Index: components/policy/proto/device_management_backend.proto |
diff --git a/components/policy/proto/device_management_backend.proto b/components/policy/proto/device_management_backend.proto |
index 0425d1087278d148c52e39128f30164d44626550..e3b69391b23cb8c3f0763ddae0f6e085323e82a7 100644 |
--- a/components/policy/proto/device_management_backend.proto |
+++ b/components/policy/proto/device_management_backend.proto |
@@ -599,6 +599,11 @@ message DeviceStateKeyUpdateRequest { |
repeated bytes server_backed_state_key = 1; |
} |
+message DisabledState { |
+ // A message to the finder/thief that should be shown on the screen. |
+ optional string message = 1; |
+} |
+ |
// Server to client message carrying the device state response. Because the |
// request is not authenticated, the only protection against state extraction |
// from server is the unpredictability of the server-backed state ID. Thus, the |
@@ -620,6 +625,9 @@ message DeviceStateRetrievalResponse { |
// Primary domain the device is associated with. |
optional string management_domain = 2; |
+ |
+ // The device is disabled and no logins are possible when this is set. |
+ optional DisabledState disabled_state = 3; |
} |
// Sent by the client to the server to pair the Host device with the Controller |