mirror of
https://github.com/altlinux/admx-basealt.git
synced 2025-01-20 10:04:07 +03:00
793 lines
49 KiB
XML
793 lines
49 KiB
XML
<?xml version="1.0" encoding="utf-8"?>
|
||
<!-- (c) 2023 BaseALT, Ltd. -->
|
||
<policyDefinitionResources xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://schemas.microsoft.com/GroupPolicy/2006/07/PolicyDefinitions" revision="1.0" schemaVersion="1.0">
|
||
<displayName>ALT Udisks2 policies definitions</displayName>
|
||
<description>This file contains the Udisks2 service policies definitions used by ALT operating system.</description>
|
||
<resources>
|
||
<stringTable>
|
||
|
||
<string id="org-freedesktop-udisks2-filesystem-mount">Permission to mount the file system</string>
|
||
<string id="org-freedesktop-udisks2-filesystem-mount_help">Permission to mount the file system
|
||
|
||
This policy grants or restricts permissions to mount removable storage devices.
|
||
|
||
Disabledd/Not configured — Permissions are determined by system settings. Default is «Auth_admin»
|
||
|
||
Enabled — permission to mount with set rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — block permissions (the user is not allowed to perform the action);
|
||
|
||
"Yes" — grant permissions (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — The user must enter their password to authenticate. Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin" permission is generally recommended;
|
||
|
||
"Auth_admin" — The user must enter an administrator password on each request. Requires user authentication with administrator rights;
|
||
|
||
"Auth_self_keep" — Similar to "Auth_self", but the authorization is kept for a short period of time (for example, five minutes). Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin_keep" permission is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but the authorization is kept for a short period of time (for example, five minutes);
|
||
|
||
Note: the possession of administrative rights in the context of PolicyKit is determined by its rules. By default, Alt asks for the password of the user in the "wheel" group.
|
||
|
||
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
|
||
|
||
</string>
|
||
<string id="org-freedesktop-udisks2-filesystem-mount-user">Permission to mount the file system</string>
|
||
<string id="org-freedesktop-udisks2-filesystem-mount-user_help">Permission to mount the file system
|
||
|
||
This policy grants or restricts permissions to mount removable storage devices.
|
||
|
||
Disabledd/Not configured — Permissions are determined by system settings. Default is «Auth_admin»
|
||
|
||
Enabled — permission to mount with set rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — block permissions (the user is not allowed to perform the action);
|
||
|
||
"Yes" — grant permissions (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — The user must enter their password to authenticate. Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin" permission is generally recommended;
|
||
|
||
"Auth_admin" — The user must enter an administrator password on each request. Requires user authentication with administrator rights;
|
||
|
||
"Auth_self_keep" — Similar to "Auth_self", but the authorization is kept for a short period of time (for example, five minutes). Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin_keep" permission is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but the authorization is kept for a short period of time (for example, five minutes);
|
||
|
||
Note: the possession of administrative rights in the context of PolicyKit is determined by its rules. By default, Alt asks for the password of the user in the "wheel" group.
|
||
|
||
</string>
|
||
<string id="org-freedesktop-udisks2-filesystem-mount-other-seat">Permission to mount removable storage devices in remote sessions</string>
|
||
<string id="org-freedesktop-udisks2-filesystem-mount-other-seat_help">Permission to mount removable storage devices in remote sessions
|
||
|
||
This policy grants or restricts permissions to mount removable storage devices from a device connected to a remote workstation (for example, on another computer or remote session).
|
||
|
||
Disabled/Not configured — Permissions are determined by system settings. Default is «Auth_admin»
|
||
|
||
Enabled — permission to mount with set rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — block permissions (the user is not allowed to perform the action);
|
||
|
||
"Yes" — grant permissions (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — The user must enter their password to authenticate. Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin" permission is generally recommended;
|
||
|
||
"Auth_admin" — The user must enter an administrator password on each request. Requires user authentication with administrator rights;
|
||
|
||
"Auth_self_keep" — Similar to "Auth_self", but the authorization is kept for a short period of time (for example, five minutes). Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin_keep" permission is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but the authorization is kept for a short period of time (for example, five minutes);
|
||
|
||
Note: the possession of administrative rights in the context of PolicyKit is determined by its rules. By default, Alt asks for the password of the user in the "wheel" group.
|
||
|
||
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
|
||
|
||
</string>
|
||
<string id="org-freedesktop-udisks2-filesystem-mount-other-seat-user">Permission to mount removable storage devices in remote sessions</string>
|
||
<string id="org-freedesktop-udisks2-filesystem-mount-other-seat-user_help">Permission to mount removable storage devices in remote sessions
|
||
|
||
This policy grants or restricts permissions to mount removable storage devices from a device connected to a remote workstation (for example, on another computer or remote session).
|
||
|
||
Disabled/Not configured — Permissions are determined by system settings. Default is «Auth_admin»
|
||
|
||
Enabled — permission to mount with set rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — block permissions (the user is not allowed to perform the action);
|
||
|
||
"Yes" — grant permissions (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — The user must enter their password to authenticate. Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin" permission is generally recommended;
|
||
|
||
"Auth_admin" — The user must enter an administrator password on each request. Requires user authentication with administrator rights;
|
||
|
||
"Auth_self_keep" — Similar to "Auth_self", but the authorization is kept for a short period of time (for example, five minutes). Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin_keep" permission is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but the authorization is kept for a short period of time (for example, five minutes);
|
||
|
||
Note: the possession of administrative rights in the context of PolicyKit is determined by its rules. By default, Alt asks for the password of the user in the "wheel" group.
|
||
|
||
</string>
|
||
<string id="org-freedesktop-udisks2-filesystem-mount-system">Permission to mount system partitions</string>
|
||
<string id="org-freedesktop-udisks2-filesystem-mount-system_help">Permission to mount system partitions
|
||
|
||
This policy grants or restricts permissions to matically mount system partitions.
|
||
|
||
Disabled/Not configured — Permissions are determined by system settings. Default is «Auth_admin»
|
||
|
||
Enabled — permission to mount with set rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — block permissions (the user is not allowed to perform the action);
|
||
|
||
"Yes" — grant permissions (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — The user must enter their password to authenticate. Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin" permission is generally recommended;
|
||
|
||
"Auth_admin" — The user must enter an administrator password on each request. Requires user authentication with administrator rights;
|
||
|
||
"Auth_self_keep" — Similar to "Auth_self", but the authorization is kept for a short period of time (for example, five minutes). Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin_keep" permission is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but the authorization is kept for a short period of time (for example, five minutes);
|
||
|
||
Note: the possession of administrative rights in the context of PolicyKit is determined by its rules. By default, Alt asks for the password of the user in the "wheel" group.
|
||
|
||
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
|
||
|
||
</string>
|
||
<string id="org-freedesktop-udisks2-filesystem-mount-system-user">Permission to mount system partitions</string>
|
||
<string id="org-freedesktop-udisks2-filesystem-mount-system-user_help">Permission to mount system partitions
|
||
|
||
This policy grants or restricts permissions to matically mount system partitions.
|
||
|
||
Disabled/Not configured — Permissions are determined by system settings. Default is «Auth_admin»
|
||
|
||
Enabled — permission to mount with set rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — block permissions (the user is not allowed to perform the action);
|
||
|
||
"Yes" — grant permissions (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — The user must enter their password to authenticate. Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin" permission is generally recommended;
|
||
|
||
"Auth_admin" — The user must enter an administrator password on each request. Requires user authentication with administrator rights;
|
||
|
||
"Auth_self_keep" — Similar to "Auth_self", but the authorization is kept for a short period of time (for example, five minutes). Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin_keep" permission is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but the authorization is kept for a short period of time (for example, five minutes);
|
||
|
||
Note: the possession of administrative rights in the context of PolicyKit is determined by its rules. By default, Alt asks for the password of the user in the "wheel" group.
|
||
|
||
</string>
|
||
<string id="org-freedesktop-udisks2-filesystem-mount-all">General mount policy</string>
|
||
<string id="org-freedesktop-udisks2-filesystem-mount-all_Help">This policy grants or restricts permissions to mount removable storage devices, mount system partitions, mount removable storage devices in remote sessions.
|
||
|
||
Disabled/Not configured — Permissions are determined by system settings. Default is «Auth_admin»
|
||
|
||
Enabled — permission to mount with set rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — block permissions (the user is not allowed to perform the action);
|
||
|
||
"Yes" — grant permissions (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — The user must enter their password to authenticate. Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin" permission is generally recommended;
|
||
|
||
"Auth_admin" — The user must enter an administrator password on each request. Requires user authentication with administrator rights;
|
||
|
||
"Auth_self_keep" — Similar to "Auth_self", but the authorization is kept for a short period of time (for example, five minutes). Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin_keep" permission is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but the authorization is kept for a short period of time (for example, five minutes);
|
||
|
||
Note: the possession of administrative rights in the context of PolicyKit is determined by its rules. By default, Alt asks for the password of the user in the "wheel" group.
|
||
|
||
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
|
||
|
||
</string>
|
||
<string id="org-freedesktop-udisks2-filesystem-mount-all-user">General mount policy</string>
|
||
<string id="org-freedesktop-udisks2-filesystem-mount-all-user_Help">This policy grants or restricts permissions to mount removable storage devices, mount system partitions, mount removable storage devices in remote sessions.
|
||
|
||
Disabled/Not configured — Permissions are determined by system settings. Default is «Auth_admin»
|
||
|
||
Enable — permission to mount with set rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — block permissions (the user is not allowed to perform the action);
|
||
|
||
"Yes" — grant permissions (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — The user must enter their password to authenticate. Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin" permission is generally recommended;
|
||
|
||
"Auth_admin" — The user must enter an administrator password on each request. Requires user authentication with administrator rights;
|
||
|
||
"Auth_self_keep" — Similar to "Auth_self", but the authorization is kept for a short period of time (for example, five minutes). Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin_keep" permission is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but the authorization is kept for a short period of time (for example, five minutes);
|
||
|
||
Note: the possession of administrative rights in the context of PolicyKit is determined by its rules. By default, Alt asks for the password of the user in the "wheel" group.
|
||
|
||
</string>
|
||
<string id="org-freedesktop-policykit-exec">Permission to run a program as another user</string>
|
||
<string id="org-freedesktop-policykit-exec_Help">The policy controls the restriction on the ability to run the program as another user
|
||
|
||
Authentication is required to run a program as another user.
|
||
|
||
Disabled/Unconfigured — restrictions are defined by system parameters.
|
||
|
||
Enabled — restriction with defined rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — set restriction with action denial (user is not allowed to perform the action);
|
||
|
||
"Yes" — remove the restriction (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
|
||
|
||
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
|
||
|
||
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
|
||
|
||
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
|
||
|
||
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
|
||
|
||
</string>
|
||
<string id="org-freedesktop-policykit-exec-user">Permission to join machine to realm</string>
|
||
<string id="org-freedesktop-policykit-exec-user_Help">The policy controls the restriction on the ability to run the program as another user
|
||
|
||
Authentication is required to run a program as another user.
|
||
|
||
Disabled/Unconfigured — restrictions are defined by system parameters.
|
||
|
||
Enabled — restriction with defined rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — set restriction with action denial (user is not allowed to perform the action);
|
||
|
||
"Yes" — remove the restriction (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
|
||
|
||
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
|
||
|
||
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
|
||
|
||
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
|
||
|
||
</string>
|
||
<string id="org-freedesktop-udisks2-ata-check-power">Permission to сheck power state</string>
|
||
<string id="org-freedesktop-udisks2-ata-check-power_help">The policy restricts the ability to сheck power state
|
||
|
||
Disabled/Unconfigured — restrictions are defined by system parameters.
|
||
|
||
Enabled — restriction with defined rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — set restriction with action denial (user is not allowed to perform the action);
|
||
|
||
"Yes" — remove the restriction (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
|
||
|
||
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
|
||
|
||
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
|
||
|
||
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
|
||
|
||
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
|
||
|
||
</string>
|
||
<string id="org-freedesktop-udisks2-ata-check-power-user">Permission to сheck power state</string>
|
||
<string id="org-freedesktop-udisks2-ata-check-power-user_help">The policy restricts the ability to сheck power state
|
||
|
||
Disabled/Unconfigured — restrictions are defined by system parameters.
|
||
|
||
Enabled — restriction with defined rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — set restriction with action denial (user is not allowed to perform the action);
|
||
|
||
"Yes" — remove the restriction (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
|
||
|
||
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
|
||
|
||
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
|
||
|
||
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
|
||
|
||
|
||
</string>
|
||
<string id="org-freedesktop-udisks2-ata-secure-erase">Permission to securely erase a hard disk</string>
|
||
<string id="org-freedesktop-udisks2-ata-secure-erase_help">The policy restricts the ability to securely erase a hard disk
|
||
|
||
|
||
Disabled/Unconfigured — restrictions are defined by system parameters.
|
||
|
||
Enabled — restriction with defined rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — set restriction with action denial (user is not allowed to perform the action);
|
||
|
||
"Yes" — remove the restriction (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
|
||
|
||
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
|
||
|
||
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
|
||
|
||
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
|
||
|
||
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
|
||
|
||
</string>
|
||
<string id="org-freedesktop-udisks2-ata-secure-erase-user">Permission to securely erase a hard disk</string>
|
||
<string id="org-freedesktop-udisks2-ata-secure-erase-user_help">The policy restricts the ability to securely erase a hard disk
|
||
|
||
Disabled/Unconfigured — restrictions are defined by system parameters.
|
||
|
||
Enabled — restriction with defined rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — set restriction with action denial (user is not allowed to perform the action);
|
||
|
||
"Yes" — remove the restriction (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
|
||
|
||
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
|
||
|
||
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
|
||
|
||
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
|
||
|
||
|
||
</string>
|
||
<string id="org-freedesktop-udisks2-ata-smart-enable-disable">Permission to enable/Disable SMART</string>
|
||
<string id="org-freedesktop-udisks2-ata-smart-enable-disable_help">The policy restricts the ability to enable/Disable SMART
|
||
|
||
Disabled/Unconfigured — restrictions are defined by system parameters.
|
||
|
||
Enabled — restriction with defined rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — set restriction with action denial (user is not allowed to perform the action);
|
||
|
||
"Yes" — remove the restriction (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
|
||
|
||
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
|
||
|
||
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
|
||
|
||
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
|
||
|
||
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
|
||
|
||
</string>
|
||
<string id="org-freedesktop-udisks2-ata-smart-enable-disable-user">Permission to enable/Disable SMART</string>
|
||
<string id="org-freedesktop-udisks2-ata-smart-enable-disable-user_help">The policy restricts the ability to enable/Disable SMART
|
||
|
||
Disabled/Unconfigured — restrictions are defined by system parameters.
|
||
|
||
Enabled — restriction with defined rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — set restriction with action denial (user is not allowed to perform the action);
|
||
|
||
"Yes" — remove the restriction (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
|
||
|
||
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
|
||
|
||
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
|
||
|
||
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
|
||
|
||
|
||
</string>
|
||
<string id="org-freedesktop-udisks2-ata-smart-selftest">Permission to run SMART self-test</string>
|
||
<string id="org-freedesktop-udisks2-ata-smart-selftest_help">The policy restricts the ability to run SMART self-test
|
||
|
||
Disabled/Unconfigured — restrictions are defined by system parameters.
|
||
|
||
Enabled — restriction with defined rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — set restriction with action denial (user is not allowed to perform the action);
|
||
|
||
"Yes" — remove the restriction (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
|
||
|
||
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
|
||
|
||
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
|
||
|
||
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
|
||
|
||
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
|
||
|
||
</string>
|
||
<string id="org-freedesktop-udisks2-ata-smart-selftest-user">Permission to run SMART self-test</string>
|
||
<string id="org-freedesktop-udisks2-ata-smart-selftest-user_help">The policy restricts the ability to run SMART self-test
|
||
|
||
Disabled/Unconfigured — restrictions are defined by system parameters.
|
||
|
||
Enabled — restriction with defined rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — set restriction with action denial (user is not allowed to perform the action);
|
||
|
||
"Yes" — remove the restriction (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
|
||
|
||
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
|
||
|
||
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
|
||
|
||
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
|
||
|
||
|
||
</string>
|
||
<string id="org-freedesktop-udisks2-ata-smart-simulate">Permission to set SMART data from blob</string>
|
||
<string id="org-freedesktop-udisks2-ata-smart-simulate_help">The policy restricts the ability to set SMART data from blob
|
||
|
||
Disabled/Unconfigured — restrictions are defined by system parameters.
|
||
|
||
Enabled — restriction with defined rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — set restriction with action denial (user is not allowed to perform the action);
|
||
|
||
"Yes" — remove the restriction (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
|
||
|
||
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
|
||
|
||
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
|
||
|
||
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
|
||
|
||
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
|
||
|
||
</string>
|
||
<string id="org-freedesktop-udisks2-ata-smart-simulate-user">Permission to set SMART data from blob</string>
|
||
<string id="org-freedesktop-udisks2-ata-smart-simulate-user_help">The policy restricts the ability to set SMART data from blob
|
||
|
||
Disabled/Unconfigured — restrictions are defined by system parameters.
|
||
|
||
Enabled — restriction with defined rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — set restriction with action denial (user is not allowed to perform the action);
|
||
|
||
"Yes" — remove the restriction (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
|
||
|
||
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
|
||
|
||
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
|
||
|
||
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
|
||
|
||
|
||
</string>
|
||
<string id="org-freedesktop-udisks2-ata-smart-update">Permission to update SMART data</string>
|
||
<string id="org-freedesktop-udisks2-ata-smart-update_help">The policy restricts the ability to update SMART data
|
||
|
||
Disabled/Unconfigured — restrictions are defined by system parameters.
|
||
|
||
Enabled — restriction with defined rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — set restriction with action denial (user is not allowed to perform the action);
|
||
|
||
"Yes" — remove the restriction (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
|
||
|
||
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
|
||
|
||
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
|
||
|
||
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
|
||
|
||
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
|
||
|
||
</string>
|
||
<string id="org-freedesktop-udisks2-ata-smart-update-user">Permission to update SMART data</string>
|
||
<string id="org-freedesktop-udisks2-ata-smart-update-user_help">The policy restricts the ability to update SMART data
|
||
|
||
Disabled/Unconfigured — restrictions are defined by system parameters.
|
||
|
||
Enabled — restriction with defined rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — set restriction with action denial (user is not allowed to perform the action);
|
||
|
||
"Yes" — remove the restriction (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
|
||
|
||
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
|
||
|
||
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
|
||
|
||
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
|
||
|
||
|
||
</string>
|
||
<string id="org-freedesktop-udisks2-ata-standby">Permission to send standby command</string>
|
||
<string id="org-freedesktop-udisks2-ata-standby_help">The policy restricts the ability to send standby command
|
||
|
||
Disabled/Unconfigured — restrictions are defined by system parameters.
|
||
|
||
Enabled — restriction with defined rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — set restriction with action denial (user is not allowed to perform the action);
|
||
|
||
"Yes" — remove the restriction (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
|
||
|
||
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
|
||
|
||
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
|
||
|
||
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
|
||
|
||
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
|
||
|
||
</string>
|
||
<string id="org-freedesktop-udisks2-ata-standby-user">Permission to send standby command</string>
|
||
<string id="org-freedesktop-udisks2-ata-standby-user_help">The policy restricts the ability to send standby command
|
||
|
||
Disabled/Unconfigured — restrictions are defined by system parameters.
|
||
|
||
Enabled — restriction with defined rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — set restriction with action denial (user is not allowed to perform the action);
|
||
|
||
"Yes" — remove the restriction (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
|
||
|
||
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
|
||
|
||
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
|
||
|
||
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
|
||
|
||
|
||
</string>
|
||
<string id="org-freedesktop-udisks2-ata-standby-other-seat">Permission to send standby command to drive on other seat</string>
|
||
<string id="org-freedesktop-udisks2-ata-standby-other-seat_help">The policy restricts the ability to send standby command to drive on other seat
|
||
|
||
Disabled/Unconfigured — restrictions are defined by system parameters.
|
||
|
||
Enabled — restriction with defined rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — set restriction with action denial (user is not allowed to perform the action);
|
||
|
||
"Yes" — remove the restriction (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
|
||
|
||
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
|
||
|
||
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
|
||
|
||
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
|
||
|
||
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
|
||
|
||
</string>
|
||
<string id="org-freedesktop-udisks2-ata-standby-other-seat-user">Permission to send standby command to drive on other seat</string>
|
||
<string id="org-freedesktop-udisks2-ata-standby-other-seat-user_help">The policy restricts the ability to send standby command to drive on other seat
|
||
|
||
Disabled/Unconfigured — restrictions are defined by system parameters.
|
||
|
||
Enabled — restriction with defined rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — set restriction with action denial (user is not allowed to perform the action);
|
||
|
||
"Yes" — remove the restriction (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
|
||
|
||
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
|
||
|
||
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
|
||
|
||
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
|
||
|
||
|
||
</string>
|
||
<string id="org-freedesktop-udisks2-ata-standby-system">Permission to send standby command to a system drive</string>
|
||
<string id="org-freedesktop-udisks2-ata-standby-system_help">The policy restricts the ability to send standby command to a system drive
|
||
|
||
Disabled/Unconfigured — restrictions are defined by system parameters.
|
||
|
||
Enabled — restriction with defined rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — set restriction with action denial (user is not allowed to perform the action);
|
||
|
||
"Yes" — remove the restriction (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
|
||
|
||
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
|
||
|
||
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
|
||
|
||
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
|
||
|
||
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
|
||
|
||
</string>
|
||
<string id="org-freedesktop-udisks2-ata-standby-system-user">Permission to send standby command to a system drive</string>
|
||
<string id="org-freedesktop-udisks2-ata-standby-system-user_help">The policy restricts the ability to send standby command to a system drive
|
||
|
||
Disabled/Unconfigured — restrictions are defined by system parameters.
|
||
|
||
Enabled — restriction with defined rights;
|
||
|
||
Possible values:
|
||
|
||
"No" — set restriction with action denial (user is not allowed to perform the action);
|
||
|
||
"Yes" — remove the restriction (the user can perform the action without any authentication);
|
||
|
||
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
|
||
|
||
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
|
||
|
||
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
|
||
|
||
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
|
||
|
||
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
|
||
|
||
</string>
|
||
|
||
<string id="org-freedesktop-udisks2-filesystem-mount-No">No</string>
|
||
<string id="org-freedesktop-udisks2-filesystem-mount-Yes">Yes</string>
|
||
<string id="org-freedesktop-udisks2-filesystem-mount-Auth-self">Auth_self</string>
|
||
<string id="org-freedesktop-udisks2-filesystem-mount-Auth-admin">Auth_admin</string>
|
||
<string id="org-freedesktop-udisks2-filesystem-mount-Auth-self-keep">Auth_self_keep</string>
|
||
<string id="org-freedesktop-udisks2-filesystem-mount-Auth-admin-keep">Auth_admin_keep</string>
|
||
<string id="org-freedesktop-udisks2-No">No</string>
|
||
<string id="org-freedesktop-udisks2-Yes">Yes</string>
|
||
<string id="org-freedesktop-udisks2-Auth-self">Auth_self</string>
|
||
<string id="org-freedesktop-udisks2-Auth-admin">Auth_admin</string>
|
||
<string id="org-freedesktop-udisks2-Auth-self-keep">Auth_self_keep</string>
|
||
<string id="org-freedesktop-udisks2-Auth-admin-keep">Auth_admin_keep</string>
|
||
<string id="org-freedesktop-policykit-No">No</string>
|
||
<string id="org-freedesktop-policykit-Yes">Yes</string>
|
||
<string id="org-freedesktop-policykit-Auth-self">Auth_self</string>
|
||
<string id="org-freedesktop-policykit-Auth-admin">Auth_admin</string>
|
||
<string id="org-freedesktop-policykit-Auth-self-keep">Auth_self_keep</string>
|
||
<string id="org-freedesktop-policykit-Auth-admin-keep">Auth_admin_keep</string>
|
||
|
||
</stringTable>
|
||
<presentationTable>
|
||
<presentation id="OrgFreedesktopUdisks2FileSystemMountAll-pr">
|
||
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopUdisks2FileSystemMount_setter">Restriction options for mounting removable storage devices:</dropdownList>
|
||
<checkBox refId="OrgFreedesktopUdisks2FileSystemMount_blocker">Block setting restrictions on mounting removable storage devices</checkBox>
|
||
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopUdisks2FileSystemMountOther_setter">Restriction options for mounting removable storage devices in remote sessions:</dropdownList>
|
||
<checkBox refId="OrgFreedesktopUdisks2FileSystemMountOther_blocker">Block setting restrictions on mounting removable storage devices in remote sessions</checkBox>
|
||
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopUdisks2FileSystemMountSystem_setter">Options for restrictions on mounting system partitions:</dropdownList>
|
||
<checkBox refId="OrgFreedesktopUdisks2FileSystemMountSystem_blocker">Block setting restrictions on mounting system partitions</checkBox>
|
||
</presentation>
|
||
<presentation id="OrgFreedesktopUdisks2FileSystemMountAllUser-pr">
|
||
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopUdisks2FileSystemMount_setter">Restriction options for mounting removable storage devices:</dropdownList>
|
||
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopUdisks2FileSystemMountOther_setter">Restriction options for mounting removable storage devices in remote sessions:</dropdownList>
|
||
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopUdisks2FileSystemMountSystem_setter">Options for restrictions on mounting system partitions:</dropdownList>
|
||
</presentation>
|
||
<presentation id="OrgFreedesktopUdisks2FileSystemMount-pr">
|
||
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopUdisks2FileSystemMount_setter">Restriction options:</dropdownList>
|
||
<checkBox refId="OrgFreedesktopUdisks2FileSystemMount_blocker">Block</checkBox>
|
||
</presentation>
|
||
<presentation id="OrgFreedesktopUdisks2FileSystemMountUser-pr">
|
||
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopUdisks2FileSystemMount_setter">Restriction options:</dropdownList>
|
||
</presentation>
|
||
<presentation id="OrgFreedesktopUdisks2-pr">
|
||
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopUdisks2_setter">Restriction options:</dropdownList>
|
||
<checkBox refId="OrgFreedesktopUdisks2_blocker">Block</checkBox>
|
||
</presentation>
|
||
<presentation id="OrgFreedesktopUdisks2User-pr">
|
||
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopUdisks2_setter">Restriction options:</dropdownList>
|
||
</presentation>
|
||
<presentation id="org-freedesktop-Policykit-pr">
|
||
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopPolicykit_setter">Варианты ограничений:</dropdownList>
|
||
<checkBox refId="OrgFreedesktopPolicykit_blocker">Блокировать</checkBox>
|
||
</presentation>
|
||
<presentation id="org-freedesktop-Policykit-user-pr">
|
||
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopPolicykit_setter">Варианты ограничений:</dropdownList>
|
||
</presentation>
|
||
</presentationTable>
|
||
</resources>
|
||
</policyDefinitionResources>
|