OLD | NEW |
---|---|
1 { | 1 { |
2 # policy_templates.json - Metafile for policy templates | 2 # policy_templates.json - Metafile for policy templates |
3 # | 3 # |
4 # The content of this file is evaluated as a Python expression. | 4 # The content of this file is evaluated as a Python expression. |
5 # | 5 # |
6 # This file is used as input to generate the following policy templates: | 6 # This file is used as input to generate the following policy templates: |
7 # ADM, ADMX+ADML, MCX/plist and html documentation. | 7 # ADM, ADMX+ADML, MCX/plist and html documentation. |
8 # | 8 # |
9 # Policy templates are user interface definitions or documents about the | 9 # Policy templates are user interface definitions or documents about the |
10 # policies that can be used to configure Chrome. Each policy is a name-value | 10 # policies that can be used to configure Chrome. Each policy is a name-value |
(...skipping 105 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
116 # templates and documentation. The policy definition list that Chrome sees | 116 # templates and documentation. The policy definition list that Chrome sees |
117 # will include policies marked with 'future'. If a WIP policy isn't meant to | 117 # will include policies marked with 'future'. If a WIP policy isn't meant to |
118 # be seen by the policy providers either, the 'supported_on' key should be set | 118 # be seen by the policy providers either, the 'supported_on' key should be set |
119 # to an empty list. | 119 # to an empty list. |
120 # | 120 # |
121 # IDs: | 121 # IDs: |
122 # Since a Protocol Buffer definition is generated from this file, unique and | 122 # Since a Protocol Buffer definition is generated from this file, unique and |
123 # persistent IDs for all fields (but not for groups!) are needed. These are | 123 # persistent IDs for all fields (but not for groups!) are needed. These are |
124 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, | 124 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, |
125 # because doing so would break the deployed wire format! | 125 # because doing so would break the deployed wire format! |
126 # For your editing convenience: highest ID currently used: 284 | 126 # For your editing convenience: highest ID currently used: 289 |
127 # | 127 # |
128 # Placeholders: | 128 # Placeholders: |
129 # The following placeholder strings are automatically substituted: | 129 # The following placeholder strings are automatically substituted: |
130 # $1 -> Google Chrome / Chromium | 130 # $1 -> Google Chrome / Chromium |
131 # $2 -> Google Chrome OS / Chromium OS | 131 # $2 -> Google Chrome OS / Chromium OS |
132 # $3 -> Google Chrome Frame / Chromium Frame | 132 # $3 -> Google Chrome Frame / Chromium Frame |
133 # $6 is reserved for doc_writer | 133 # $6 is reserved for doc_writer |
134 # | 134 # |
135 # Device Policy: | 135 # Device Policy: |
136 # An additional flag device_only (optional, defaults to False) indicates | 136 # An additional flag device_only (optional, defaults to False) indicates |
(...skipping 601 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
738 'dynamic_refresh': True, | 738 'dynamic_refresh': True, |
739 'per_profile': False, | 739 'per_profile': False, |
740 }, | 740 }, |
741 'example_value': '12400-12409', | 741 'example_value': '12400-12409', |
742 'id': 264, | 742 'id': 264, |
743 'caption': '''Restrict the UDP port range used by the remote access ho st''', | 743 'caption': '''Restrict the UDP port range used by the remote access ho st''', |
744 'desc': '''Restricts the UDP port range used by the remote access host in this machine. | 744 'desc': '''Restricts the UDP port range used by the remote access host in this machine. |
745 | 745 |
746 If this policy is left not set, or if it is set to an empty string, th e remote access host will be allowed to use any available port, unless the polic y <ph name="REMOTEACCESSHOSTFIREWALLTRAVERSAL_POLICY_NAME">RemoteAccessHostFirew allTraversal</ph> is disabled, in which case the remote access host will use UDP ports in the 12400-12409 range.''', | 746 If this policy is left not set, or if it is set to an empty string, th e remote access host will be allowed to use any available port, unless the polic y <ph name="REMOTEACCESSHOSTFIREWALLTRAVERSAL_POLICY_NAME">RemoteAccessHostFirew allTraversal</ph> is disabled, in which case the remote access host will use UDP ports in the 12400-12409 range.''', |
747 }, | 747 }, |
748 { | |
749 'name': 'RemoteAccessHostMatchUsername', | |
750 'type': 'main', | |
751 'schema': { 'type': 'boolean' }, | |
752 'supported_on': ['chrome.*:25-'], | |
753 'features': { | |
754 'dynamic_refresh': True, | |
755 'per_profile': False, | |
756 }, | |
757 'example_value': False, | |
758 'id': 285, | |
759 'caption': '''Requires that username of the local user and the remote access host owner match''', | |
760 'desc': '''Requires that username of the local user and the remote acc ess host owner match. | |
761 | |
762 If this setting is enabled, then the remote access host will not start if the name of the host owner is different from the name of the local user that the host is associated with. | |
Sergey Ulanov
2015/01/07 20:41:14
It's not clear from this description what "name of
Łukasz Anforowicz
2015/01/07 21:59:16
I tried to improve the description in patchset #5.
| |
763 | |
764 If this setting is disabled or not set, then the remote access host ca n be associated with any local user. | |
765 | |
766 This policy is ignored on Windows.''', | |
767 }, | |
768 { | |
769 'name': 'RemoteAccessHostTokenUrl', | |
770 'type': 'string', | |
771 'schema': { 'type': 'string' }, | |
772 'supported_on': ['chrome.*:28-'], | |
773 'features': { | |
774 'dynamic_refresh': True, | |
775 'per_profile': False, | |
776 }, | |
777 'example_value': 'https://example.com/issue', | |
778 'id': 286, | |
779 'caption': '''URL where remote access clients should obtain their auth entication token''', | |
780 'desc': '''URL where remote access clients should obtain their authent ication token. | |
781 | |
782 If this policy is set, the remote access host will require authenticat ing clients to obtain an authentication token from this URL in order to connect. Must be used in conjunction with RemoteAccessHostTokenValidationUrl. | |
783 | |
784 This feature is currently disabled server-side.''', | |
785 }, | |
786 { | |
787 'name': 'RemoteAccessHostTokenValidationUrl', | |
788 'type': 'string', | |
789 'schema': { 'type': 'string' }, | |
790 'supported_on': ['chrome.*:28-'], | |
791 'features': { | |
792 'dynamic_refresh': True, | |
793 'per_profile': False, | |
794 }, | |
795 'example_value': 'https://example.com/validate', | |
796 'id': 287, | |
797 'caption': '''URL for validating remote access client authentication t oken''', | |
798 'desc': '''URL for validating remote access client authentication toke n. | |
799 | |
800 If this policy is set, the remote access host will use this URL to val idate authentication tokens from remote access clients, in order to accept conne ctions. Must be used in conjunction with RemoteAccessHostTokenUrl. | |
801 | |
802 This feature is currently disabled server-side.''', | |
803 }, | |
804 { | |
805 'name': 'RemoteAccessHostTokenValidationCertificateIssuer', | |
806 'type': 'string', | |
807 'schema': { 'type': 'string' }, | |
808 'supported_on': ['chrome.*:28-'], | |
809 'features': { | |
810 'dynamic_refresh': True, | |
811 'per_profile': False, | |
812 }, | |
813 'example_value': 'Example Certificate Authority', | |
814 'id': 288, | |
815 'caption': '''Client certificate for connecting to RemoteAccessHostTok enValidationUrl''', | |
816 'desc': '''Client certificate for connecting to RemoteAccessHostTokenV alidationUrl. | |
817 | |
818 If this policy is set, the host will use a client certificate with the given issuer CN to authenticate to RemoteAccessHostTokenValidationUrl. Set it t o "*" to use any available client certificate. | |
819 | |
820 This feature is currently disabled server-side.''', | |
821 }, | |
822 { | |
823 'name': 'RemoteAccessHostDebugOverridePolicies', | |
824 'type': 'string', | |
825 'schema': { 'type': 'string' }, | |
826 'supported_on': ['chrome.*:25-'], | |
827 'features': { | |
828 'dynamic_refresh': True, | |
829 'per_profile': False, | |
830 }, | |
831 'example_value': '{ "RemoteAccessHostMatchUsername": true }', | |
832 'id': 289, | |
833 'caption': '''Policy overrides for Debug builds of the remote access h ost''', | |
834 'desc': '''Overrides policies on Debug builds of the remote access hos t. | |
835 | |
836 The value is parsed as a JSON dictionary of policy name to policy valu e mappings.''', | |
837 }, | |
748 ], | 838 ], |
749 }, | 839 }, |
750 { | 840 { |
751 'name': 'PrintingEnabled', | 841 'name': 'PrintingEnabled', |
752 'type': 'main', | 842 'type': 'main', |
753 'schema': { 'type': 'boolean' }, | 843 'schema': { 'type': 'boolean' }, |
754 'supported_on': ['chrome.*:8-', 'chrome_os:11-', 'android:39-'], | 844 'supported_on': ['chrome.*:8-', 'chrome_os:11-', 'android:39-'], |
755 'features': { | 845 'features': { |
756 'dynamic_refresh': True, | 846 'dynamic_refresh': True, |
757 'per_profile': True, | 847 'per_profile': True, |
(...skipping 6403 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
7161 'desc': '''Text appended in parentheses next to the policies top-level con tainer to indicate that those policies are of the Recommended level''', | 7251 'desc': '''Text appended in parentheses next to the policies top-level con tainer to indicate that those policies are of the Recommended level''', |
7162 'text': 'Default Settings (users can override)', | 7252 'text': 'Default Settings (users can override)', |
7163 }, | 7253 }, |
7164 'doc_complex_policies_on_windows': { | 7254 'doc_complex_policies_on_windows': { |
7165 'desc': '''Text pointing the user to a help article for complex policies o n Windows''', | 7255 'desc': '''Text pointing the user to a help article for complex policies o n Windows''', |
7166 'text': '''encoded as a JSON string, for details see <ph name="COMPLEX_POL ICIES_URL">http://www.chromium.org/administrators/complex-policies-on-windows<ex >http://www.chromium.org/administrators/complex-policies-on-windows</ex></ph>''' , | 7256 'text': '''encoded as a JSON string, for details see <ph name="COMPLEX_POL ICIES_URL">http://www.chromium.org/administrators/complex-policies-on-windows<ex >http://www.chromium.org/administrators/complex-policies-on-windows</ex></ph>''' , |
7167 }, | 7257 }, |
7168 }, | 7258 }, |
7169 'placeholders': [], | 7259 'placeholders': [], |
7170 } | 7260 } |
OLD | NEW |