| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 syntax = "proto2"; | 5 syntax = "proto2"; |
| 6 | 6 |
| 7 option optimize_for = LITE_RUNTIME; | 7 option optimize_for = LITE_RUNTIME; |
| 8 | 8 |
| 9 package enterprise_management; | 9 package enterprise_management; |
| 10 | 10 |
| (...skipping 344 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 355 optional string parameter = 1; | 355 optional string parameter = 1; |
| 356 } | 356 } |
| 357 | 357 |
| 358 message AttestationSettingsProto { | 358 message AttestationSettingsProto { |
| 359 // Attestation involves proving that a cryptographic key is protected by a | 359 // Attestation involves proving that a cryptographic key is protected by a |
| 360 // legitimate Chrome OS TPM and reporting the operating mode of the platform. | 360 // legitimate Chrome OS TPM and reporting the operating mode of the platform. |
| 361 // This setting enables enterprise attestation features at a device level. If | 361 // This setting enables enterprise attestation features at a device level. If |
| 362 // this is enabled a machine key will be generated and certified by the Chrome | 362 // this is enabled a machine key will be generated and certified by the Chrome |
| 363 // OS CA. If this setting is disabled, even users with attestation settings | 363 // OS CA. If this setting is disabled, even users with attestation settings |
| 364 // enabled will not be able to use those features on the device. | 364 // enabled will not be able to use those features on the device. |
| 365 optional bool attestation_enabled = 1; | 365 optional bool attestation_enabled = 1 [default = false]; |
| 366 | 366 |
| 367 // Chrome OS devices can use remote attestation (Verified Access) to get a | 367 // Chrome OS devices can use remote attestation (Verified Access) to get a |
| 368 // certificate issued by the Chrome OS CA that asserts the device is eligible | 368 // certificate issued by the Chrome OS CA that asserts the device is eligible |
| 369 // to play protected content. This process involves sending hardware | 369 // to play protected content. This process involves sending hardware |
| 370 // endorsement information to the Chrome OS CA which uniquely identifies the | 370 // endorsement information to the Chrome OS CA which uniquely identifies the |
| 371 // device. This setting allows this feature to be disabled for the device | 371 // device. This setting allows this feature to be disabled for the device |
| 372 // regardless of any user-specific settings. | 372 // regardless of any user-specific settings. |
| 373 optional bool content_protection_enabled = 2; | 373 optional bool content_protection_enabled = 2 [default = true]; |
| 374 } | 374 } |
| 375 | 375 |
| 376 message AccessibilitySettingsProto { | 376 message AccessibilitySettingsProto { |
| 377 // Sets the default state of the large cursor accessibility feature on the | 377 // Sets the default state of the large cursor accessibility feature on the |
| 378 // login screen. If this policy is set to true, the large cursor will be | 378 // login screen. If this policy is set to true, the large cursor will be |
| 379 // enabled when the login screen is shown. If this policy is set to false, the | 379 // enabled when the login screen is shown. If this policy is set to false, the |
| 380 // large cursor will be disabled when the login screen is shown. Users can | 380 // large cursor will be disabled when the login screen is shown. Users can |
| 381 // temporarily override this setting by enabling or disabling the large | 381 // temporarily override this setting by enabling or disabling the large |
| 382 // cursor. However, the user's choice is not persistent and the default is | 382 // cursor. However, the user's choice is not persistent and the default is |
| 383 // restored whenever the login screen is shown anew or the user remains idle | 383 // restored whenever the login screen is shown anew or the user remains idle |
| (...skipping 175 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 559 optional AllowRedeemChromeOsRegistrationOffersProto allow_redeem_offers = 22; | 559 optional AllowRedeemChromeOsRegistrationOffersProto allow_redeem_offers = 22; |
| 560 optional StartUpFlagsProto start_up_flags = 23; | 560 optional StartUpFlagsProto start_up_flags = 23; |
| 561 optional UptimeLimitProto uptime_limit = 24; | 561 optional UptimeLimitProto uptime_limit = 24; |
| 562 optional VariationsParameterProto variations_parameter = 25; | 562 optional VariationsParameterProto variations_parameter = 25; |
| 563 optional AttestationSettingsProto attestation_settings = 26; | 563 optional AttestationSettingsProto attestation_settings = 26; |
| 564 optional AccessibilitySettingsProto accessibility_settings = 27; | 564 optional AccessibilitySettingsProto accessibility_settings = 27; |
| 565 optional SupervisedUsersSettingsProto supervised_users_settings = 28; | 565 optional SupervisedUsersSettingsProto supervised_users_settings = 28; |
| 566 optional LoginScreenPowerManagementProto login_screen_power_management = 29; | 566 optional LoginScreenPowerManagementProto login_screen_power_management = 29; |
| 567 optional SystemUse24HourClockProto use_24hour_clock = 30; | 567 optional SystemUse24HourClockProto use_24hour_clock = 30; |
| 568 } | 568 } |
| OLD | NEW |