Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(501)

Unified Diff: components/policy/resources/policy_templates.json

Issue 2252243002: Adding a policy for using the uiAccess enabled It2Me binary on Windows (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Merging with ToT Created 4 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « chrome/test/data/policy/policy_test_cases.json ('k') | remoting/host/policy_watcher.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: components/policy/resources/policy_templates.json
diff --git a/components/policy/resources/policy_templates.json b/components/policy/resources/policy_templates.json
index 71ba1845825d856c12a133511fb426193c8e9411..fb87902d9e618577e20cfd97d121e5e3b2067f0c 100644
--- a/components/policy/resources/policy_templates.json
+++ b/components/policy/resources/policy_templates.json
@@ -137,7 +137,7 @@
# persistent IDs for all fields (but not for groups!) are needed. These are
# specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs,
# because doing so would break the deployed wire format!
-# For your editing convenience: highest ID currently used: 343
+# For your editing convenience: highest ID currently used: 344
#
# Placeholders:
# The following placeholder strings are automatically substituted:
@@ -998,6 +998,23 @@
The value is parsed as a JSON dictionary of policy name to policy value mappings.''',
},
+ {
+ 'name': 'RemoteAccessHostAllowUiAccessForRemoteAssistance',
+ 'type': 'main',
+ 'schema': { 'type': 'boolean' },
+ 'supported_on': ['chrome.win:55-'],
+ 'features': {
+ 'dynamic_refresh': False,
+ 'per_profile': False,
+ },
+ 'example_value': True,
+ 'id': 344,
+ 'caption': '''Allow remote users to interact with elevated windows in remote assistance sessions''',
+ 'tags': [],
bartfab (slow) 2016/08/29 12:57:31 It would seem that at least 'system-security' and
joedow 2016/08/29 22:44:40 I think system-security is a good call, admin-shar
+ 'desc': '''If this setting is enabled, the remote assistance host will be run in a process with <ph name="UIACCESS_PERMISSION_NAME">uiAccess</ph> permissions. This will allow remote users to interact with elevated windows on the local user's desktop.
+
+ If this setting is disabled or not configured, the remote assistance host will run in the user's context and remote users cannot interact with elevated windows on the desktop.''',
+ },
],
},
{
« no previous file with comments | « chrome/test/data/policy/policy_test_cases.json ('k') | remoting/host/policy_watcher.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698