Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(14)

Side by Side Diff: components/policy/resources/policy_templates.json

Issue 2682473003: Add support for multiple allowed domains (Closed)
Patch Set: Rebase patch Created 3 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « chrome/test/data/policy/policy_test_cases.json ('k') | remoting/host/it2me/it2me_host.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 { 1 {
2 # policy_templates.json - Metafile for policy templates 2 # policy_templates.json - Metafile for policy templates
3 # 3 #
4 # The content of this file is evaluated as a Python expression. 4 # The content of this file is evaluated as a Python expression.
5 # 5 #
6 # This file is used as input to generate the following policy templates: 6 # This file is used as input to generate the following policy templates:
7 # ADM, ADMX+ADML, MCX/plist and html documentation. 7 # ADM, ADMX+ADML, MCX/plist and html documentation.
8 # 8 #
9 # Policy templates are user interface definitions or documents about the 9 # Policy templates are user interface definitions or documents about the
10 # policies that can be used to configure Chrome. Each policy is a name-value 10 # policies that can be used to configure Chrome. Each policy is a name-value
(...skipping 125 matching lines...) Expand 10 before | Expand all | Expand 10 after
136 # templates and documentation. The policy definition list that Chrome sees 136 # templates and documentation. The policy definition list that Chrome sees
137 # will include policies marked with 'future'. If a WIP policy isn't meant to 137 # will include policies marked with 'future'. If a WIP policy isn't meant to
138 # be seen by the policy providers either, the 'supported_on' key should be set 138 # be seen by the policy providers either, the 'supported_on' key should be set
139 # to an empty list. 139 # to an empty list.
140 # 140 #
141 # IDs: 141 # IDs:
142 # Since a Protocol Buffer definition is generated from this file, unique and 142 # Since a Protocol Buffer definition is generated from this file, unique and
143 # persistent IDs for all fields (but not for groups!) are needed. These are 143 # persistent IDs for all fields (but not for groups!) are needed. These are
144 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, 144 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs,
145 # because doing so would break the deployed wire format! 145 # because doing so would break the deployed wire format!
146 # For your editing convenience: highest ID currently used: 367 146 # For your editing convenience: highest ID currently used: 369
147 # And don't forget to also update the EnterprisePolicies enum of 147 # And don't forget to also update the EnterprisePolicies enum of
148 # histograms.xml (run 'python tools/metrics/histograms/update_policies.py'). 148 # histograms.xml (run 'python tools/metrics/histograms/update_policies.py').
149 # 149 #
150 # Placeholders: 150 # Placeholders:
151 # The following placeholder strings are automatically substituted: 151 # The following placeholder strings are automatically substituted:
152 # $1 -> Google Chrome / Chromium 152 # $1 -> Google Chrome / Chromium
153 # $2 -> Google Chrome OS / Chromium OS 153 # $2 -> Google Chrome OS / Chromium OS
154 # $3 -> Google Chrome Frame / Chromium Frame 154 # $3 -> Google Chrome Frame / Chromium Frame
155 # $6 is reserved for doc_writer 155 # $6 is reserved for doc_writer
156 # 156 #
(...skipping 606 matching lines...) Expand 10 before | Expand all | Expand 10 after
763 }, 763 },
764 { 764 {
765 'name': 'RemoteAccessHostClientDomain', 765 'name': 'RemoteAccessHostClientDomain',
766 'type': 'string', 766 'type': 'string',
767 'schema': { 'type': 'string' }, 767 'schema': { 'type': 'string' },
768 'supported_on': ['chrome.*:22-', 'chrome_os:41-'], 768 'supported_on': ['chrome.*:22-', 'chrome_os:41-'],
769 'features': { 769 'features': {
770 'dynamic_refresh': True, 770 'dynamic_refresh': True,
771 'per_profile': False, 771 'per_profile': False,
772 }, 772 },
773 'deprecated': True,
773 'example_value': 'my-awesome-domain.com', 774 'example_value': 'my-awesome-domain.com',
774 'id': 316, 775 'id': 316,
775 'caption': '''Configure the required domain name for remote access cli ents''', 776 'caption': '''Configure the required domain name for remote access cli ents''',
776 'tags': [], 777 'tags': [],
777 'desc': '''Configures the required client domain name that will be imp osed on remote access clients and prevents users from changing it. 778 'desc': '''This policy is deprecated. Please use RemoteAccessHostClien tDomainList instead.''',
Thiemo Nagel 2017/05/17 14:18:09 (here and below) Note that quoting a policy name
779 },
780 {
781 'name': 'RemoteAccessHostClientDomainList',
782 'type': 'list',
783 'schema': {
784 'type': 'array',
785 'items': { 'type': 'string' },
786 },
787 'supported_on': ['chrome.*:60-', 'chrome_os:60-'],
788 'features': {
789 'dynamic_refresh': True,
790 'per_profile': False,
791 },
792 'example_value': ['my-awesome-domain.com', 'my-auxiliary-domain.com'],
793 'id': 369,
794 'caption': '''Configure the required domain names for remote access cl ients''',
795 'tags': [],
796 'desc': '''Configures the required client domain names that will be im posed on remote access clients and prevents users from changing it.
778 797
779 If this setting is enabled, then only clients from the specified domai n can connect to the host. 798 If this setting is enabled, then only clients from one of the specifie d domains can connect to the host.
780 799
781 If this setting is disabled or not set, then the default policy for th e connection type is applied. For remote assistance, this allows clients from an y domain can connect to the host; for anytime remote access, only the host owner can connect. 800 If this setting is disabled or not set, then the default policy for th e connection type is applied. For remote assistance, this allows clients from an y domain to connect to the host; for anytime remote access, only the host owner can connect.
782 801
783 See also RemoteAccessHostDomain.''', 802 This setting will override RemoteAccessHostClientDomain, if present.
803
804 See also RemoteAccessHostDomainList.''',
784 }, 805 },
785 { 806 {
786 'name': 'RemoteAccessHostFirewallTraversal', 807 'name': 'RemoteAccessHostFirewallTraversal',
787 'type': 'main', 808 'type': 'main',
788 'schema': { 'type': 'boolean' }, 809 'schema': { 'type': 'boolean' },
789 'supported_on': ['chrome.*:14-', 'chrome_os:41-'], 810 'supported_on': ['chrome.*:14-', 'chrome_os:41-'],
790 'features': { 811 'features': {
791 'dynamic_refresh': True, 812 'dynamic_refresh': True,
792 'per_profile': False, 813 'per_profile': False,
793 }, 814 },
(...skipping 11 matching lines...) Expand all
805 }, 826 },
806 { 827 {
807 'name': 'RemoteAccessHostDomain', 828 'name': 'RemoteAccessHostDomain',
808 'type': 'string', 829 'type': 'string',
809 'schema': { 'type': 'string' }, 830 'schema': { 'type': 'string' },
810 'supported_on': ['chrome.*:22-', 'chrome_os:41-'], 831 'supported_on': ['chrome.*:22-', 'chrome_os:41-'],
811 'features': { 832 'features': {
812 'dynamic_refresh': True, 833 'dynamic_refresh': True,
813 'per_profile': False, 834 'per_profile': False,
814 }, 835 },
836 'deprecated': True,
815 'example_value': 'my-awesome-domain.com', 837 'example_value': 'my-awesome-domain.com',
816 'id': 154, 838 'id': 154,
817 'caption': '''Configure the required domain name for remote access hos ts''', 839 'caption': '''Configure the required domain name for remote access hos ts''',
818 'tags': [], 840 'tags': [],
819 'desc': '''Configures the required host domain name that will be impos ed on remote access hosts and prevents users from changing it. 841 'desc': '''This policy is deprecated. Please use RemoteAccessHostDomai nList instead.''',
842 },
843 {
844 'name': 'RemoteAccessHostDomainList',
845 'type': 'list',
846 'schema': {
847 'type': 'array',
848 'items': {'type': 'string' },
849 },
850 'supported_on': ['chrome.*:60-', 'chrome_os:60-'],
851 'features': {
852 'dynamic_refresh': True,
853 'per_profile': False,
854 },
855 'example_value': ['my-awesome-domain.com', 'my-auxiliary-domain.com'],
856 'id': 368,
857 'caption': '''Configure the required domain names for remote access ho sts''',
858 'tags': [],
859 'desc': '''Configures the required host domain names that will be impo sed on remote access hosts and prevents users from changing it.
820 860
821 If this setting is enabled, then hosts can be shared only using accoun ts registered on the specified domain name. 861 If this setting is enabled, then hosts can be shared only using accoun ts registered on one of the specified domain names.
822 862
823 If this setting is disabled or not set, then hosts can be shared using any account. 863 If this setting is disabled or not set, then hosts can be shared using any account.
824 864
825 See also RemoteAccessHostClientDomain.''', 865 This setting will override RemoteAccessHostDomain, if present.
866
867 See also RemoteAccessHostClientDomainList.''',
826 }, 868 },
827 { 869 {
828 'name': 'RemoteAccessHostRequireTwoFactor', 870 'name': 'RemoteAccessHostRequireTwoFactor',
829 'type': 'main', 871 'type': 'main',
830 'schema': { 'type': 'boolean' }, 872 'schema': { 'type': 'boolean' },
831 'supported_on': ['chrome.*:22-22'], 873 'supported_on': ['chrome.*:22-22'],
832 'features': { 874 'features': {
833 'dynamic_refresh': True, 875 'dynamic_refresh': True,
834 'per_profile': False, 876 'per_profile': False,
835 }, 877 },
(...skipping 8788 matching lines...) Expand 10 before | Expand all | Expand 10 after
9624 'desc': '''Text appended in parentheses next to the policies top-level con tainer to indicate that those policies are of the Recommended level''', 9666 'desc': '''Text appended in parentheses next to the policies top-level con tainer to indicate that those policies are of the Recommended level''',
9625 'text': 'Default Settings (users can override)', 9667 'text': 'Default Settings (users can override)',
9626 }, 9668 },
9627 'doc_complex_policies_on_windows': { 9669 'doc_complex_policies_on_windows': {
9628 'desc': '''Text pointing the user to a help article for complex policies o n Windows''', 9670 'desc': '''Text pointing the user to a help article for complex policies o n Windows''',
9629 'text': '''encoded as a JSON string, for details see <ph name="COMPLEX_POL ICIES_URL">https://www.chromium.org/administrators/complex-policies-on-windows<e x>https://www.chromium.org/administrators/complex-policies-on-windows</ex></ph>' '', 9671 'text': '''encoded as a JSON string, for details see <ph name="COMPLEX_POL ICIES_URL">https://www.chromium.org/administrators/complex-policies-on-windows<e x>https://www.chromium.org/administrators/complex-policies-on-windows</ex></ph>' '',
9630 }, 9672 },
9631 }, 9673 },
9632 'placeholders': [], 9674 'placeholders': [],
9633 } 9675 }
OLDNEW
« no previous file with comments | « chrome/test/data/policy/policy_test_cases.json ('k') | remoting/host/it2me/it2me_host.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698