The implementation of ModemManager1 policies has been edited

This commit is contained in:
Valentin Sokolov 2023-10-18 15:00:20 +04:00
parent f1feef03c6
commit 3cac99fbe5
3 changed files with 167 additions and 314 deletions

View File

@ -13,7 +13,7 @@
key="Software\BaseALT\Policies\Polkit"
name="org.freedesktop.ModemManager1.Contacts"
valuename="org.freedesktop.ModemManager1.Contacts"
presentation="$(presentation.org-freedesktop-ModemManager1-Contacts-pr)">
presentation="$(presentation.org-freedesktop-ModemManager1-pr)">
<parentCategory ref="system:ALT_ModemManagerPolkit" />
<supportedOn ref="system:SUPPORTED_AltP10" />
<elements>
@ -64,7 +64,7 @@
key="Software\BaseALT\Policies\Polkit"
name="org.freedesktop.ModemManager1.Contacts-user"
valuename="org.freedesktop.ModemManager1.Contacts"
presentation="$(presentation.org-freedesktop-ModemManager1-Contacts-pr)">
presentation="$(presentation.org-freedesktop-ModemManager1-user-pr)">
<parentCategory ref="system:ALT_ModemManagerPolkit" />
<supportedOn ref="system:SUPPORTED_AltP10" />
<elements>
@ -100,14 +100,6 @@
</value>
</item>
</enum>
<boolean id="OrgFreedesktopModemManager_blocker" key="Software\BaseALT\Policies\PolkitLocks" valueName="org.freedesktop.ModemManager1.Contacts">
<trueValue>
<decimal value="1" />
</trueValue>
<falseValue>
<decimal value="0" />
</falseValue>
</boolean>
</elements>
</policy>
<policy class="Machine" displayName="$(string.org-freedesktop-ModemManager1-Control)"
@ -115,7 +107,7 @@
key="Software\BaseALT\Policies\Polkit"
name="org.freedesktop.ModemManager1.Control"
valuename="org.freedesktop.ModemManager1.Control"
presentation="$(presentation.org-freedesktop-ModemManager1-Control-pr)">
presentation="$(presentation.org-freedesktop-ModemManager1-pr)">
<parentCategory ref="system:ALT_ModemManagerPolkit" />
<supportedOn ref="system:SUPPORTED_AltP10" />
<elements>
@ -161,12 +153,12 @@
</boolean>
</elements>
</policy>
<policy class="User" displayName="$(string.org-freedesktop-ModemManager1-Control)"
<policy class="User" displayName="$(string.org-freedesktop-ModemManager1-Control)"
explainText="$(string.org-freedesktop-ModemManager1-Control-user_help)"
key="Software\BaseALT\Policies\Polkit"
name="org.freedesktop.ModemManager1.Control-user"
valuename="org.freedesktop.ModemManager1.Control"
presentation="$(presentation.org-freedesktop-ModemManager1-Control-pr)">
presentation="$(presentation.org-freedesktop-ModemManager1-user-pr)">
<parentCategory ref="system:ALT_ModemManagerPolkit" />
<supportedOn ref="system:SUPPORTED_AltP10" />
<elements>
@ -202,14 +194,6 @@
</value>
</item>
</enum>
<boolean id="OrgFreedesktopModemManager_blocker" key="Software\BaseALT\Policies\PolkitLocks" valueName="org.freedesktop.ModemManager1.Control">
<trueValue>
<decimal value="1" />
</trueValue>
<falseValue>
<decimal value="0" />
</falseValue>
</boolean>
</elements>
</policy>
<policy class="Machine" displayName="$(string.org-freedesktop-ModemManager1-Device-Control)"
@ -217,7 +201,7 @@
key="Software\BaseALT\Policies\Polkit"
name="org.freedesktop.ModemManager1.Device.Control"
valuename="org.freedesktop.ModemManager1.Device.Control"
presentation="$(presentation.org-freedesktop-ModemManager1-Device-Control-pr)">
presentation="$(presentation.org-freedesktop-ModemManager1-pr)">
<parentCategory ref="system:ALT_ModemManagerPolkit" />
<supportedOn ref="system:SUPPORTED_AltP10" />
<elements>
@ -268,7 +252,7 @@
key="Software\BaseALT\Policies\Polkit"
name="org.freedesktop.ModemManager1.Device.Control-user"
valuename="org.freedesktop.ModemManager1.Device.Control"
presentation="$(presentation.org-freedesktop-ModemManager1-Device-Control-pr)">
presentation="$(presentation.org-freedesktop-ModemManager1-user-pr)">
<parentCategory ref="system:ALT_ModemManagerPolkit" />
<supportedOn ref="system:SUPPORTED_AltP10" />
<elements>
@ -304,14 +288,6 @@
</value>
</item>
</enum>
<boolean id="OrgFreedesktopModemManager_blocker" key="Software\BaseALT\Policies\PolkitLocks" valueName="org.freedesktop.ModemManager1.Device.Control">
<trueValue>
<decimal value="1" />
</trueValue>
<falseValue>
<decimal value="0" />
</falseValue>
</boolean>
</elements>
</policy>
<policy class="Machine" displayName="$(string.org-freedesktop-ModemManager1-Firmware)"
@ -319,7 +295,7 @@
key="Software\BaseALT\Policies\Polkit"
name="org.freedesktop.ModemManager1.Firmware"
valuename="org.freedesktop.ModemManager1.Device.Firmware"
presentation="$(presentation.org-freedesktop-ModemManager1-Firmware-pr)">
presentation="$(presentation.org-freedesktop-ModemManager1-pr)">
<parentCategory ref="system:ALT_ModemManagerPolkit" />
<supportedOn ref="system:SUPPORTED_AltP10" />
<elements>
@ -370,7 +346,7 @@
key="Software\BaseALT\Policies\Polkit"
name="org.freedesktop.ModemManager1.Firmware-user"
valuename="org.freedesktop.ModemManager1.Device.Firmware"
presentation="$(presentation.org-freedesktop-ModemManager1-Firmware-pr)">
presentation="$(presentation.org-freedesktop-ModemManager1-user-pr)">
<parentCategory ref="system:ALT_ModemManagerPolkit" />
<supportedOn ref="system:SUPPORTED_AltP10" />
<elements>
@ -406,14 +382,6 @@
</value>
</item>
</enum>
<boolean id="OrgFreedesktopModemManager_blocker" key="Software\BaseALT\Policies\PolkitLocks" valueName="org.freedesktop.ModemManager1.Firmware">
<trueValue>
<decimal value="1" />
</trueValue>
<falseValue>
<decimal value="0" />
</falseValue>
</boolean>
</elements>
</policy>
<policy class="Machine" displayName="$(string.org-freedesktop-ModemManager1-Location)"
@ -421,7 +389,7 @@
key="Software\BaseALT\Policies\Polkit"
name="org.freedesktop.ModemManager1.Location"
valuename="org.freedesktop.ModemManager1.Location"
presentation="$(presentation.org-freedesktop-ModemManager1-Location-pr)">
presentation="$(presentation.org-freedesktop-ModemManager1-pr)">
<parentCategory ref="system:ALT_ModemManagerPolkit" />
<supportedOn ref="system:SUPPORTED_AltP10" />
<elements>
@ -472,7 +440,7 @@
key="Software\BaseALT\Policies\Polkit"
name="org.freedesktop.ModemManager1.Location-user"
valuename="org.freedesktop.ModemManager1.Location"
presentation="$(presentation.org-freedesktop-ModemManager1-Location-pr)">
presentation="$(presentation.org-freedesktop-ModemManager1-user-pr)">
<parentCategory ref="system:ALT_ModemManagerPolkit" />
<supportedOn ref="system:SUPPORTED_AltP10" />
<elements>
@ -508,14 +476,6 @@
</value>
</item>
</enum>
<boolean id="OrgFreedesktopModemManager_blocker" key="Software\BaseALT\Policies\PolkitLocks" valueName="org.freedesktop.ModemManager1.Location">
<trueValue>
<decimal value="1" />
</trueValue>
<falseValue>
<decimal value="0" />
</falseValue>
</boolean>
</elements>
</policy>
<policy class="Machine" displayName="$(string.org-freedesktop-ModemManager1-Messaging)"
@ -523,7 +483,7 @@
key="Software\BaseALT\Policies\Polkit"
name="org.freedesktop.ModemManager1.Messaging"
valuename="org.freedesktop.ModemManager1.Messaging"
presentation="$(presentation.org-freedesktop-ModemManager1-Messaging-pr)">
presentation="$(presentation.org-freedesktop-ModemManager1-pr)">
<parentCategory ref="system:ALT_ModemManagerPolkit" />
<supportedOn ref="system:SUPPORTED_AltP10" />
<elements>
@ -574,7 +534,7 @@
key="Software\BaseALT\Policies\Polkit"
name="org.freedesktop.ModemManager1.Messaging-user"
valuename="org.freedesktop.ModemManager1.Messaging"
presentation="$(presentation.org-freedesktop-ModemManager1-Messaging-pr)">
presentation="$(presentation.org-freedesktop-ModemManager1-user-pr)">
<parentCategory ref="system:ALT_ModemManagerPolkit" />
<supportedOn ref="system:SUPPORTED_AltP10" />
<elements>
@ -610,14 +570,6 @@
</value>
</item>
</enum>
<boolean id="OrgFreedesktopModemManager_blocker" key="Software\BaseALT\Policies\PolkitLocks" valueName="org.freedesktop.ModemManager1.Messaging">
<trueValue>
<decimal value="1" />
</trueValue>
<falseValue>
<decimal value="0" />
</falseValue>
</boolean>
</elements>
</policy>
<policy class="Machine" displayName="$(string.org-freedesktop-ModemManager1-Time)"
@ -625,7 +577,7 @@
key="Software\BaseALT\Policies\Polkit"
name="org.freedesktop.ModemManager1.Time"
valuename="org.freedesktop.ModemManager1.Time"
presentation="$(presentation.org-freedesktop-ModemManager1-Time-pr)">
presentation="$(presentation.org-freedesktop-ModemManager1-pr)">
<parentCategory ref="system:ALT_ModemManagerPolkit" />
<supportedOn ref="system:SUPPORTED_AltP10" />
<elements>
@ -676,7 +628,7 @@
key="Software\BaseALT\Policies\Polkit"
name="org.freedesktop.ModemManager1.Time-user"
valuename="org.freedesktop.ModemManager1.Time"
presentation="$(presentation.org-freedesktop-ModemManager1-Time-pr)">
presentation="$(presentation.org-freedesktop-ModemManager1-user-pr)">
<parentCategory ref="system:ALT_ModemManagerPolkit" />
<supportedOn ref="system:SUPPORTED_AltP10" />
<elements>
@ -712,14 +664,6 @@
</value>
</item>
</enum>
<boolean id="OrgFreedesktopModemManager_blocker" key="Software\BaseALT\Policies\PolkitLocks" valueName="org.freedesktop.ModemManager1.Time">
<trueValue>
<decimal value="1" />
</trueValue>
<falseValue>
<decimal value="0" />
</falseValue>
</boolean>
</elements>
</policy>
<policy class="Machine" displayName="$(string.org-freedesktop-ModemManager1-USSD)"
@ -727,7 +671,7 @@
key="Software\BaseALT\Policies\Polkit"
name="org.freedesktop.ModemManager1.USSD"
valuename="org.freedesktop.ModemManager1.USSD"
presentation="$(presentation.org-freedesktop-ModemManager1-USSD-pr)">
presentation="$(presentation.org-freedesktop-ModemManager1-pr)">
<parentCategory ref="system:ALT_ModemManagerPolkit" />
<supportedOn ref="system:SUPPORTED_AltP10" />
<elements>
@ -778,7 +722,7 @@
key="Software\BaseALT\Policies\Polkit"
name="org.freedesktop.ModemManager1.USSDUser"
valuename="org.freedesktop.ModemManager1.USSD"
presentation="$(presentation.org-freedesktop-ModemManager1-USSD-pr)">
presentation="$(presentation.org-freedesktop-ModemManager1-user-pr)">
<parentCategory ref="system:ALT_ModemManagerPolkit" />
<supportedOn ref="system:SUPPORTED_AltP10" />
<elements>
@ -814,14 +758,6 @@
</value>
</item>
</enum>
<boolean id="OrgFreedesktopModemManager_blocker" key="Software\BaseALT\Policies\PolkitLocks" valueName="org.freedesktop.ModemManager1.USSD">
<trueValue>
<decimal value="1" />
</trueValue>
<falseValue>
<decimal value="0" />
</falseValue>
</boolean>
</elements>
</policy>
<policy class="Machine" displayName="$(string.org-freedesktop-ModemManager1-Voice)"
@ -829,7 +765,7 @@
key="Software\BaseALT\Policies\Polkit"
name="org.freedesktop.ModemManager1.Voice"
valuename="org.freedesktop.ModemManager1.Voice"
presentation="$(presentation.org-freedesktop-ModemManager1-Voice-pr)">
presentation="$(presentation.org-freedesktop-ModemManager1-pr)">
<parentCategory ref="system:ALT_ModemManagerPolkit" />
<supportedOn ref="system:SUPPORTED_AltP10" />
<elements>
@ -880,7 +816,7 @@
key="Software\BaseALT\Policies\Polkit"
name="org.freedesktop.ModemManager1.VoiceUser"
valuename="org.freedesktop.ModemManager1.Voice"
presentation="$(presentation.org-freedesktop-ModemManager1-Voice-pr)">
presentation="$(presentation.org-freedesktop-ModemManager1-user-pr)">
<parentCategory ref="system:ALT_ModemManagerPolkit" />
<supportedOn ref="system:SUPPORTED_AltP10" />
<elements>
@ -916,14 +852,6 @@
</value>
</item>
</enum>
<boolean id="OrgFreedesktopModemManager_blocker" key="Software\BaseALT\Policies\PolkitLocks" valueName="org.freedesktop.ModemManager1.Voice">
<trueValue>
<decimal value="1" />
</trueValue>
<falseValue>
<decimal value="0" />
</falseValue>
</boolean>
</elements>
</policy>
</policies>

View File

@ -9,23 +9,23 @@
<string id="org-freedesktop-ModemManager1-Contacts">Restrict the ability to add, modify, or delete device contacts</string>
<string id="org-freedesktop-ModemManager1-Contacts_help">The policy manages the restriction on the ability to add, modify and delete mobile broadband contacts
Disabled/Unconfigured - restrictions are defined by system parameters.
Disabled/Unconfigured restrictions are defined by system parameters.
Enabled - restriction with defined rights;
Enabled restriction with defined rights;
Possible values:
"No" - set restriction with action denial (user is not allowed to perform the action);
"No" set restriction with action denial (user is not allowed to perform the action);
"Yes" - remove the restriction (the user can perform the action without any authentication);
"Yes" remove the restriction (the user can perform the action without any authentication);
"Auth_self" - the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_self" the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" - the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_admin" the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" - similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_self_keep" similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" - similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
"Auth_admin_keep" similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
@ -33,23 +33,23 @@ Note: the possession of administrative rights in a PolicyKit context is determin
<string id="org-freedesktop-ModemManager1-Contacts-user">Restrict the ability to add, modify, or delete device contacts</string>
<string id="org-freedesktop-ModemManager1-Contacts-user_help">The policy manages the restriction on the ability to add, modify and delete mobile broadband contacts
Disabled/Unconfigured - restrictions are defined by system parameters.
Disabled/Unconfigured restrictions are defined by system parameters.
Enabled - restriction with defined rights;
Enabled restriction with defined rights;
Possible values:
"No" - set restriction with action denial (user is not allowed to perform the action);
"No" set restriction with action denial (user is not allowed to perform the action);
"Yes" - remove the restriction (the user can perform the action without any authentication);
"Yes" remove the restriction (the user can perform the action without any authentication);
"Auth_self" - the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_self" the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" - the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_admin" the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" - similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_self_keep" similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" - similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
"Auth_admin_keep" similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
@ -57,23 +57,23 @@ Note: the possession of administrative rights in a PolicyKit context is determin
<string id="org-freedesktop-ModemManager1-Control">The policy restricts the ability to manage the Modem Manager daemon</string>
<string id="org-freedesktop-ModemManager1-Control_help">The policy restricts the ability to control the Modem Manager
Disabled/Unconfigured - restrictions are defined by system parameters.
Disabled/Unconfigured restrictions are defined by system parameters.
Enabled - restriction with defined rights;
Enabled restriction with defined rights;
Possible values:
"No" - set restriction with action denial (user is not allowed to perform the action);
"No" set restriction with action denial (user is not allowed to perform the action);
"Yes" - remove the restriction (the user can perform the action without any authentication);
"Yes" remove the restriction (the user can perform the action without any authentication);
"Auth_self" - the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_self" the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" - the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_admin" the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" - similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_self_keep" similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" - similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
"Auth_admin_keep" similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
@ -81,23 +81,23 @@ Note: the possession of administrative rights in a PolicyKit context is determin
<string id="org-freedesktop-ModemManager1-Control-user">The policy restricts the ability to manage the Modem Manager daemon</string>
<string id="org-freedesktop-ModemManager1-Control-user_help">The policy restricts the ability to control the Modem Manager
Disabled/Unconfigured - restrictions are defined by system parameters.
Disabled/Unconfigured restrictions are defined by system parameters.
Enabled - restriction with defined rights;
Enabled restriction with defined rights;
Possible values:
"No" - set restriction with action denial (user is not allowed to perform the action);
"No" set restriction with action denial (user is not allowed to perform the action);
"Yes" - remove the restriction (the user can perform the action without any authentication);
"Yes" remove the restriction (the user can perform the action without any authentication);
"Auth_self" - the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_self" the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" - the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_admin" the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" - similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_self_keep" similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" - similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
"Auth_admin_keep" similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
@ -105,23 +105,23 @@ Note: the possession of administrative rights in a PolicyKit context is determin
<string id="org-freedesktop-ModemManager1-Device-Control">Restricting the ability to blocking and control a mobile broadband device</string>
<string id="org-freedesktop-ModemManager1-Device-Control_help">The policy restricts the ability to control the Modem Manager
Disabled/Unconfigured - restrictions are defined by system parameters.
Disabled/Unconfigured restrictions are defined by system parameters.
Enabled - restriction with defined rights;
Enabled restriction with defined rights;
Possible values:
"No" - set restriction with action denial (user is not allowed to perform the action);
"No" set restriction with action denial (user is not allowed to perform the action);
"Yes" - remove the restriction (the user can perform the action without any authentication);
"Yes" remove the restriction (the user can perform the action without any authentication);
"Auth_self" - the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_self" the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" - the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_admin" the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" - similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_self_keep" similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" - similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
"Auth_admin_keep" similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
@ -129,23 +129,23 @@ Note: the possession of administrative rights in a PolicyKit context is determin
<string id="org-freedesktop-ModemManager1-Device-Control-user">Restricting the ability to blocking and control a mobile broadband device</string>
<string id="org-freedesktop-ModemManager1-Device-Control-user_help">The policy restricts the ability to control the Modem Manager
Disabled/Unconfigured - restrictions are defined by system parameters.
Disabled/Unconfigured restrictions are defined by system parameters.
Enabled - restriction with defined rights;
Enabled restriction with defined rights;
Possible values:
"No" - set restriction with action denial (user is not allowed to perform the action);
"No" set restriction with action denial (user is not allowed to perform the action);
"Yes" - remove the restriction (the user can perform the action without any authentication);
"Yes" remove the restriction (the user can perform the action without any authentication);
"Auth_self" - the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_self" the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" - the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_admin" the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" - similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_self_keep" similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" - similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
"Auth_admin_keep" similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
@ -153,23 +153,23 @@ Note: the possession of administrative rights in a PolicyKit context is determin
<string id="org-freedesktop-ModemManager1-Firmware">Restricting the ability to control the firmware of a mobile broadband device</string>
<string id="org-freedesktop-ModemManager1-Firmware_help">The policy restricts the ability to control the firmware of this device
Disabled/Unconfigured - restrictions are defined by system parameters.
Disabled/Unconfigured restrictions are defined by system parameters.
Enabled - restriction with defined rights;
Enabled restriction with defined rights;
Possible values:
"No" - set restriction with action denial (user is not allowed to perform the action);
"No" set restriction with action denial (user is not allowed to perform the action);
"Yes" - remove the restriction (the user can perform the action without any authentication);
"Yes" remove the restriction (the user can perform the action without any authentication);
"Auth_self" - the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_self" the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" - the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_admin" the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" - similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_self_keep" similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" - similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
"Auth_admin_keep" similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
@ -177,23 +177,23 @@ Note: the possession of administrative rights in a PolicyKit context is determin
<string id="org-freedesktop-ModemManager1-Firmware-user">Restricting the ability to control the firmware of a mobile broadband device</string>
<string id="org-freedesktop-ModemManager1-Firmware-user_help">The policy restricts the ability to control the firmware of this device
Disabled/Unconfigured - restrictions are defined by system parameters.
Disabled/Unconfigured restrictions are defined by system parameters.
Enabled - restriction with defined rights;
Enabled restriction with defined rights;
Possible values:
"No" - set restriction with action denial (user is not allowed to perform the action);
"No" set restriction with action denial (user is not allowed to perform the action);
"Yes" - remove the restriction (the user can perform the action without any authentication);
"Yes" remove the restriction (the user can perform the action without any authentication);
"Auth_self" - the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_self" the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" - the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_admin" the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" - similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_self_keep" similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" - similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
"Auth_admin_keep" similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
@ -201,23 +201,23 @@ Note: the possession of administrative rights in a PolicyKit context is determin
<string id="org-freedesktop-ModemManager1-Location">Restricted ability to view geographic and positioning information</string>
<string id="org-freedesktop-ModemManager1-Location_help">The policy restricts the ability to view geographic location information
Disabled/Unconfigured - restrictions are defined by system parameters.
Disabled/Unconfigured restrictions are defined by system parameters.
Enabled - restriction with defined rights;
Enabled restriction with defined rights;
Possible values:
"No" - set restriction with action denial (user is not allowed to perform the action);
"No" set restriction with action denial (user is not allowed to perform the action);
"Yes" - remove the restriction (the user can perform the action without any authentication);
"Yes" remove the restriction (the user can perform the action without any authentication);
"Auth_self" - the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_self" the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" - the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_admin" the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" - similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_self_keep" similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" - similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
"Auth_admin_keep" similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
@ -225,23 +225,23 @@ Note: the possession of administrative rights in a PolicyKit context is determin
<string id="org-freedesktop-ModemManager1-Location-user">Restricted ability to view geographic and positioning information</string>
<string id="org-freedesktop-ModemManager1-Location-user_help">The policy restricts the ability to view geographic location information
Disabled/Unconfigured - restrictions are defined by system parameters.
Disabled/Unconfigured restrictions are defined by system parameters.
Enabled - restriction with defined rights;
Enabled restriction with defined rights;
Possible values:
"No" - set restriction with action denial (user is not allowed to perform the action);
"No" set restriction with action denial (user is not allowed to perform the action);
"Yes" - remove the restriction (the user can perform the action without any authentication);
"Yes" remove the restriction (the user can perform the action without any authentication);
"Auth_self" - the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_self" the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" - the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_admin" the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" - similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_self_keep" similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" - similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
"Auth_admin_keep" similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
@ -249,23 +249,23 @@ Note: the possession of administrative rights in a PolicyKit context is determin
<string id="org-freedesktop-ModemManager1-Messaging">Restrict the ability to send, save, modify and delete text messages</string>
<string id="org-freedesktop-ModemManager1-Messaging_help">The policy restricts the ability to send or manipulate text messages to the device
Disabled/Unconfigured - restrictions are defined by system parameters.
Disabled/Unconfigured restrictions are defined by system parameters.
Enabled - restriction with defined rights;
Enabled restriction with defined rights;
Possible values:
"No" - set restriction with action denial (user is not allowed to perform the action);
"No" set restriction with action denial (user is not allowed to perform the action);
"Yes" - remove the restriction (the user can perform the action without any authentication);
"Yes" remove the restriction (the user can perform the action without any authentication);
"Auth_self" - the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_self" the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" - the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_admin" the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" - similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_self_keep" similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" - similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
"Auth_admin_keep" similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
@ -273,23 +273,23 @@ Note: the possession of administrative rights in a PolicyKit context is determin
<string id="org-freedesktop-ModemManager1-Messaging-user">Restrict the ability to send, save, modify and delete text messages</string>
<string id="org-freedesktop-ModemManager1-Messaging-user_help">The policy restricts the ability to send or manipulate text messages to the device
Disabled/Unconfigured - restrictions are defined by system parameters.
Disabled/Unconfigured restrictions are defined by system parameters.
Enabled - restriction with defined rights;
Enabled restriction with defined rights;
Possible values:
"No" - set restriction with action denial (user is not allowed to perform the action);
"No" set restriction with action denial (user is not allowed to perform the action);
"Yes" - remove the restriction (the user can perform the action without any authentication);
"Yes" remove the restriction (the user can perform the action without any authentication);
"Auth_self" - the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_self" the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" - the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_admin" the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" - similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_self_keep" similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" - similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
"Auth_admin_keep" similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
@ -297,23 +297,23 @@ Note: the possession of administrative rights in a PolicyKit context is determin
<string id="org-freedesktop-ModemManager1-Time">Restrict the ability to request network time and time zone information</string>
<string id="org-freedesktop-ModemManager1-Time_help">The policy restricts the ability to request network time information
Disabled/Unconfigured - restrictions are defined by system parameters.
Disabled/Unconfigured restrictions are defined by system parameters.
Enabled - restriction with defined rights;
Enabled restriction with defined rights;
Possible values:
"No" - set restriction with action denial (user is not allowed to perform the action);
"No" set restriction with action denial (user is not allowed to perform the action);
"Yes" - remove the restriction (the user can perform the action without any authentication);
"Yes" remove the restriction (the user can perform the action without any authentication);
"Auth_self" - the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_self" the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" - the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_admin" the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" - similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_self_keep" similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" - similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
"Auth_admin_keep" similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
@ -321,23 +321,23 @@ Note: the possession of administrative rights in a PolicyKit context is determin
<string id="org-freedesktop-ModemManager1-Time-user">Restrict the ability to request network time and time zone information</string>
<string id="org-freedesktop-ModemManager1-Time-user_help">The policy restricts the ability to request network time information
Disabled/Unconfigured - restrictions are defined by system parameters.
Disabled/Unconfigured restrictions are defined by system parameters.
Enabled - restriction with defined rights;
Enabled restriction with defined rights;
Possible values:
"No" - set restriction with action denial (user is not allowed to perform the action);
"No" set restriction with action denial (user is not allowed to perform the action);
"Yes" - remove the restriction (the user can perform the action without any authentication);
"Yes" remove the restriction (the user can perform the action without any authentication);
"Auth_self" - the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_self" the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" - the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_admin" the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" - similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_self_keep" similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" - similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
"Auth_admin_keep" similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
@ -345,23 +345,23 @@ Note: the possession of administrative rights in a PolicyKit context is determin
<string id="org-freedesktop-ModemManager1-USSD">Restrict the ability to request and use network information and services</string>
<string id="org-freedesktop-ModemManager1-USSD_help">The policy restricts the ability to request or use network information and service
Disabled/Unconfigured - restrictions are defined by system parameters.
Disabled/Unconfigured restrictions are defined by system parameters.
Enabled - restriction with defined rights;
Enabled restriction with defined rights;
Possible values:
"No" - set restriction with action denial (user is not allowed to perform the action);
"No" set restriction with action denial (user is not allowed to perform the action);
"Yes" - remove the restriction (the user can perform the action without any authentication);
"Yes" remove the restriction (the user can perform the action without any authentication);
"Auth_self" - the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_self" the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" - the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_admin" the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" - similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_self_keep" similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" - similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
"Auth_admin_keep" similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
@ -369,23 +369,23 @@ Note: the possession of administrative rights in a PolicyKit context is determin
<string id="org-freedesktop-ModemManager1-USSD-user">Restrict the ability to request and use network information and services</string>
<string id="org-freedesktop-ModemManager1-USSD-user_help">The policy restricts the ability to request or use network information and service
Disabled/Unconfigured - restrictions are defined by system parameters.
Disabled/Unconfigured restrictions are defined by system parameters.
Enabled - restriction with defined rights;
Enabled restriction with defined rights;
Possible values:
"No" - set restriction with action denial (user is not allowed to perform the action);
"No" set restriction with action denial (user is not allowed to perform the action);
"Yes" - remove the restriction (the user can perform the action without any authentication);
"Yes" remove the restriction (the user can perform the action without any authentication);
"Auth_self" - the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_self" the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" - the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_admin" the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" - similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_self_keep" similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" - similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
"Auth_admin_keep" similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
@ -393,23 +393,23 @@ Note: the possession of administrative rights in a PolicyKit context is determin
<string id="org-freedesktop-ModemManager1-Voice">Restricting the ability to receive incoming voice calls or start an outgoing voice call</string>
<string id="org-freedesktop-ModemManager1-Voice_help">The policy restricts the ability to make voice calls
Disabled/Unconfigured - restrictions are defined by system parameters.
Disabled/Unconfigured restrictions are defined by system parameters.
Enabled - restriction with defined rights;
Enabled restriction with defined rights;
Possible values:
"No" - set restriction with action denial (user is not allowed to perform the action);
"No" set restriction with action denial (user is not allowed to perform the action);
"Yes" - remove the restriction (the user can perform the action without any authentication);
"Yes" remove the restriction (the user can perform the action without any authentication);
"Auth_self" - the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_self" the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" - the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_admin" the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" - similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_self_keep" similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" - similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
"Auth_admin_keep" similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
@ -417,23 +417,23 @@ Note: the possession of administrative rights in a PolicyKit context is determin
<string id="org-freedesktop-ModemManager1-Voice-user">Restricting the ability to receive incoming voice calls or start an outgoing voice call</string>
<string id="org-freedesktop-ModemManager1-Voice-user_help">The policy restricts the ability to make voice calls
Disabled/Unconfigured - restrictions are defined by system parameters.
Disabled/Unconfigured restrictions are defined by system parameters.
Enabled - restriction with defined rights;
Enabled restriction with defined rights;
Possible values:
"No" - set restriction with action denial (user is not allowed to perform the action);
"No" set restriction with action denial (user is not allowed to perform the action);
"Yes" - remove the restriction (the user can perform the action without any authentication);
"Yes" remove the restriction (the user can perform the action without any authentication);
"Auth_self" - the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_self" the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" - the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_admin" the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" - similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_self_keep" similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" - similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
"Auth_admin_keep" similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
@ -454,46 +454,9 @@ Note: the possession of administrative rights in a PolicyKit context is determin
<checkBox refId="OrgFreedesktopModemManager_blocker">Block</checkBox>
<text>Blocking changes to this setting by user policy. Blocking a policy makes it a priority over a similar policy for the user.</text>
</presentation>
<presentation id="org-freedesktop-ModemManager1-Control-pr">
<presentation id="org-freedesktop-ModemManager1-Control-user-pr">
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopModemManager_setter">Restriction options for the ModemManager service:</dropdownList>
<checkBox refId="OrgFreedesktopModemManager_blocker">Block</checkBox>
<text>Blocking changes to this setting by user policy. Blocking a policy makes it a priority over a similar policy for the user.</text>
</presentation>
<presentation id="org-freedesktop-ModemManager1-Device-Control-pr">
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopModemManager_setter">Restriction options for the ModemManager service:</dropdownList>
<checkBox refId="OrgFreedesktopModemManager_blocker">Block</checkBox>
<text>Blocking changes to this setting by user policy. Blocking a policy makes it a priority over a similar policy for the user.</text>
</presentation>
<presentation id="org-freedesktop-ModemManager1-Firmware-pr">
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopModemManager_setter">Restriction options for the ModemManager service:</dropdownList>
<checkBox refId="OrgFreedesktopModemManager_blocker">Block</checkBox>
<text>Blocking changes to this setting by user policy. Blocking a policy makes it a priority over a similar policy for the user.</text>
</presentation>
<presentation id="org-freedesktop-ModemManager1-Location-pr">
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopModemManager_setter">Restriction options for the ModemManager service:</dropdownList>
<checkBox refId="OrgFreedesktopModemManager_blocker">Block</checkBox>
<text>Blocking changes to this setting by user policy. Blocking a policy makes it a priority over a similar policy for the user.</text>
</presentation>
<presentation id="org-freedesktop-ModemManager1-Messaging-pr">
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopModemManager_setter">Restriction options for the ModemManager service:</dropdownList>
<checkBox refId="OrgFreedesktopModemManager_blocker">Block</checkBox>
<text>Blocking changes to this setting by user policy. Blocking a policy makes it a priority over a similar policy for the user.</text>
</presentation>
<presentation id="org-freedesktop-ModemManager1-Time-pr">
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopModemManager_setter">Restriction options for the ModemManager service:</dropdownList>
<checkBox refId="OrgFreedesktopModemManager_blocker">Block</checkBox>
<text>Blocking changes to this setting by user policy. Blocking a policy makes it a priority over a similar policy for the user.</text>
</presentation>
<presentation id="org-freedesktop-ModemManager1-USSD-pr">
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopModemManager_setter">Restriction options for the ModemManager service:</dropdownList>
<checkBox refId="OrgFreedesktopModemManager_blocker">Block</checkBox>
<text>Blocking changes to this setting by user policy. Blocking a policy makes it a priority over a similar policy for the user.</text>
</presentation>
<presentation id="org-freedesktop-ModemManager1-Voice-pr">
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopModemManager_setter">Restriction options for the ModemManager service:</dropdownList>
<checkBox refId="OrgFreedesktopModemManager_blocker">Block</checkBox>
<text>Blocking changes to this setting by user policy. Blocking a policy makes it a priority over a similar policy for the user.</text>
</presentation>
</presentationTable>
</resources>
</policyDefinitionResources>
</policyDefinitionResources>

View File

@ -449,52 +449,14 @@
</stringTable>
<presentationTable>
<presentation id="org-freedesktop-ModemManager1-Contacts-pr">
<presentation id="org-freedesktop-ModemManager1-pr">
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopModemManager_setter">Варианты ограничений для службы ModemManager:</dropdownList>
<checkBox refId="OrgFreedesktopModemManager_blocker">Блокировать</checkBox>
<text>Блокировка изменений данной настройки политикой пользователя. Блокировка политики делает её приоритетнее аналогичной политики для пользователя.</text>
</presentation>
<presentation id="org-freedesktop-ModemManager1-Control-pr">
<presentation id="org-freedesktop-ModemManager1-user-pr">
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopModemManager_setter">Варианты ограничений для службы ModemManager:</dropdownList>
<checkBox refId="OrgFreedesktopModemManager_blocker">Блокировать</checkBox>
<text>Блокировка изменений данной настройки политикой пользователя. Блокировка политики делает её приоритетнее аналогичной политики для пользователя.</text>
</presentation>
<presentation id="org-freedesktop-ModemManager1-Device-Control-pr">
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopModemManager_setter">Варианты ограничений для службы ModemManager:</dropdownList>
<checkBox refId="OrgFreedesktopModemManager_blocker">Блокировать</checkBox>
<text>Блокировка изменений данной настройки политикой пользователя. Блокировка политики делает её приоритетнее аналогичной политики для пользователя.</text>
</presentation>
<presentation id="org-freedesktop-ModemManager1-Firmware-pr">
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopModemManager_setter">Варианты ограничений для службы ModemManager:</dropdownList>
<checkBox refId="OrgFreedesktopModemManager_blocker">Блокировать</checkBox>
<text>Блокировка изменений данной настройки политикой пользователя. Блокировка политики делает её приоритетнее аналогичной политики для пользователя.</text>
</presentation>
<presentation id="org-freedesktop-ModemManager1-Location-pr">
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopModemManager_setter">Варианты ограничений для службы ModemManager:</dropdownList>
<checkBox refId="OrgFreedesktopModemManager_blocker">Блокировать</checkBox>
<text>Блокировка изменений данной настройки политикой пользователя. Блокировка политики делает её приоритетнее аналогичной политики для пользователя.</text>
</presentation>
<presentation id="org-freedesktop-ModemManager1-Messaging-pr">
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopModemManager_setter">Варианты ограничений для службы ModemManager:</dropdownList>
<checkBox refId="OrgFreedesktopModemManager_blocker">Блокировать</checkBox>
<text>Блокировка изменений данной настройки политикой пользователя. Блокировка политики делает её приоритетнее аналогичной политики для пользователя.</text>
</presentation>
<presentation id="org-freedesktop-ModemManager1-Time-pr">
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopModemManager_setter">Варианты ограничений для службы ModemManager:</dropdownList>
<checkBox refId="OrgFreedesktopModemManager_blocker">Блокировать</checkBox>
<text>Блокировка изменений данной настройки политикой пользователя. Блокировка политики делает её приоритетнее аналогичной политики для пользователя.</text>
</presentation>
<presentation id="org-freedesktop-ModemManager1-USSD-pr">
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopModemManager_setter">Варианты ограничений для службы ModemManager:</dropdownList>
<checkBox refId="OrgFreedesktopModemManager_blocker">Блокировать</checkBox>
<text>Блокировка изменений данной настройки политикой пользователя. Блокировка политики делает её приоритетнее аналогичной политики для пользователя.</text>
</presentation>
<presentation id="org-freedesktop-ModemManager1-Voice-pr">
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopModemManager_setter">Варианты ограничений для службы ModemManager:</dropdownList>
<checkBox refId="OrgFreedesktopModemManager_blocker">Блокировать</checkBox>
<text>Блокировка изменений данной настройки политикой пользователя. Блокировка политики делает её приоритетнее аналогичной политики для пользователя.</text>
</presentation>
</presentationTable>
</resources>
</policyDefinitionResources>