OLD | NEW |
1 { | 1 { |
2 # policy_templates.json - Metafile for policy templates | 2 # policy_templates.json - Metafile for policy templates |
3 # | 3 # |
4 # The content of this file is evaluated as a Python expression. | 4 # The content of this file is evaluated as a Python expression. |
5 # | 5 # |
6 # This file is used as input to generate the following policy templates: | 6 # This file is used as input to generate the following policy templates: |
7 # ADM, ADMX+ADML, MCX/plist and html documentation. | 7 # ADM, ADMX+ADML, MCX/plist and html documentation. |
8 # | 8 # |
9 # Policy templates are user interface definitions or documents about the | 9 # Policy templates are user interface definitions or documents about the |
10 # policies that can be used to configure Chrome. Each policy is a name-value | 10 # policies that can be used to configure Chrome. Each policy is a name-value |
(...skipping 119 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
130 # templates and documentation. The policy definition list that Chrome sees | 130 # templates and documentation. The policy definition list that Chrome sees |
131 # will include policies marked with 'future'. If a WIP policy isn't meant to | 131 # will include policies marked with 'future'. If a WIP policy isn't meant to |
132 # be seen by the policy providers either, the 'supported_on' key should be set | 132 # be seen by the policy providers either, the 'supported_on' key should be set |
133 # to an empty list. | 133 # to an empty list. |
134 # | 134 # |
135 # IDs: | 135 # IDs: |
136 # Since a Protocol Buffer definition is generated from this file, unique and | 136 # Since a Protocol Buffer definition is generated from this file, unique and |
137 # persistent IDs for all fields (but not for groups!) are needed. These are | 137 # persistent IDs for all fields (but not for groups!) are needed. These are |
138 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, | 138 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, |
139 # because doing so would break the deployed wire format! | 139 # because doing so would break the deployed wire format! |
140 # For your editing convenience: highest ID currently used: 315 | 140 # For your editing convenience: highest ID currently used: 316 |
141 # | 141 # |
142 # Placeholders: | 142 # Placeholders: |
143 # The following placeholder strings are automatically substituted: | 143 # The following placeholder strings are automatically substituted: |
144 # $1 -> Google Chrome / Chromium | 144 # $1 -> Google Chrome / Chromium |
145 # $2 -> Google Chrome OS / Chromium OS | 145 # $2 -> Google Chrome OS / Chromium OS |
146 # $3 -> Google Chrome Frame / Chromium Frame | 146 # $3 -> Google Chrome Frame / Chromium Frame |
147 # $6 is reserved for doc_writer | 147 # $6 is reserved for doc_writer |
148 # | 148 # |
149 # Device Policy: | 149 # Device Policy: |
150 # An additional flag 'device_only' (optional, defaults to False) indicates | 150 # An additional flag 'device_only' (optional, defaults to False) indicates |
(...skipping 543 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
694 'caption': '''Enable firewall traversal from remote access client''', | 694 'caption': '''Enable firewall traversal from remote access client''', |
695 'tags': [], | 695 'tags': [], |
696 'desc': '''This policy is no longer supported. | 696 'desc': '''This policy is no longer supported. |
697 Enables usage of STUN and relay servers when connecting to a remote cl
ient. | 697 Enables usage of STUN and relay servers when connecting to a remote cl
ient. |
698 | 698 |
699 If this setting is enabled, then this machine can discover and connect
to remote host machines even if they are separated by a firewall. | 699 If this setting is enabled, then this machine can discover and connect
to remote host machines even if they are separated by a firewall. |
700 | 700 |
701 If this setting is disabled and outgoing UDP connections are filtered
by the firewall, then this machine can only connect to host machines within the
local network.''', | 701 If this setting is disabled and outgoing UDP connections are filtered
by the firewall, then this machine can only connect to host machines within the
local network.''', |
702 }, | 702 }, |
703 { | 703 { |
| 704 'name': 'RemoteAccessHostClientDomain', |
| 705 'type': 'string', |
| 706 'schema': { 'type': 'string' }, |
| 707 'supported_on': ['chrome.*:22-', 'chrome_os:41-'], |
| 708 'features': { |
| 709 'dynamic_refresh': True, |
| 710 'per_profile': False, |
| 711 }, |
| 712 'example_value': 'my-awesome-domain.com', |
| 713 'id': 316, |
| 714 'caption': '''Configure the required domain name for remote access cli
ents''', |
| 715 'tags': [], |
| 716 'desc': '''Configures the required client domain name that will be imp
osed on remote access clients and prevents users from changing it. |
| 717 |
| 718 If this setting is enabled, then only clients from the specified domai
n can connect to the host. |
| 719 |
| 720 If this setting is disabled or not set, then the default policy for th
e connection type is applied. For remote assistance, this allows clients from an
y domain can connect to the host; for anytime remote access, only the host owner
can connect. |
| 721 |
| 722 See also RemoteAccessHostDomain.''', |
| 723 }, |
| 724 { |
704 'name': 'RemoteAccessHostFirewallTraversal', | 725 'name': 'RemoteAccessHostFirewallTraversal', |
705 'type': 'main', | 726 'type': 'main', |
706 'schema': { 'type': 'boolean' }, | 727 'schema': { 'type': 'boolean' }, |
707 'supported_on': ['chrome.*:14-', 'chrome_os:41-'], | 728 'supported_on': ['chrome.*:14-', 'chrome_os:41-'], |
708 'features': { | 729 'features': { |
709 'dynamic_refresh': True, | 730 'dynamic_refresh': True, |
710 'per_profile': False, | 731 'per_profile': False, |
711 }, | 732 }, |
712 'example_value': False, | 733 'example_value': False, |
713 'id': 95, | 734 'id': 95, |
(...skipping 17 matching lines...) Expand all Loading... |
731 'per_profile': False, | 752 'per_profile': False, |
732 }, | 753 }, |
733 'example_value': 'my-awesome-domain.com', | 754 'example_value': 'my-awesome-domain.com', |
734 'id': 154, | 755 'id': 154, |
735 'caption': '''Configure the required domain name for remote access hos
ts''', | 756 'caption': '''Configure the required domain name for remote access hos
ts''', |
736 'tags': [], | 757 'tags': [], |
737 'desc': '''Configures the required host domain name that will be impos
ed on remote access hosts and prevents users from changing it. | 758 'desc': '''Configures the required host domain name that will be impos
ed on remote access hosts and prevents users from changing it. |
738 | 759 |
739 If this setting is enabled, then hosts can be shared only using accoun
ts registered on the specified domain name. | 760 If this setting is enabled, then hosts can be shared only using accoun
ts registered on the specified domain name. |
740 | 761 |
741 If this setting is disabled or not set, then hosts can be shared using
any account.''', | 762 If this setting is disabled or not set, then hosts can be shared using
any account. |
| 763 |
| 764 See also RemoteAccessHostClientDomain.''', |
742 }, | 765 }, |
743 { | 766 { |
744 'name': 'RemoteAccessHostRequireTwoFactor', | 767 'name': 'RemoteAccessHostRequireTwoFactor', |
745 'type': 'main', | 768 'type': 'main', |
746 'schema': { 'type': 'boolean' }, | 769 'schema': { 'type': 'boolean' }, |
747 'supported_on': ['chrome.*:22-22'], | 770 'supported_on': ['chrome.*:22-22'], |
748 'features': { | 771 'features': { |
749 'dynamic_refresh': True, | 772 'dynamic_refresh': True, |
750 'per_profile': False, | 773 'per_profile': False, |
751 }, | 774 }, |
(...skipping 7525 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
8277 'desc': '''Text appended in parentheses next to the policies top-level con
tainer to indicate that those policies are of the Recommended level''', | 8300 'desc': '''Text appended in parentheses next to the policies top-level con
tainer to indicate that those policies are of the Recommended level''', |
8278 'text': 'Default Settings (users can override)', | 8301 'text': 'Default Settings (users can override)', |
8279 }, | 8302 }, |
8280 'doc_complex_policies_on_windows': { | 8303 'doc_complex_policies_on_windows': { |
8281 'desc': '''Text pointing the user to a help article for complex policies o
n Windows''', | 8304 'desc': '''Text pointing the user to a help article for complex policies o
n Windows''', |
8282 'text': '''encoded as a JSON string, for details see <ph name="COMPLEX_POL
ICIES_URL">https://www.chromium.org/administrators/complex-policies-on-windows<e
x>https://www.chromium.org/administrators/complex-policies-on-windows</ex></ph>'
'', | 8305 'text': '''encoded as a JSON string, for details see <ph name="COMPLEX_POL
ICIES_URL">https://www.chromium.org/administrators/complex-policies-on-windows<e
x>https://www.chromium.org/administrators/complex-policies-on-windows</ex></ph>'
'', |
8283 }, | 8306 }, |
8284 }, | 8307 }, |
8285 'placeholders': [], | 8308 'placeholders': [], |
8286 } | 8309 } |
OLD | NEW |