Index: components/policy/resources/policy_templates.json |
diff --git a/components/policy/resources/policy_templates.json b/components/policy/resources/policy_templates.json |
index 7f159c7c76b6f9208b47f88e76661cbb0e787d9a..399d1037f8e07099094d27f953633c24094f1c3a 100644 |
--- a/components/policy/resources/policy_templates.json |
+++ b/components/policy/resources/policy_templates.json |
@@ -123,7 +123,7 @@ |
# persistent IDs for all fields (but not for groups!) are needed. These are |
# specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, |
# because doing so would break the deployed wire format! |
-# For your editing convenience: highest ID currently used: 284 |
+# For your editing convenience: highest ID currently used: 289 |
# |
# Placeholders: |
# The following placeholder strings are automatically substituted: |
@@ -745,6 +745,96 @@ |
If this policy is left not set, or if it is set to an empty string, the remote access host will be allowed to use any available port, unless the policy <ph name="REMOTEACCESSHOSTFIREWALLTRAVERSAL_POLICY_NAME">RemoteAccessHostFirewallTraversal</ph> is disabled, in which case the remote access host will use UDP ports in the 12400-12409 range.''', |
}, |
+ { |
+ 'name': 'RemoteAccessHostMatchUsername', |
+ 'type': 'main', |
+ 'schema': { 'type': 'boolean' }, |
+ 'supported_on': ['chrome.*:25-'], |
bartfab (slow)
2015/01/09 19:20:15
So these policies were actually working as of Chro
Łukasz Anforowicz
2015/01/09 19:47:27
Yes, but this assumes that when you say "Chrome 25
bartfab (slow)
2015/01/12 13:16:33
The CL description provides no context, so I had n
Łukasz Anforowicz
2015/01/12 18:32:58
Good point. I've added this to the CL description
|
+ 'features': { |
+ 'dynamic_refresh': True, |
+ 'per_profile': False, |
+ }, |
+ 'example_value': False, |
+ 'id': 285, |
+ 'caption': '''Requires that the name of the local user and the remote access host owner match''', |
+ 'desc': '''Requires that the name of the local user and the remote access host owner match. |
+ |
+ If this setting is enabled, then the remote access host compares the name of the local user (that the host is associated with) and the name of the Google account registered as the host owner (i.e. "lukasza" if the host is owned by "lukasza@chromium.org" Google account). The remote access host will not start if the name of the host owner is different from the name of the local user that the host is associated with. RemoteAccessHostMatchUsername policy should be used together with RemoteAccessHostDomain to also enforce that the Google account of the host owner is associated with a specific domain (i.e. "chromium.org"). |
Sergey Ulanov
2015/01/09 00:46:56
nit: Maybe use something like johndoe@example.com
Łukasz Anforowicz
2015/01/09 19:47:27
Done.
|
+ |
+ If this setting is disabled or not set, then the remote access host can be associated with any local user. |
+ |
+ This policy is ignored on Windows.''', |
bartfab (slow)
2015/01/09 19:20:15
Please set 'supported_on' to the actual supported
Łukasz Anforowicz
2015/01/09 19:47:27
Thanks for pointing this out. Done.
|
+ }, |
+ { |
+ 'name': 'RemoteAccessHostTokenUrl', |
+ 'type': 'string', |
+ 'schema': { 'type': 'string' }, |
+ 'supported_on': ['chrome.*:28-'], |
+ 'features': { |
+ 'dynamic_refresh': True, |
+ 'per_profile': False, |
+ }, |
+ 'example_value': 'https://example.com/issue', |
+ 'id': 286, |
+ 'caption': '''URL where remote access clients should obtain their authentication token''', |
+ 'desc': '''URL where remote access clients should obtain their authentication token. |
+ |
+ If this policy is set, the remote access host will require authenticating clients to obtain an authentication token from this URL in order to connect. Must be used in conjunction with RemoteAccessHostTokenValidationUrl. |
+ |
+ This feature is currently disabled server-side.''', |
+ }, |
+ { |
+ 'name': 'RemoteAccessHostTokenValidationUrl', |
+ 'type': 'string', |
+ 'schema': { 'type': 'string' }, |
+ 'supported_on': ['chrome.*:28-'], |
+ 'features': { |
+ 'dynamic_refresh': True, |
+ 'per_profile': False, |
+ }, |
+ 'example_value': 'https://example.com/validate', |
+ 'id': 287, |
+ 'caption': '''URL for validating remote access client authentication token''', |
+ 'desc': '''URL for validating remote access client authentication token. |
+ |
+ If this policy is set, the remote access host will use this URL to validate authentication tokens from remote access clients, in order to accept connections. Must be used in conjunction with RemoteAccessHostTokenUrl. |
+ |
+ This feature is currently disabled server-side.''', |
+ }, |
+ { |
+ 'name': 'RemoteAccessHostTokenValidationCertificateIssuer', |
+ 'type': 'string', |
+ 'schema': { 'type': 'string' }, |
+ 'supported_on': ['chrome.*:28-'], |
+ 'features': { |
+ 'dynamic_refresh': True, |
+ 'per_profile': False, |
+ }, |
+ 'example_value': 'Example Certificate Authority', |
+ 'id': 288, |
+ 'caption': '''Client certificate for connecting to RemoteAccessHostTokenValidationUrl''', |
+ 'desc': '''Client certificate for connecting to RemoteAccessHostTokenValidationUrl. |
+ |
+ If this policy is set, the host will use a client certificate with the given issuer CN to authenticate to RemoteAccessHostTokenValidationUrl. Set it to "*" to use any available client certificate. |
+ |
+ This feature is currently disabled server-side.''', |
+ }, |
+ { |
+ 'name': 'RemoteAccessHostDebugOverridePolicies', |
+ 'type': 'string', |
+ 'schema': { 'type': 'string' }, |
+ 'supported_on': ['chrome.*:25-'], |
+ 'features': { |
+ 'dynamic_refresh': True, |
+ 'per_profile': False, |
+ }, |
+ 'example_value': '{ "RemoteAccessHostMatchUsername": true }', |
+ 'id': 289, |
+ 'caption': '''Policy overrides for Debug builds of the remote access host''', |
+ 'desc': '''Overrides policies on Debug builds of the remote access host. |
+ |
+ The value is parsed as a JSON dictionary of policy name to policy value mappings.''', |
bartfab (slow)
2015/01/09 19:20:15
I presume the "policy" here has nothing to do with
Łukasz Anforowicz
2015/01/09 19:47:27
I tried to point this out by mentioning "remote ac
bartfab (slow)
2015/01/12 13:16:33
I think the key problem is that these policies are
Łukasz Anforowicz
2015/01/12 18:32:59
10 Chromoting policies have been present in policy
bartfab (slow)
2015/01/13 18:49:45
An interesting thing you said above is that you ar
Łukasz Anforowicz
2015/01/13 20:10:24
Yes. This is a bit painful, but probably the righ
|
+ }, |
], |
}, |
{ |