OLD | NEW |
1 { | 1 { |
2 # policy_templates.json - Metafile for policy templates | 2 # policy_templates.json - Metafile for policy templates |
3 # | 3 # |
4 # The content of this file is evaluated as a Python expression. | 4 # The content of this file is evaluated as a Python expression. |
5 # | 5 # |
6 # This file is used as input to generate the following policy templates: | 6 # This file is used as input to generate the following policy templates: |
7 # ADM, ADMX+ADML, MCX/plist and html documentation. | 7 # ADM, ADMX+ADML, MCX/plist and html documentation. |
8 # | 8 # |
9 # Policy templates are user interface definitions or documents about the | 9 # Policy templates are user interface definitions or documents about the |
10 # policies that can be used to configure Chrome. Each policy is a name-value | 10 # policies that can be used to configure Chrome. Each policy is a name-value |
(...skipping 105 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
116 # templates and documentation. The policy definition list that Chrome sees | 116 # templates and documentation. The policy definition list that Chrome sees |
117 # will include policies marked with 'future'. If a WIP policy isn't meant to | 117 # will include policies marked with 'future'. If a WIP policy isn't meant to |
118 # be seen by the policy providers either, the 'supported_on' key should be set | 118 # be seen by the policy providers either, the 'supported_on' key should be set |
119 # to an empty list. | 119 # to an empty list. |
120 # | 120 # |
121 # IDs: | 121 # IDs: |
122 # Since a Protocol Buffer definition is generated from this file, unique and | 122 # Since a Protocol Buffer definition is generated from this file, unique and |
123 # persistent IDs for all fields (but not for groups!) are needed. These are | 123 # persistent IDs for all fields (but not for groups!) are needed. These are |
124 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, | 124 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, |
125 # because doing so would break the deployed wire format! | 125 # because doing so would break the deployed wire format! |
126 # For your editing convenience: highest ID currently used: 284 | 126 # For your editing convenience: highest ID currently used: 289 |
127 # | 127 # |
128 # Placeholders: | 128 # Placeholders: |
129 # The following placeholder strings are automatically substituted: | 129 # The following placeholder strings are automatically substituted: |
130 # $1 -> Google Chrome / Chromium | 130 # $1 -> Google Chrome / Chromium |
131 # $2 -> Google Chrome OS / Chromium OS | 131 # $2 -> Google Chrome OS / Chromium OS |
132 # $3 -> Google Chrome Frame / Chromium Frame | 132 # $3 -> Google Chrome Frame / Chromium Frame |
133 # $6 is reserved for doc_writer | 133 # $6 is reserved for doc_writer |
134 # | 134 # |
135 # Device Policy: | 135 # Device Policy: |
136 # An additional flag device_only (optional, defaults to False) indicates | 136 # An additional flag device_only (optional, defaults to False) indicates |
(...skipping 441 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
578 Enables usage of STUN and relay servers when connecting to a remote cl
ient. | 578 Enables usage of STUN and relay servers when connecting to a remote cl
ient. |
579 | 579 |
580 If this setting is enabled, then this machine can discover and connect
to remote host machines even if they are separated by a firewall. | 580 If this setting is enabled, then this machine can discover and connect
to remote host machines even if they are separated by a firewall. |
581 | 581 |
582 If this setting is disabled and outgoing UDP connections are filtered
by the firewall, then this machine can only connect to host machines within the
local network.''', | 582 If this setting is disabled and outgoing UDP connections are filtered
by the firewall, then this machine can only connect to host machines within the
local network.''', |
583 }, | 583 }, |
584 { | 584 { |
585 'name': 'RemoteAccessHostFirewallTraversal', | 585 'name': 'RemoteAccessHostFirewallTraversal', |
586 'type': 'main', | 586 'type': 'main', |
587 'schema': { 'type': 'boolean' }, | 587 'schema': { 'type': 'boolean' }, |
588 'supported_on': ['chrome.*:14-'], | 588 'supported_on': ['chrome.*:14-', 'chrome_os:41-'], |
589 'features': { | 589 'features': { |
590 'dynamic_refresh': True, | 590 'dynamic_refresh': True, |
591 'per_profile': False, | 591 'per_profile': False, |
592 }, | 592 }, |
593 'example_value': False, | 593 'example_value': False, |
594 'id': 95, | 594 'id': 95, |
595 'caption': '''Enable firewall traversal from remote access host''', | 595 'caption': '''Enable firewall traversal from remote access host''', |
596 'desc': '''Enables usage of STUN servers when remote clients are tryin
g to establish a connection to this machine. | 596 'desc': '''Enables usage of STUN servers when remote clients are tryin
g to establish a connection to this machine. |
597 | 597 |
598 If this setting is enabled, then remote clients can discover and conne
ct to this machines even if they are separated by a firewall. | 598 If this setting is enabled, then remote clients can discover and conne
ct to this machines even if they are separated by a firewall. |
599 | 599 |
600 If this setting is disabled and outgoing UDP connections are filtered
by the firewall, then this machine will only allow connections from client machi
nes within the local network. | 600 If this setting is disabled and outgoing UDP connections are filtered
by the firewall, then this machine will only allow connections from client machi
nes within the local network. |
601 | 601 |
602 If this policy is left not set the setting will be enabled.''', | 602 If this policy is left not set the setting will be enabled.''', |
603 }, | 603 }, |
604 { | 604 { |
605 'name': 'RemoteAccessHostDomain', | 605 'name': 'RemoteAccessHostDomain', |
606 'type': 'string', | 606 'type': 'string', |
607 'schema': { 'type': 'string' }, | 607 'schema': { 'type': 'string' }, |
608 'supported_on': ['chrome.*:22-'], | 608 'supported_on': ['chrome.*:22-', 'chrome_os:41-'], |
609 'features': { | 609 'features': { |
610 'dynamic_refresh': True, | 610 'dynamic_refresh': True, |
611 'per_profile': False, | 611 'per_profile': False, |
612 }, | 612 }, |
613 'example_value': 'my-awesome-domain.com', | 613 'example_value': 'my-awesome-domain.com', |
614 'id': 154, | 614 'id': 154, |
615 'caption': '''Configure the required domain name for remote access hos
ts''', | 615 'caption': '''Configure the required domain name for remote access hos
ts''', |
616 'desc': '''Configures the required host domain name that will be impos
ed on remote access hosts and prevents users from changing it. | 616 'desc': '''Configures the required host domain name that will be impos
ed on remote access hosts and prevents users from changing it. |
617 | 617 |
618 If this setting is enabled, then hosts can be shared only using accoun
ts registered on the specified domain name. | 618 If this setting is enabled, then hosts can be shared only using accoun
ts registered on the specified domain name. |
619 | 619 |
620 If this setting is disabled or not set, then hosts can be shared using
any account.''', | 620 If this setting is disabled or not set, then hosts can be shared using
any account.''', |
621 }, | 621 }, |
622 { | 622 { |
623 'name': 'RemoteAccessHostRequireTwoFactor', | 623 'name': 'RemoteAccessHostRequireTwoFactor', |
624 'type': 'main', | 624 'type': 'main', |
625 'schema': { 'type': 'boolean' }, | 625 'schema': { 'type': 'boolean' }, |
626 'supported_on': ['chrome.*:22-'], | 626 'supported_on': ['chrome.*:22-', 'chrome_os:41-'], |
627 'features': { | 627 'features': { |
628 'dynamic_refresh': True, | 628 'dynamic_refresh': True, |
629 'per_profile': False, | 629 'per_profile': False, |
630 }, | 630 }, |
631 'example_value': False, | 631 'example_value': False, |
632 'id': 155, | 632 'id': 155, |
633 'caption': '''Enable two-factor authentication for remote access hosts
''', | 633 'caption': '''Enable two-factor authentication for remote access hosts
''', |
634 'desc': '''Enables two-factor authentication for remote access hosts i
nstead of a user-specified PIN. | 634 'desc': '''Enables two-factor authentication for remote access hosts i
nstead of a user-specified PIN. |
635 | 635 |
636 If this setting is enabled, then users must provide a valid two-factor
code when accessing a host. | 636 If this setting is enabled, then users must provide a valid two-factor
code when accessing a host. |
637 | 637 |
638 If this setting is disabled or not set, then two-factor will not be en
abled and the default behavior of having a user-defined PIN will be used.''', | 638 If this setting is disabled or not set, then two-factor will not be en
abled and the default behavior of having a user-defined PIN will be used.''', |
639 }, | 639 }, |
640 { | 640 { |
641 'name': 'RemoteAccessHostTalkGadgetPrefix', | 641 'name': 'RemoteAccessHostTalkGadgetPrefix', |
642 'type': 'string', | 642 'type': 'string', |
643 'schema': { 'type': 'string' }, | 643 'schema': { 'type': 'string' }, |
644 'supported_on': ['chrome.*:22-'], | 644 'supported_on': ['chrome.*:22-', 'chrome_os:41-'], |
645 'features': { | 645 'features': { |
646 'dynamic_refresh': True, | 646 'dynamic_refresh': True, |
647 'per_profile': False, | 647 'per_profile': False, |
648 }, | 648 }, |
649 'example_value': 'chromoting-host', | 649 'example_value': 'chromoting-host', |
650 'id': 156, | 650 'id': 156, |
651 'caption': '''Configure the TalkGadget prefix for remote access hosts'
'', | 651 'caption': '''Configure the TalkGadget prefix for remote access hosts'
'', |
652 'desc': '''Configures the TalkGadget prefix that will be used by remot
e access hosts and prevents users from changing it. | 652 'desc': '''Configures the TalkGadget prefix that will be used by remot
e access hosts and prevents users from changing it. |
653 | 653 |
654 If specified, this prefix is prepended to the base TalkGadget name to
create a full domain name for the TalkGadget. The base TalkGadget domain name is
'.talkgadget.google.com'. | 654 If specified, this prefix is prepended to the base TalkGadget name to
create a full domain name for the TalkGadget. The base TalkGadget domain name is
'.talkgadget.google.com'. |
655 | 655 |
656 If this setting is enabled, then hosts will use the custom domain name
when accessing the TalkGadget instead of the default domain name. | 656 If this setting is enabled, then hosts will use the custom domain name
when accessing the TalkGadget instead of the default domain name. |
657 | 657 |
658 If this setting is disabled or not set, then the default TalkGadget do
main name ('chromoting-host.talkgadget.google.com') will be used for all hosts. | 658 If this setting is disabled or not set, then the default TalkGadget do
main name ('chromoting-host.talkgadget.google.com') will be used for all hosts. |
659 | 659 |
660 Remote access clients are not affected by this policy setting. They wi
ll always use 'chromoting-client.talkgadget.google.com' to access the TalkGadget
.''', | 660 Remote access clients are not affected by this policy setting. They wi
ll always use 'chromoting-client.talkgadget.google.com' to access the TalkGadget
.''', |
661 }, | 661 }, |
662 { | 662 { |
663 'name': 'RemoteAccessHostRequireCurtain', | 663 'name': 'RemoteAccessHostRequireCurtain', |
664 'type': 'main', | 664 'type': 'main', |
665 'schema': { 'type': 'boolean' }, | 665 'schema': { 'type': 'boolean' }, |
666 'supported_on': ['chrome.*:23-'], | 666 'supported_on': ['chrome.*:23-', 'chrome_os:41-'], |
667 'features': { | 667 'features': { |
668 'dynamic_refresh': True, | 668 'dynamic_refresh': True, |
669 'per_profile': False, | 669 'per_profile': False, |
670 }, | 670 }, |
671 'example_value': False, | 671 'example_value': False, |
672 'id': 157, | 672 'id': 157, |
673 'caption': '''Enable curtaining of remote access hosts''', | 673 'caption': '''Enable curtaining of remote access hosts''', |
674 'desc': '''Enables curtaining of remote access hosts while a connectio
n is in progress. | 674 'desc': '''Enables curtaining of remote access hosts while a connectio
n is in progress. |
675 | 675 |
676 If this setting is enabled, then hosts' physical input and output devi
ces are disabled while a remote connection is in progress. | 676 If this setting is enabled, then hosts' physical input and output devi
ces are disabled while a remote connection is in progress. |
677 | 677 |
678 If this setting is disabled or not set, then both local and remote use
rs can interact with the host when it is being shared.''', | 678 If this setting is disabled or not set, then both local and remote use
rs can interact with the host when it is being shared.''', |
679 }, | 679 }, |
680 { | 680 { |
681 'name': 'RemoteAccessHostAllowClientPairing', | 681 'name': 'RemoteAccessHostAllowClientPairing', |
682 'type': 'main', | 682 'type': 'main', |
683 'schema': { 'type': 'boolean' }, | 683 'schema': { 'type': 'boolean' }, |
684 'supported_on': ['chrome.*:30-'], | 684 'supported_on': ['chrome.*:30-', 'chrome_os:41-'], |
685 'features': { | 685 'features': { |
686 'dynamic_refresh': True, | 686 'dynamic_refresh': True, |
687 'per_profile': False, | 687 'per_profile': False, |
688 }, | 688 }, |
689 'example_value': False, | 689 'example_value': False, |
690 'id': 234, | 690 'id': 234, |
691 'caption': '''Enable or disable PIN-less authentication''', | 691 'caption': '''Enable or disable PIN-less authentication for remote acc
ess hosts''', |
692 'desc': '''If this setting is enabled or not configured, then users ca
n opt to pair clients and hosts at connection time, eliminating the need to ente
r a PIN every time. | 692 'desc': '''If this setting is enabled or not configured, then users ca
n opt to pair clients and hosts at connection time, eliminating the need to ente
r a PIN every time. |
693 | 693 |
694 If this setting is disabled, then this feature will not be available.'
'', | 694 If this setting is disabled, then this feature will not be available.'
'', |
695 }, | 695 }, |
696 { | 696 { |
697 'name': 'RemoteAccessHostAllowGnubbyAuth', | 697 'name': 'RemoteAccessHostAllowGnubbyAuth', |
698 'type': 'main', | 698 'type': 'main', |
699 'schema': { 'type': 'boolean' }, | 699 'schema': { 'type': 'boolean' }, |
700 'supported_on': ['chrome.*:35-'], | 700 'supported_on': ['chrome.*:35-', 'chrome_os:41-'], |
701 'features': { | 701 'features': { |
702 'dynamic_refresh': True, | 702 'dynamic_refresh': True, |
703 'per_profile': False, | 703 'per_profile': False, |
704 }, | 704 }, |
705 'example_value': True, | 705 'example_value': True, |
706 'id': 257, | 706 'id': 257, |
707 'caption': '''Allow gnubby authentication''', | 707 'caption': '''Allow gnubby authentication for remote access hosts''', |
708 'desc': '''If this setting is enabled, then gnubby authentication requ
ests will be proxied across a remote host connection. | 708 'desc': '''If this setting is enabled, then gnubby authentication requ
ests will be proxied across a remote host connection. |
709 | 709 |
710 If this setting is disabled or not configured, gnubby authentication r
equests will not be proxied.''', | 710 If this setting is disabled or not configured, gnubby authentication r
equests will not be proxied.''', |
711 }, | 711 }, |
712 { | 712 { |
713 'name': 'RemoteAccessHostAllowRelayedConnection', | 713 'name': 'RemoteAccessHostAllowRelayedConnection', |
714 'type': 'main', | 714 'type': 'main', |
715 'schema': { 'type': 'boolean' }, | 715 'schema': { 'type': 'boolean' }, |
716 'supported_on': ['chrome.*:36-'], | 716 'supported_on': ['chrome.*:36-', 'chrome_os:41-'], |
717 'features': { | 717 'features': { |
718 'dynamic_refresh': True, | 718 'dynamic_refresh': True, |
719 'per_profile': False, | 719 'per_profile': False, |
720 }, | 720 }, |
721 'example_value': False, | 721 'example_value': False, |
722 'id': 263, | 722 'id': 263, |
723 'caption': '''Enable the use of relay servers by the remote access hos
t''', | 723 'caption': '''Enable the use of relay servers by the remote access hos
t''', |
724 'desc': '''Enables usage of relay servers when remote clients are tryi
ng to establish a connection to this machine. | 724 'desc': '''Enables usage of relay servers when remote clients are tryi
ng to establish a connection to this machine. |
725 | 725 |
726 If this setting is enabled, then remote clients can use relay servers
to connect to this machine when a direct connection is not available (e.g. due t
o firewall restrictions). | 726 If this setting is enabled, then remote clients can use relay servers
to connect to this machine when a direct connection is not available (e.g. due t
o firewall restrictions). |
727 | 727 |
728 Note that if the policy <ph name="REMOTEACCESSHOSTFIREWALLTRAVERSAL_PO
LICY_NAME">RemoteAccessHostFirewallTraversal</ph> is disabled, this policy will
be ignored. | 728 Note that if the policy <ph name="REMOTEACCESSHOSTFIREWALLTRAVERSAL_PO
LICY_NAME">RemoteAccessHostFirewallTraversal</ph> is disabled, this policy will
be ignored. |
729 | 729 |
730 If this policy is left not set the setting will be enabled.''', | 730 If this policy is left not set the setting will be enabled.''', |
731 }, | 731 }, |
732 { | 732 { |
733 'name': 'RemoteAccessHostUdpPortRange', | 733 'name': 'RemoteAccessHostUdpPortRange', |
734 'type': 'string', | 734 'type': 'string', |
735 'schema': { 'type': 'string' }, | 735 'schema': { 'type': 'string' }, |
736 'supported_on': ['chrome.*:36-'], | 736 'supported_on': ['chrome.*:36-', 'chrome_os:41-'], |
737 'features': { | 737 'features': { |
738 'dynamic_refresh': True, | 738 'dynamic_refresh': True, |
739 'per_profile': False, | 739 'per_profile': False, |
740 }, | 740 }, |
741 'example_value': '12400-12409', | 741 'example_value': '12400-12409', |
742 'id': 264, | 742 'id': 264, |
743 'caption': '''Restrict the UDP port range used by the remote access ho
st''', | 743 'caption': '''Restrict the UDP port range used by the remote access ho
st''', |
744 'desc': '''Restricts the UDP port range used by the remote access host
in this machine. | 744 'desc': '''Restricts the UDP port range used by the remote access host
in this machine. |
745 | 745 |
746 If this policy is left not set, or if it is set to an empty string, th
e remote access host will be allowed to use any available port, unless the polic
y <ph name="REMOTEACCESSHOSTFIREWALLTRAVERSAL_POLICY_NAME">RemoteAccessHostFirew
allTraversal</ph> is disabled, in which case the remote access host will use UDP
ports in the 12400-12409 range.''', | 746 If this policy is left not set, or if it is set to an empty string, th
e remote access host will be allowed to use any available port, unless the polic
y <ph name="REMOTEACCESSHOSTFIREWALLTRAVERSAL_POLICY_NAME">RemoteAccessHostFirew
allTraversal</ph> is disabled, in which case the remote access host will use UDP
ports in the 12400-12409 range.''', |
747 }, | 747 }, |
| 748 { |
| 749 'name': 'RemoteAccessHostMatchUsername', |
| 750 'type': 'main', |
| 751 'schema': { 'type': 'boolean' }, |
| 752 'supported_on': ['chrome.linux:25-', 'chrome.mac:25-', 'chrome_os:42-'
], |
| 753 'features': { |
| 754 'dynamic_refresh': True, |
| 755 'per_profile': False, |
| 756 }, |
| 757 'example_value': False, |
| 758 'id': 285, |
| 759 'caption': '''Requires that the name of the local user and the remote
access host owner match''', |
| 760 'desc': '''Requires that the name of the local user and the remote acc
ess host owner match. |
| 761 |
| 762 If this setting is enabled, then the remote access host compares the n
ame of the local user (that the host is associated with) and the name of the Goo
gle account registered as the host owner (i.e. "johndoe" if the host is owned by
"johndoe@example.com" Google account). The remote access host will not start i
f the name of the host owner is different from the name of the local user that t
he host is associated with. RemoteAccessHostMatchUsername policy should be used
together with RemoteAccessHostDomain to also enforce that the Google account of
the host owner is associated with a specific domain (i.e. "example.com"). |
| 763 |
| 764 If this setting is disabled or not set, then the remote access host ca
n be associated with any local user.''', |
| 765 }, |
| 766 { |
| 767 'name': 'RemoteAccessHostTokenUrl', |
| 768 'type': 'string', |
| 769 'schema': { 'type': 'string' }, |
| 770 'supported_on': ['chrome.*:28-','chrome_os:42-'], |
| 771 'features': { |
| 772 'dynamic_refresh': True, |
| 773 'per_profile': False, |
| 774 }, |
| 775 'example_value': 'https://example.com/issue', |
| 776 'id': 286, |
| 777 'caption': '''URL where remote access clients should obtain their auth
entication token''', |
| 778 'desc': '''URL where remote access clients should obtain their authent
ication token. |
| 779 |
| 780 If this policy is set, the remote access host will require authenticat
ing clients to obtain an authentication token from this URL in order to connect.
Must be used in conjunction with RemoteAccessHostTokenValidationUrl. |
| 781 |
| 782 This feature is currently disabled server-side.''', |
| 783 }, |
| 784 { |
| 785 'name': 'RemoteAccessHostTokenValidationUrl', |
| 786 'type': 'string', |
| 787 'schema': { 'type': 'string' }, |
| 788 'supported_on': ['chrome.*:28-','chrome_os:42-'], |
| 789 'features': { |
| 790 'dynamic_refresh': True, |
| 791 'per_profile': False, |
| 792 }, |
| 793 'example_value': 'https://example.com/validate', |
| 794 'id': 287, |
| 795 'caption': '''URL for validating remote access client authentication t
oken''', |
| 796 'desc': '''URL for validating remote access client authentication toke
n. |
| 797 |
| 798 If this policy is set, the remote access host will use this URL to val
idate authentication tokens from remote access clients, in order to accept conne
ctions. Must be used in conjunction with RemoteAccessHostTokenUrl. |
| 799 |
| 800 This feature is currently disabled server-side.''', |
| 801 }, |
| 802 { |
| 803 'name': 'RemoteAccessHostTokenValidationCertificateIssuer', |
| 804 'type': 'string', |
| 805 'schema': { 'type': 'string' }, |
| 806 'supported_on': ['chrome.*:28-','chrome_os:42-'], |
| 807 'features': { |
| 808 'dynamic_refresh': True, |
| 809 'per_profile': False, |
| 810 }, |
| 811 'example_value': 'Example Certificate Authority', |
| 812 'id': 288, |
| 813 'caption': '''Client certificate for connecting to RemoteAccessHostTok
enValidationUrl''', |
| 814 'desc': '''Client certificate for connecting to RemoteAccessHostTokenV
alidationUrl. |
| 815 |
| 816 If this policy is set, the host will use a client certificate with the
given issuer CN to authenticate to RemoteAccessHostTokenValidationUrl. Set it t
o "*" to use any available client certificate. |
| 817 |
| 818 This feature is currently disabled server-side.''', |
| 819 }, |
| 820 { |
| 821 'name': 'RemoteAccessHostDebugOverridePolicies', |
| 822 'type': 'string', |
| 823 'schema': { 'type': 'string' }, |
| 824 'supported_on': ['chrome.*:25-','chrome_os:42-'], |
| 825 'features': { |
| 826 'dynamic_refresh': True, |
| 827 'per_profile': False, |
| 828 }, |
| 829 'example_value': '{ "RemoteAccessHostMatchUsername": true }', |
| 830 'id': 289, |
| 831 'caption': '''Policy overrides for Debug builds of the remote access h
ost''', |
| 832 'desc': '''Overrides policies on Debug builds of the remote access hos
t. |
| 833 |
| 834 The value is parsed as a JSON dictionary of policy name to policy valu
e mappings.''', |
| 835 }, |
748 ], | 836 ], |
749 }, | 837 }, |
750 { | 838 { |
751 'name': 'PrintingEnabled', | 839 'name': 'PrintingEnabled', |
752 'type': 'main', | 840 'type': 'main', |
753 'schema': { 'type': 'boolean' }, | 841 'schema': { 'type': 'boolean' }, |
754 'supported_on': ['chrome.*:8-', 'chrome_os:11-', 'android:39-'], | 842 'supported_on': ['chrome.*:8-', 'chrome_os:11-', 'android:39-'], |
755 'features': { | 843 'features': { |
756 'dynamic_refresh': True, | 844 'dynamic_refresh': True, |
757 'per_profile': True, | 845 'per_profile': True, |
(...skipping 6403 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
7161 'desc': '''Text appended in parentheses next to the policies top-level con
tainer to indicate that those policies are of the Recommended level''', | 7249 'desc': '''Text appended in parentheses next to the policies top-level con
tainer to indicate that those policies are of the Recommended level''', |
7162 'text': 'Default Settings (users can override)', | 7250 'text': 'Default Settings (users can override)', |
7163 }, | 7251 }, |
7164 'doc_complex_policies_on_windows': { | 7252 'doc_complex_policies_on_windows': { |
7165 'desc': '''Text pointing the user to a help article for complex policies o
n Windows''', | 7253 'desc': '''Text pointing the user to a help article for complex policies o
n Windows''', |
7166 'text': '''encoded as a JSON string, for details see <ph name="COMPLEX_POL
ICIES_URL">http://www.chromium.org/administrators/complex-policies-on-windows<ex
>http://www.chromium.org/administrators/complex-policies-on-windows</ex></ph>'''
, | 7254 'text': '''encoded as a JSON string, for details see <ph name="COMPLEX_POL
ICIES_URL">http://www.chromium.org/administrators/complex-policies-on-windows<ex
>http://www.chromium.org/administrators/complex-policies-on-windows</ex></ph>'''
, |
7167 }, | 7255 }, |
7168 }, | 7256 }, |
7169 'placeholders': [], | 7257 'placeholders': [], |
7170 } | 7258 } |
OLD | NEW |