">
1499 (optional) 1557 (optional)
1500 <span class="type">string</span> 1558 <span class="type">string</span>
1501 </span> 1559 </span>
1502 Password of user. If not specified, defaults to prompting the user. 1560 Password of user. If not specified, defaults to prompting the user.
1503 </dd> 1561 </dd>
(...skipping 124 matching lines...) Expand 10 before | Expand all | Expand 10 after
1628 set to <span class="snippet">["Web"]</span>. 1686 set to <span class="snippet">["Web"]</span>.
1629 </dd> 1687 </dd>
1630 1688
1631 <dt class="field">Type</dt> 1689 <dt class="field">Type</dt>
1632 <dd> 1690 <dd>
1633 <span class="field_meta"> 1691 <span class="field_meta">
1634 (required if <span class="field">Remove</span> is 1692 (required if <span class="field">Remove</span> is
1635 <span class="value">false</span>, otherwise ignored) 1693 <span class="value">false</span>, otherwise ignored)
1636 <span class="type">string</span> 1694 <span class="type">string</span>
1637 </span> 1695 </span>
1638 One 1696 <span class="rule">
1639 of <span class="value">Client</span>, <span class="value">Server</span>, 1697 <span class="rule_id"></span>
1640 or <span class="value">Authority</span>. <span class="value">Client</span> 1698 Allowed values are <span class="value">Client</span>,
1641 indicates the certificate is for identifying the user or device over HTTPS 1699 <span class="value">Server</span>, and
1642 or for VPN/802.1X. <span class="value">Server</span> indicates the 1700 <span class="value">Authority</span>.
1643 certificate identifies an HTTPS or VPN/802.1X 1701 </span>
1644 peer. <span class="value">Authority</span> indicates the certificate is a 1702 <span class="value">Client</span> indicates the certificate is for
1703 identifying the user or device over HTTPS or for
1704 VPN/802.1X. <span class="value">Server</span> indicates the certificate
1705 identifies an HTTPS or VPN/802.1X peer.
1706 <span class="value">Authority</span> indicates the certificate is a
1645 certificate authority and any certificates it issues should be 1707 certificate authority and any certificates it issues should be
1646 trusted. Note that if <span class="field">Type</span> disagrees with the 1708 trusted. Note that if <span class="field">Type</span> disagrees with the
1647 x509 v3 basic constraints or key usage attributes, 1709 x509 v3 basic constraints or key usage attributes, the
1648 the <span class="field">Type</span> field should be honored. 1710 <span class="field">Type</span> field should be honored.
1649 </dd> 1711 </dd>
1650 1712
1651 <dt class="field">X509</dt> 1713 <dt class="field">X509</dt>
1652 <dd> 1714 <dd>
1653 <span class="field_meta"> 1715 <span class="field_meta">
1654 (required if <span class="field">Type</span> is 1716 (required if <span class="field">Type</span> is
1655 <span class="value">Server</span> or 1717 <span class="value">Server</span> or
1656 <span class="value">Authority</span>, otherwise ignored) 1718 <span class="value">Authority</span>, otherwise ignored)
1657 <span class="type">string</span> 1719 <span class="type">string</span>
1658 </span> For certificate 1720 </span> For certificate
(...skipping 123 matching lines...) Expand 10 before | Expand all | Expand 10 after
1782 <dd> 1844 <dd>
1783 <span class="field_meta"> 1845 <span class="field_meta">
1784 (required) 1846 (required)
1785 <span class="type">string</span> 1847 <span class="type">string</span>
1786 </span> 1848 </span>
1787 The type of the ONC file, which must be set 1849 The type of the ONC file, which must be set
1788 to <span class="value">EncryptedConfiguration</span>. 1850 to <span class="value">EncryptedConfiguration</span>.
1789 </dd> 1851 </dd>
1790 </dl> 1852 </dl>
1791 1853
1792 <p> 1854 <p class="rule">
1855 <span class="rule_id"></span>
1793 When decrypted, the ciphertext must contain a JSON object of 1856 When decrypted, the ciphertext must contain a JSON object of
1794 type <span class="type">UnencryptedConfiguration</span>. 1857 type <span class="type">UnencryptedConfiguration</span>.
1795 </p> 1858 </p>
1796 </section> 1859 </section>
1797 1860
1798 <section> 1861 <section>
1799 <h1>String Expansions</h1> 1862 <h1>String Expansions</h1>
1800 <p> 1863 <p>
1801 The values of some fields, such 1864 The values of some fields, such
1802 as <span class="field">WiFi.EAP.Identity</span> 1865 as <span class="field">WiFi.EAP.Identity</span>
(...skipping 278 matching lines...) Expand 10 before | Expand all | Expand 10 after
2081 is transmitted or saved to disk should be secure. On client device, when 2144 is transmitted or saved to disk should be secure. On client device, when
2082 user names for connections that are user-specific are persisted to disk, 2145 user names for connections that are user-specific are persisted to disk,
2083 they should be stored in a location that is encrypted. Users can also opt in 2146 they should be stored in a location that is encrypted. Users can also opt in
2084 these cases to not save their user credentials in the config file and will 2147 these cases to not save their user credentials in the config file and will
2085 instead be prompted when they are needed. 2148 instead be prompted when they are needed.
2086 </p> 2149 </p>
2087 </section> 2150 </section>
2088 </section> 2151 </section>
2089 </body> 2152 </body>
2090 </html> 2153 </html>
OLDNEW
« no previous file with comments | « chromeos/docs/onc_spec.css ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698