Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(221)

Side by Side Diff: components/policy/resources/policy_templates.json

Issue 2252243002: Adding a policy for using the uiAccess enabled It2Me binary on Windows (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 4 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « chrome/test/data/policy/policy_test_cases.json ('k') | remoting/host/policy_watcher.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 { 1 {
2 # policy_templates.json - Metafile for policy templates 2 # policy_templates.json - Metafile for policy templates
3 # 3 #
4 # The content of this file is evaluated as a Python expression. 4 # The content of this file is evaluated as a Python expression.
5 # 5 #
6 # This file is used as input to generate the following policy templates: 6 # This file is used as input to generate the following policy templates:
7 # ADM, ADMX+ADML, MCX/plist and html documentation. 7 # ADM, ADMX+ADML, MCX/plist and html documentation.
8 # 8 #
9 # Policy templates are user interface definitions or documents about the 9 # Policy templates are user interface definitions or documents about the
10 # policies that can be used to configure Chrome. Each policy is a name-value 10 # policies that can be used to configure Chrome. Each policy is a name-value
(...skipping 119 matching lines...) Expand 10 before | Expand all | Expand 10 after
130 # templates and documentation. The policy definition list that Chrome sees 130 # templates and documentation. The policy definition list that Chrome sees
131 # will include policies marked with 'future'. If a WIP policy isn't meant to 131 # will include policies marked with 'future'. If a WIP policy isn't meant to
132 # be seen by the policy providers either, the 'supported_on' key should be set 132 # be seen by the policy providers either, the 'supported_on' key should be set
133 # to an empty list. 133 # to an empty list.
134 # 134 #
135 # IDs: 135 # IDs:
136 # Since a Protocol Buffer definition is generated from this file, unique and 136 # Since a Protocol Buffer definition is generated from this file, unique and
137 # persistent IDs for all fields (but not for groups!) are needed. These are 137 # persistent IDs for all fields (but not for groups!) are needed. These are
138 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, 138 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs,
139 # because doing so would break the deployed wire format! 139 # because doing so would break the deployed wire format!
140 # For your editing convenience: highest ID currently used: 340 140 # For your editing convenience: highest ID currently used: 342
141 # 141 #
142 # Placeholders: 142 # Placeholders:
143 # The following placeholder strings are automatically substituted: 143 # The following placeholder strings are automatically substituted:
144 # $1 -> Google Chrome / Chromium 144 # $1 -> Google Chrome / Chromium
145 # $2 -> Google Chrome OS / Chromium OS 145 # $2 -> Google Chrome OS / Chromium OS
146 # $3 -> Google Chrome Frame / Chromium Frame 146 # $3 -> Google Chrome Frame / Chromium Frame
147 # $6 is reserved for doc_writer 147 # $6 is reserved for doc_writer
148 # 148 #
149 # Device Policy: 149 # Device Policy:
150 # An additional flag 'device_only' (optional, defaults to False) indicates 150 # An additional flag 'device_only' (optional, defaults to False) indicates
(...skipping 840 matching lines...) Expand 10 before | Expand all | Expand 10 after
991 'per_profile': False, 991 'per_profile': False,
992 }, 992 },
993 'example_value': '{ "RemoteAccessHostMatchUsername": true }', 993 'example_value': '{ "RemoteAccessHostMatchUsername": true }',
994 'id': 289, 994 'id': 289,
995 'caption': '''Policy overrides for Debug builds of the remote access h ost''', 995 'caption': '''Policy overrides for Debug builds of the remote access h ost''',
996 'tags': [], 996 'tags': [],
997 'desc': '''Overrides policies on Debug builds of the remote access hos t. 997 'desc': '''Overrides policies on Debug builds of the remote access hos t.
998 998
999 The value is parsed as a JSON dictionary of policy name to policy valu e mappings.''', 999 The value is parsed as a JSON dictionary of policy name to policy valu e mappings.''',
1000 }, 1000 },
1001 {
1002 'name': 'RemoteAssistanceHostAllowUiAccess',
Sergey Ulanov 2016/08/18 05:55:51 Many RemoteAccess* policies are applicable for It2
joedow 2016/08/18 17:06:07 I went back and forth on this a bit. Using the Re
1003 'type': 'main',
1004 'schema': { 'type': 'boolean' },
1005 'supported_on': ['chrome.win:54-'],
1006 'features': {
1007 'dynamic_refresh': False,
1008 'per_profile': False,
1009 },
1010 'example_value': True,
1011 'id': 341,
1012 'caption': '''Allow remote users to interact with elevated windows in remote assistance sessions''',
1013 'tags': [],
1014 'desc': '''If this setting is enabled, the remote assistance host will be run in a process with uiAccess permissions. This will allow remote users to interact with elevated windows on the local user's desktop.
Thiemo Nagel 2016/08/18 11:46:17 What's that uiAccess? It seems like a non-transla
joedow 2016/08/18 17:06:07 Done.
1015
1016 If this setting is disabled or not configured, the remote assistance h ost will run in the user's context and remote users cannot interact with elevate d windows on the desktop.''',
Sergey Ulanov 2016/08/18 05:55:51 Can we enable UI access by default?
joedow 2016/08/18 17:06:07 We decided to disable this by default as enabling
1017 },
1001 ], 1018 ],
1002 }, 1019 },
1003 { 1020 {
1004 'name': 'PrintingEnabled', 1021 'name': 'PrintingEnabled',
1005 'type': 'main', 1022 'type': 'main',
1006 'schema': { 'type': 'boolean' }, 1023 'schema': { 'type': 'boolean' },
1007 'supported_on': ['chrome.*:8-', 'chrome_os:11-', 'android:39-'], 1024 'supported_on': ['chrome.*:8-', 'chrome_os:11-', 'android:39-'],
1008 'features': { 1025 'features': {
1009 'dynamic_refresh': True, 1026 'dynamic_refresh': True,
1010 'per_profile': True, 1027 'per_profile': True,
(...skipping 7942 matching lines...) Expand 10 before | Expand all | Expand 10 after
8953 'desc': '''Text appended in parentheses next to the policies top-level con tainer to indicate that those policies are of the Recommended level''', 8970 'desc': '''Text appended in parentheses next to the policies top-level con tainer to indicate that those policies are of the Recommended level''',
8954 'text': 'Default Settings (users can override)', 8971 'text': 'Default Settings (users can override)',
8955 }, 8972 },
8956 'doc_complex_policies_on_windows': { 8973 'doc_complex_policies_on_windows': {
8957 'desc': '''Text pointing the user to a help article for complex policies o n Windows''', 8974 'desc': '''Text pointing the user to a help article for complex policies o n Windows''',
8958 'text': '''encoded as a JSON string, for details see <ph name="COMPLEX_POL ICIES_URL">https://www.chromium.org/administrators/complex-policies-on-windows<e x>https://www.chromium.org/administrators/complex-policies-on-windows</ex></ph>' '', 8975 'text': '''encoded as a JSON string, for details see <ph name="COMPLEX_POL ICIES_URL">https://www.chromium.org/administrators/complex-policies-on-windows<e x>https://www.chromium.org/administrators/complex-policies-on-windows</ex></ph>' '',
8959 }, 8976 },
8960 }, 8977 },
8961 'placeholders': [], 8978 'placeholders': [],
8962 } 8979 }
OLDNEW
« no previous file with comments | « chrome/test/data/policy/policy_test_cases.json ('k') | remoting/host/policy_watcher.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698