OLD | NEW |
---|---|
1 { | 1 { |
2 # policy_templates.json - Metafile for policy templates | 2 # policy_templates.json - Metafile for policy templates |
3 # | 3 # |
4 # The content of this file is evaluated as a Python expression. | 4 # The content of this file is evaluated as a Python expression. |
5 # | 5 # |
6 # This file is used as input to generate the following policy templates: | 6 # This file is used as input to generate the following policy templates: |
7 # ADM, ADMX+ADML, MCX/plist and html documentation. | 7 # ADM, ADMX+ADML, MCX/plist and html documentation. |
8 # | 8 # |
9 # Policy templates are user interface definitions or documents about the | 9 # Policy templates are user interface definitions or documents about the |
10 # policies that can be used to configure Chrome. Each policy is a name-value | 10 # policies that can be used to configure Chrome. Each policy is a name-value |
(...skipping 105 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
116 # templates and documentation. The policy definition list that Chrome sees | 116 # templates and documentation. The policy definition list that Chrome sees |
117 # will include policies marked with 'future'. If a WIP policy isn't meant to | 117 # will include policies marked with 'future'. If a WIP policy isn't meant to |
118 # be seen by the policy providers either, the 'supported_on' key should be set | 118 # be seen by the policy providers either, the 'supported_on' key should be set |
119 # to an empty list. | 119 # to an empty list. |
120 # | 120 # |
121 # IDs: | 121 # IDs: |
122 # Since a Protocol Buffer definition is generated from this file, unique and | 122 # Since a Protocol Buffer definition is generated from this file, unique and |
123 # persistent IDs for all fields (but not for groups!) are needed. These are | 123 # persistent IDs for all fields (but not for groups!) are needed. These are |
124 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, | 124 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, |
125 # because doing so would break the deployed wire format! | 125 # because doing so would break the deployed wire format! |
126 # For your editing convenience: highest ID currently used: 284 | 126 # For your editing convenience: highest ID currently used: 289 |
127 # | 127 # |
128 # Placeholders: | 128 # Placeholders: |
129 # The following placeholder strings are automatically substituted: | 129 # The following placeholder strings are automatically substituted: |
130 # $1 -> Google Chrome / Chromium | 130 # $1 -> Google Chrome / Chromium |
131 # $2 -> Google Chrome OS / Chromium OS | 131 # $2 -> Google Chrome OS / Chromium OS |
132 # $3 -> Google Chrome Frame / Chromium Frame | 132 # $3 -> Google Chrome Frame / Chromium Frame |
133 # $6 is reserved for doc_writer | 133 # $6 is reserved for doc_writer |
134 # | 134 # |
135 # Device Policy: | 135 # Device Policy: |
136 # An additional flag device_only (optional, defaults to False) indicates | 136 # An additional flag device_only (optional, defaults to False) indicates |
(...skipping 601 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
738 'dynamic_refresh': True, | 738 'dynamic_refresh': True, |
739 'per_profile': False, | 739 'per_profile': False, |
740 }, | 740 }, |
741 'example_value': '12400-12409', | 741 'example_value': '12400-12409', |
742 'id': 264, | 742 'id': 264, |
743 'caption': '''Restrict the UDP port range used by the remote access ho st''', | 743 'caption': '''Restrict the UDP port range used by the remote access ho st''', |
744 'desc': '''Restricts the UDP port range used by the remote access host in this machine. | 744 'desc': '''Restricts the UDP port range used by the remote access host in this machine. |
745 | 745 |
746 If this policy is left not set, or if it is set to an empty string, th e remote access host will be allowed to use any available port, unless the polic y <ph name="REMOTEACCESSHOSTFIREWALLTRAVERSAL_POLICY_NAME">RemoteAccessHostFirew allTraversal</ph> is disabled, in which case the remote access host will use UDP ports in the 12400-12409 range.''', | 746 If this policy is left not set, or if it is set to an empty string, th e remote access host will be allowed to use any available port, unless the polic y <ph name="REMOTEACCESSHOSTFIREWALLTRAVERSAL_POLICY_NAME">RemoteAccessHostFirew allTraversal</ph> is disabled, in which case the remote access host will use UDP ports in the 12400-12409 range.''', |
747 }, | 747 }, |
748 { | |
749 'name': 'RemoteAccessHostMatchUsername', | |
750 'type': 'main', | |
751 'schema': { 'type': 'boolean' }, | |
752 'supported_on': ['chrome_os:25-', 'chrome.linux:25-', 'chrome.mac:25-' ], | |
753 'features': { | |
754 'dynamic_refresh': True, | |
755 'per_profile': False, | |
756 }, | |
757 'example_value': False, | |
758 'id': 285, | |
759 'caption': '''Requires that the name of the local user and the remote access host owner match''', | |
760 'desc': '''Requires that the name of the local user and the remote acc ess host owner match. | |
761 | |
762 If this setting is enabled, then the remote access host compares the n ame of the local user (that the host is associated with) and the name of the Goo gle account registered as the host owner (i.e. "johndoe" if the host is owned by "johndoe@example.com" Google account). The remote access host will not start i f the name of the host owner is different from the name of the local user that t he host is associated with. RemoteAccessHostMatchUsername policy should be used together with RemoteAccessHostDomain to also enforce that the Google account of the host owner is associated with a specific domain (i.e. "example.com"). | |
763 | |
764 If this setting is disabled or not set, then the remote access host ca n be associated with any local user.''', | |
765 }, | |
766 { | |
767 'name': 'RemoteAccessHostTokenUrl', | |
768 'type': 'string', | |
769 'schema': { 'type': 'string' }, | |
770 'supported_on': ['chrome.*:28-'], | |
bartfab (slow)
2015/01/13 18:49:45
Note that |chrome.*| does not include Chrome OS. I
Łukasz Anforowicz
2015/01/13 20:10:24
Thanks for pointing this out. Fixed/done.
I noti
| |
771 'features': { | |
772 'dynamic_refresh': True, | |
773 'per_profile': False, | |
774 }, | |
775 'example_value': 'https://example.com/issue', | |
776 'id': 286, | |
777 'caption': '''URL where remote access clients should obtain their auth entication token''', | |
778 'desc': '''URL where remote access clients should obtain their authent ication token. | |
779 | |
780 If this policy is set, the remote access host will require authenticat ing clients to obtain an authentication token from this URL in order to connect. Must be used in conjunction with RemoteAccessHostTokenValidationUrl. | |
781 | |
782 This feature is currently disabled server-side.''', | |
783 }, | |
784 { | |
785 'name': 'RemoteAccessHostTokenValidationUrl', | |
786 'type': 'string', | |
787 'schema': { 'type': 'string' }, | |
788 'supported_on': ['chrome.*:28-'], | |
789 'features': { | |
790 'dynamic_refresh': True, | |
791 'per_profile': False, | |
792 }, | |
793 'example_value': 'https://example.com/validate', | |
794 'id': 287, | |
795 'caption': '''URL for validating remote access client authentication t oken''', | |
796 'desc': '''URL for validating remote access client authentication toke n. | |
797 | |
798 If this policy is set, the remote access host will use this URL to val idate authentication tokens from remote access clients, in order to accept conne ctions. Must be used in conjunction with RemoteAccessHostTokenUrl. | |
799 | |
800 This feature is currently disabled server-side.''', | |
801 }, | |
802 { | |
803 'name': 'RemoteAccessHostTokenValidationCertificateIssuer', | |
804 'type': 'string', | |
805 'schema': { 'type': 'string' }, | |
806 'supported_on': ['chrome.*:28-'], | |
807 'features': { | |
808 'dynamic_refresh': True, | |
809 'per_profile': False, | |
810 }, | |
811 'example_value': 'Example Certificate Authority', | |
812 'id': 288, | |
813 'caption': '''Client certificate for connecting to RemoteAccessHostTok enValidationUrl''', | |
814 'desc': '''Client certificate for connecting to RemoteAccessHostTokenV alidationUrl. | |
815 | |
816 If this policy is set, the host will use a client certificate with the given issuer CN to authenticate to RemoteAccessHostTokenValidationUrl. Set it t o "*" to use any available client certificate. | |
817 | |
818 This feature is currently disabled server-side.''', | |
819 }, | |
820 { | |
821 'name': 'RemoteAccessHostDebugOverridePolicies', | |
822 'type': 'string', | |
823 'schema': { 'type': 'string' }, | |
824 'supported_on': ['chrome.*:25-'], | |
825 'features': { | |
826 'dynamic_refresh': True, | |
827 'per_profile': False, | |
828 }, | |
829 'example_value': '{ "RemoteAccessHostMatchUsername": true }', | |
830 'id': 289, | |
831 'caption': '''Policy overrides for Debug builds of the remote access h ost''', | |
832 'desc': '''Overrides policies on Debug builds of the remote access hos t. | |
833 | |
834 The value is parsed as a JSON dictionary of policy name to policy valu e mappings.''', | |
835 }, | |
748 ], | 836 ], |
749 }, | 837 }, |
750 { | 838 { |
751 'name': 'PrintingEnabled', | 839 'name': 'PrintingEnabled', |
752 'type': 'main', | 840 'type': 'main', |
753 'schema': { 'type': 'boolean' }, | 841 'schema': { 'type': 'boolean' }, |
754 'supported_on': ['chrome.*:8-', 'chrome_os:11-', 'android:39-'], | 842 'supported_on': ['chrome.*:8-', 'chrome_os:11-', 'android:39-'], |
755 'features': { | 843 'features': { |
756 'dynamic_refresh': True, | 844 'dynamic_refresh': True, |
757 'per_profile': True, | 845 'per_profile': True, |
(...skipping 6403 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
7161 'desc': '''Text appended in parentheses next to the policies top-level con tainer to indicate that those policies are of the Recommended level''', | 7249 'desc': '''Text appended in parentheses next to the policies top-level con tainer to indicate that those policies are of the Recommended level''', |
7162 'text': 'Default Settings (users can override)', | 7250 'text': 'Default Settings (users can override)', |
7163 }, | 7251 }, |
7164 'doc_complex_policies_on_windows': { | 7252 'doc_complex_policies_on_windows': { |
7165 'desc': '''Text pointing the user to a help article for complex policies o n Windows''', | 7253 'desc': '''Text pointing the user to a help article for complex policies o n Windows''', |
7166 'text': '''encoded as a JSON string, for details see <ph name="COMPLEX_POL ICIES_URL">http://www.chromium.org/administrators/complex-policies-on-windows<ex >http://www.chromium.org/administrators/complex-policies-on-windows</ex></ph>''' , | 7254 'text': '''encoded as a JSON string, for details see <ph name="COMPLEX_POL ICIES_URL">http://www.chromium.org/administrators/complex-policies-on-windows<ex >http://www.chromium.org/administrators/complex-policies-on-windows</ex></ph>''' , |
7167 }, | 7255 }, |
7168 }, | 7256 }, |
7169 'placeholders': [], | 7257 'placeholders': [], |
7170 } | 7258 } |
OLD | NEW |