admx-basealt/en-US/basealtpolkit.adml

793 lines
49 KiB
XML
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<?xml version="1.0" encoding="utf-8"?>
<!-- (c) 2023 BaseALT, Ltd. -->
<policyDefinitionResources xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://schemas.microsoft.com/GroupPolicy/2006/07/PolicyDefinitions" revision="1.0" schemaVersion="1.0">
<displayName>ALT Udisks2 policies definitions</displayName>
<description>This file contains the Udisks2 service policies definitions used by ALT operating system.</description>
<resources>
<stringTable>
<string id="org-freedesktop-udisks2-filesystem-mount">Permission to mount the file system</string>
<string id="org-freedesktop-udisks2-filesystem-mount_help">Permission to mount the file system
This policy grants or restricts permissions to mount removable storage devices.
Disabledd/Not configured — Permissions are determined by system settings. Default is «Auth_admin»
Enabled — permission to mount with set rights;
Possible values:
"No" — block permissions (the user is not allowed to perform the action);
"Yes" — grant permissions (the user can perform the action without any authentication);
"Auth_self" — The user must enter their password to authenticate. Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin" permission is generally recommended;
"Auth_admin" — The user must enter an administrator password on each request. Requires user authentication with administrator rights;
"Auth_self_keep" — Similar to "Auth_self", but the authorization is kept for a short period of time (for example, five minutes). Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin_keep" permission is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but the authorization is kept for a short period of time (for example, five minutes);
Note: the possession of administrative rights in the context of PolicyKit is determined by its rules. By default, Alt asks for the password of the user in the "wheel" group.
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
</string>
<string id="org-freedesktop-udisks2-filesystem-mount-user">Permission to mount the file system</string>
<string id="org-freedesktop-udisks2-filesystem-mount-user_help">Permission to mount the file system
This policy grants or restricts permissions to mount removable storage devices.
Disabledd/Not configured — Permissions are determined by system settings. Default is «Auth_admin»
Enabled — permission to mount with set rights;
Possible values:
"No" — block permissions (the user is not allowed to perform the action);
"Yes" — grant permissions (the user can perform the action without any authentication);
"Auth_self" — The user must enter their password to authenticate. Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin" permission is generally recommended;
"Auth_admin" — The user must enter an administrator password on each request. Requires user authentication with administrator rights;
"Auth_self_keep" — Similar to "Auth_self", but the authorization is kept for a short period of time (for example, five minutes). Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin_keep" permission is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but the authorization is kept for a short period of time (for example, five minutes);
Note: the possession of administrative rights in the context of PolicyKit is determined by its rules. By default, Alt asks for the password of the user in the "wheel" group.
</string>
<string id="org-freedesktop-udisks2-filesystem-mount-other-seat">Permission to mount removable storage devices in remote sessions</string>
<string id="org-freedesktop-udisks2-filesystem-mount-other-seat_help">Permission to mount removable storage devices in remote sessions
This policy grants or restricts permissions to mount removable storage devices from a device connected to a remote workstation (for example, on another computer or remote session).
Disabled/Not configured — Permissions are determined by system settings. Default is «Auth_admin»
Enabled — permission to mount with set rights;
Possible values:
"No" — block permissions (the user is not allowed to perform the action);
"Yes" — grant permissions (the user can perform the action without any authentication);
"Auth_self" — The user must enter their password to authenticate. Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin" permission is generally recommended;
"Auth_admin" — The user must enter an administrator password on each request. Requires user authentication with administrator rights;
"Auth_self_keep" — Similar to "Auth_self", but the authorization is kept for a short period of time (for example, five minutes). Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin_keep" permission is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but the authorization is kept for a short period of time (for example, five minutes);
Note: the possession of administrative rights in the context of PolicyKit is determined by its rules. By default, Alt asks for the password of the user in the "wheel" group.
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
</string>
<string id="org-freedesktop-udisks2-filesystem-mount-other-seat-user">Permission to mount removable storage devices in remote sessions</string>
<string id="org-freedesktop-udisks2-filesystem-mount-other-seat-user_help">Permission to mount removable storage devices in remote sessions
This policy grants or restricts permissions to mount removable storage devices from a device connected to a remote workstation (for example, on another computer or remote session).
Disabled/Not configured — Permissions are determined by system settings. Default is «Auth_admin»
Enabled — permission to mount with set rights;
Possible values:
"No" — block permissions (the user is not allowed to perform the action);
"Yes" — grant permissions (the user can perform the action without any authentication);
"Auth_self" — The user must enter their password to authenticate. Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin" permission is generally recommended;
"Auth_admin" — The user must enter an administrator password on each request. Requires user authentication with administrator rights;
"Auth_self_keep" — Similar to "Auth_self", but the authorization is kept for a short period of time (for example, five minutes). Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin_keep" permission is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but the authorization is kept for a short period of time (for example, five minutes);
Note: the possession of administrative rights in the context of PolicyKit is determined by its rules. By default, Alt asks for the password of the user in the "wheel" group.
</string>
<string id="org-freedesktop-udisks2-filesystem-mount-system">Permission to mount system partitions</string>
<string id="org-freedesktop-udisks2-filesystem-mount-system_help">Permission to mount system partitions
This policy grants or restricts permissions to matically mount system partitions.
Disabled/Not configured — Permissions are determined by system settings. Default is «Auth_admin»
Enabled — permission to mount with set rights;
Possible values:
"No" — block permissions (the user is not allowed to perform the action);
"Yes" — grant permissions (the user can perform the action without any authentication);
"Auth_self" — The user must enter their password to authenticate. Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin" permission is generally recommended;
"Auth_admin" — The user must enter an administrator password on each request. Requires user authentication with administrator rights;
"Auth_self_keep" — Similar to "Auth_self", but the authorization is kept for a short period of time (for example, five minutes). Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin_keep" permission is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but the authorization is kept for a short period of time (for example, five minutes);
Note: the possession of administrative rights in the context of PolicyKit is determined by its rules. By default, Alt asks for the password of the user in the "wheel" group.
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
</string>
<string id="org-freedesktop-udisks2-filesystem-mount-system-user">Permission to mount system partitions</string>
<string id="org-freedesktop-udisks2-filesystem-mount-system-user_help">Permission to mount system partitions
This policy grants or restricts permissions to matically mount system partitions.
Disabled/Not configured — Permissions are determined by system settings. Default is «Auth_admin»
Enabled — permission to mount with set rights;
Possible values:
"No" — block permissions (the user is not allowed to perform the action);
"Yes" — grant permissions (the user can perform the action without any authentication);
"Auth_self" — The user must enter their password to authenticate. Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin" permission is generally recommended;
"Auth_admin" — The user must enter an administrator password on each request. Requires user authentication with administrator rights;
"Auth_self_keep" — Similar to "Auth_self", but the authorization is kept for a short period of time (for example, five minutes). Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin_keep" permission is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but the authorization is kept for a short period of time (for example, five minutes);
Note: the possession of administrative rights in the context of PolicyKit is determined by its rules. By default, Alt asks for the password of the user in the "wheel" group.
</string>
<string id="org-freedesktop-udisks2-filesystem-mount-all">General mount policy</string>
<string id="org-freedesktop-udisks2-filesystem-mount-all_Help">This policy grants or restricts permissions to mount removable storage devices, mount system partitions, mount removable storage devices in remote sessions.
Disabled/Not configured — Permissions are determined by system settings. Default is «Auth_admin»
Enabled — permission to mount with set rights;
Possible values:
"No" — block permissions (the user is not allowed to perform the action);
"Yes" — grant permissions (the user can perform the action without any authentication);
"Auth_self" — The user must enter their password to authenticate. Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin" permission is generally recommended;
"Auth_admin" — The user must enter an administrator password on each request. Requires user authentication with administrator rights;
"Auth_self_keep" — Similar to "Auth_self", but the authorization is kept for a short period of time (for example, five minutes). Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin_keep" permission is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but the authorization is kept for a short period of time (for example, five minutes);
Note: the possession of administrative rights in the context of PolicyKit is determined by its rules. By default, Alt asks for the password of the user in the "wheel" group.
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
</string>
<string id="org-freedesktop-udisks2-filesystem-mount-all-user">General mount policy</string>
<string id="org-freedesktop-udisks2-filesystem-mount-all-user_Help">This policy grants or restricts permissions to mount removable storage devices, mount system partitions, mount removable storage devices in remote sessions.
Disabled/Not configured — Permissions are determined by system settings. Default is «Auth_admin»
Enable — permission to mount with set rights;
Possible values:
"No" — block permissions (the user is not allowed to perform the action);
"Yes" — grant permissions (the user can perform the action without any authentication);
"Auth_self" — The user must enter their password to authenticate. Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin" permission is generally recommended;
"Auth_admin" — The user must enter an administrator password on each request. Requires user authentication with administrator rights;
"Auth_self_keep" — Similar to "Auth_self", but the authorization is kept for a short period of time (for example, five minutes). Note that this permission is not sufficient for most uses on multi-user systems, the "Auth_admin_keep" permission is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but the authorization is kept for a short period of time (for example, five minutes);
Note: the possession of administrative rights in the context of PolicyKit is determined by its rules. By default, Alt asks for the password of the user in the "wheel" group.
</string>
<string id="org-freedesktop-policykit-exec">Permission to run a program as another user</string>
<string id="org-freedesktop-policykit-exec_Help">The policy controls the restriction on the ability to run the program as another user
Authentication is required to run a program as another user.
Disabled/Unconfigured — restrictions are defined by system parameters.
Enabled — restriction with defined rights;
Possible values:
"No" — set restriction with action denial (user is not allowed to perform the action);
"Yes" — remove the restriction (the user can perform the action without any authentication);
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
</string>
<string id="org-freedesktop-policykit-exec-user">Permission to join machine to realm</string>
<string id="org-freedesktop-policykit-exec-user_Help">The policy controls the restriction on the ability to run the program as another user
Authentication is required to run a program as another user.
Disabled/Unconfigured — restrictions are defined by system parameters.
Enabled — restriction with defined rights;
Possible values:
"No" — set restriction with action denial (user is not allowed to perform the action);
"Yes" — remove the restriction (the user can perform the action without any authentication);
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
</string>
<string id="org-freedesktop-udisks2-ata-check-power">Permission to сheck power state</string>
<string id="org-freedesktop-udisks2-ata-check-power_help">The policy restricts the ability to сheck power state
Disabled/Unconfigured — restrictions are defined by system parameters.
Enabled — restriction with defined rights;
Possible values:
"No" — set restriction with action denial (user is not allowed to perform the action);
"Yes" — remove the restriction (the user can perform the action without any authentication);
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
</string>
<string id="org-freedesktop-udisks2-ata-check-power-user">Permission to сheck power state</string>
<string id="org-freedesktop-udisks2-ata-check-power-user_help">The policy restricts the ability to сheck power state
Disabled/Unconfigured — restrictions are defined by system parameters.
Enabled — restriction with defined rights;
Possible values:
"No" — set restriction with action denial (user is not allowed to perform the action);
"Yes" — remove the restriction (the user can perform the action without any authentication);
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
</string>
<string id="org-freedesktop-udisks2-ata-secure-erase">Permission to securely erase a hard disk</string>
<string id="org-freedesktop-udisks2-ata-secure-erase_help">The policy restricts the ability to securely erase a hard disk
Disabled/Unconfigured — restrictions are defined by system parameters.
Enabled — restriction with defined rights;
Possible values:
"No" — set restriction with action denial (user is not allowed to perform the action);
"Yes" — remove the restriction (the user can perform the action without any authentication);
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
</string>
<string id="org-freedesktop-udisks2-ata-secure-erase-user">Permission to securely erase a hard disk</string>
<string id="org-freedesktop-udisks2-ata-secure-erase-user_help">The policy restricts the ability to securely erase a hard disk
Disabled/Unconfigured — restrictions are defined by system parameters.
Enabled — restriction with defined rights;
Possible values:
"No" — set restriction with action denial (user is not allowed to perform the action);
"Yes" — remove the restriction (the user can perform the action without any authentication);
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
</string>
<string id="org-freedesktop-udisks2-ata-smart-enable-disable">Permission to enable/Disable SMART</string>
<string id="org-freedesktop-udisks2-ata-smart-enable-disable_help">The policy restricts the ability to enable/Disable SMART
Disabled/Unconfigured — restrictions are defined by system parameters.
Enabled — restriction with defined rights;
Possible values:
"No" — set restriction with action denial (user is not allowed to perform the action);
"Yes" — remove the restriction (the user can perform the action without any authentication);
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
</string>
<string id="org-freedesktop-udisks2-ata-smart-enable-disable-user">Permission to enable/Disable SMART</string>
<string id="org-freedesktop-udisks2-ata-smart-enable-disable-user_help">The policy restricts the ability to enable/Disable SMART
Disabled/Unconfigured — restrictions are defined by system parameters.
Enabled — restriction with defined rights;
Possible values:
"No" — set restriction with action denial (user is not allowed to perform the action);
"Yes" — remove the restriction (the user can perform the action without any authentication);
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
</string>
<string id="org-freedesktop-udisks2-ata-smart-selftest">Permission to run SMART self-test</string>
<string id="org-freedesktop-udisks2-ata-smart-selftest_help">The policy restricts the ability to run SMART self-test
Disabled/Unconfigured — restrictions are defined by system parameters.
Enabled — restriction with defined rights;
Possible values:
"No" — set restriction with action denial (user is not allowed to perform the action);
"Yes" — remove the restriction (the user can perform the action without any authentication);
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
</string>
<string id="org-freedesktop-udisks2-ata-smart-selftest-user">Permission to run SMART self-test</string>
<string id="org-freedesktop-udisks2-ata-smart-selftest-user_help">The policy restricts the ability to run SMART self-test
Disabled/Unconfigured — restrictions are defined by system parameters.
Enabled — restriction with defined rights;
Possible values:
"No" — set restriction with action denial (user is not allowed to perform the action);
"Yes" — remove the restriction (the user can perform the action without any authentication);
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
</string>
<string id="org-freedesktop-udisks2-ata-smart-simulate">Permission to set SMART data from blob</string>
<string id="org-freedesktop-udisks2-ata-smart-simulate_help">The policy restricts the ability to set SMART data from blob
Disabled/Unconfigured — restrictions are defined by system parameters.
Enabled — restriction with defined rights;
Possible values:
"No" — set restriction with action denial (user is not allowed to perform the action);
"Yes" — remove the restriction (the user can perform the action without any authentication);
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
</string>
<string id="org-freedesktop-udisks2-ata-smart-simulate-user">Permission to set SMART data from blob</string>
<string id="org-freedesktop-udisks2-ata-smart-simulate-user_help">The policy restricts the ability to set SMART data from blob
Disabled/Unconfigured — restrictions are defined by system parameters.
Enabled — restriction with defined rights;
Possible values:
"No" — set restriction with action denial (user is not allowed to perform the action);
"Yes" — remove the restriction (the user can perform the action without any authentication);
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
</string>
<string id="org-freedesktop-udisks2-ata-smart-update">Permission to update SMART data</string>
<string id="org-freedesktop-udisks2-ata-smart-update_help">The policy restricts the ability to update SMART data
Disabled/Unconfigured — restrictions are defined by system parameters.
Enabled — restriction with defined rights;
Possible values:
"No" — set restriction with action denial (user is not allowed to perform the action);
"Yes" — remove the restriction (the user can perform the action without any authentication);
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
</string>
<string id="org-freedesktop-udisks2-ata-smart-update-user">Permission to update SMART data</string>
<string id="org-freedesktop-udisks2-ata-smart-update-user_help">The policy restricts the ability to update SMART data
Disabled/Unconfigured — restrictions are defined by system parameters.
Enabled — restriction with defined rights;
Possible values:
"No" — set restriction with action denial (user is not allowed to perform the action);
"Yes" — remove the restriction (the user can perform the action without any authentication);
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
</string>
<string id="org-freedesktop-udisks2-ata-standby">Permission to send standby command</string>
<string id="org-freedesktop-udisks2-ata-standby_help">The policy restricts the ability to send standby command
Disabled/Unconfigured — restrictions are defined by system parameters.
Enabled — restriction with defined rights;
Possible values:
"No" — set restriction with action denial (user is not allowed to perform the action);
"Yes" — remove the restriction (the user can perform the action without any authentication);
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
</string>
<string id="org-freedesktop-udisks2-ata-standby-user">Permission to send standby command</string>
<string id="org-freedesktop-udisks2-ata-standby-user_help">The policy restricts the ability to send standby command
Disabled/Unconfigured — restrictions are defined by system parameters.
Enabled — restriction with defined rights;
Possible values:
"No" — set restriction with action denial (user is not allowed to perform the action);
"Yes" — remove the restriction (the user can perform the action without any authentication);
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
</string>
<string id="org-freedesktop-udisks2-ata-standby-other-seat">Permission to send standby command to drive on other seat</string>
<string id="org-freedesktop-udisks2-ata-standby-other-seat_help">The policy restricts the ability to send standby command to drive on other seat
Disabled/Unconfigured — restrictions are defined by system parameters.
Enabled — restriction with defined rights;
Possible values:
"No" — set restriction with action denial (user is not allowed to perform the action);
"Yes" — remove the restriction (the user can perform the action without any authentication);
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
</string>
<string id="org-freedesktop-udisks2-ata-standby-other-seat-user">Permission to send standby command to drive on other seat</string>
<string id="org-freedesktop-udisks2-ata-standby-other-seat-user_help">The policy restricts the ability to send standby command to drive on other seat
Disabled/Unconfigured — restrictions are defined by system parameters.
Enabled — restriction with defined rights;
Possible values:
"No" — set restriction with action denial (user is not allowed to perform the action);
"Yes" — remove the restriction (the user can perform the action without any authentication);
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
</string>
<string id="org-freedesktop-udisks2-ata-standby-system">Permission to send standby command to a system drive</string>
<string id="org-freedesktop-udisks2-ata-standby-system_help">The policy restricts the ability to send standby command to a system drive
Disabled/Unconfigured — restrictions are defined by system parameters.
Enabled — restriction with defined rights;
Possible values:
"No" — set restriction with action denial (user is not allowed to perform the action);
"Yes" — remove the restriction (the user can perform the action without any authentication);
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
The "Block" option prevents the user from changing this setting. Blocking a policy makes it a priority over a similar policy for the user.
</string>
<string id="org-freedesktop-udisks2-ata-standby-system-user">Permission to send standby command to a system drive</string>
<string id="org-freedesktop-udisks2-ata-standby-system-user_help">The policy restricts the ability to send standby command to a system drive
Disabled/Unconfigured — restrictions are defined by system parameters.
Enabled — restriction with defined rights;
Possible values:
"No" — set restriction with action denial (user is not allowed to perform the action);
"Yes" — remove the restriction (the user can perform the action without any authentication);
"Auth_self" — the user must enter his/her password for authentication. Note, this level of restriction is not sufficient for most multi-user applications, "Auth_admin" is usually recommended;
"Auth_admin" — the user must enter the administrator password at each request. Requires authentication of the user with administrator privileges;
"Auth_self_keep" — similar to "Auth_self", but authorization is maintained for a short period of time (e.g., five minutes). Note, this level of restriction is insufficient for most multi-user applications, "Auth_admin_keep" is generally recommended;
"Auth_admin_keep" — similar to "Auth_admin", but authorization is maintained for a short period of time (e.g., five minutes);
Note: the possession of administrative rights in a PolicyKit context is determined by its rules. By default, Alt asks for the password of a user in the "wheel" group.
</string>
<string id="org-freedesktop-udisks2-filesystem-mount-No">No</string>
<string id="org-freedesktop-udisks2-filesystem-mount-Yes">Yes</string>
<string id="org-freedesktop-udisks2-filesystem-mount-Auth-self">Auth_self</string>
<string id="org-freedesktop-udisks2-filesystem-mount-Auth-admin">Auth_admin</string>
<string id="org-freedesktop-udisks2-filesystem-mount-Auth-self-keep">Auth_self_keep</string>
<string id="org-freedesktop-udisks2-filesystem-mount-Auth-admin-keep">Auth_admin_keep</string>
<string id="org-freedesktop-udisks2-No">No</string>
<string id="org-freedesktop-udisks2-Yes">Yes</string>
<string id="org-freedesktop-udisks2-Auth-self">Auth_self</string>
<string id="org-freedesktop-udisks2-Auth-admin">Auth_admin</string>
<string id="org-freedesktop-udisks2-Auth-self-keep">Auth_self_keep</string>
<string id="org-freedesktop-udisks2-Auth-admin-keep">Auth_admin_keep</string>
<string id="org-freedesktop-policykit-No">No</string>
<string id="org-freedesktop-policykit-Yes">Yes</string>
<string id="org-freedesktop-policykit-Auth-self">Auth_self</string>
<string id="org-freedesktop-policykit-Auth-admin">Auth_admin</string>
<string id="org-freedesktop-policykit-Auth-self-keep">Auth_self_keep</string>
<string id="org-freedesktop-policykit-Auth-admin-keep">Auth_admin_keep</string>
</stringTable>
<presentationTable>
<presentation id="OrgFreedesktopUdisks2FileSystemMountAll-pr">
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopUdisks2FileSystemMount_setter">Restriction options for mounting removable storage devices:</dropdownList>
<checkBox refId="OrgFreedesktopUdisks2FileSystemMount_blocker">Block setting restrictions on mounting removable storage devices</checkBox>
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopUdisks2FileSystemMountOther_setter">Restriction options for mounting removable storage devices in remote sessions:</dropdownList>
<checkBox refId="OrgFreedesktopUdisks2FileSystemMountOther_blocker">Block setting restrictions on mounting removable storage devices in remote sessions</checkBox>
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopUdisks2FileSystemMountSystem_setter">Options for restrictions on mounting system partitions:</dropdownList>
<checkBox refId="OrgFreedesktopUdisks2FileSystemMountSystem_blocker">Block setting restrictions on mounting system partitions</checkBox>
</presentation>
<presentation id="OrgFreedesktopUdisks2FileSystemMountAllUser-pr">
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopUdisks2FileSystemMount_setter">Restriction options for mounting removable storage devices:</dropdownList>
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopUdisks2FileSystemMountOther_setter">Restriction options for mounting removable storage devices in remote sessions:</dropdownList>
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopUdisks2FileSystemMountSystem_setter">Options for restrictions on mounting system partitions:</dropdownList>
</presentation>
<presentation id="OrgFreedesktopUdisks2FileSystemMount-pr">
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopUdisks2FileSystemMount_setter">Restriction options:</dropdownList>
<checkBox refId="OrgFreedesktopUdisks2FileSystemMount_blocker">Block</checkBox>
</presentation>
<presentation id="OrgFreedesktopUdisks2FileSystemMountUser-pr">
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopUdisks2FileSystemMount_setter">Restriction options:</dropdownList>
</presentation>
<presentation id="OrgFreedesktopUdisks2-pr">
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopUdisks2_setter">Restriction options:</dropdownList>
<checkBox refId="OrgFreedesktopUdisks2_blocker">Block</checkBox>
</presentation>
<presentation id="OrgFreedesktopUdisks2User-pr">
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopUdisks2_setter">Restriction options:</dropdownList>
</presentation>
<presentation id="org-freedesktop-Policykit-pr">
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopPolicykit_setter">Варианты ограничений:</dropdownList>
<checkBox refId="OrgFreedesktopPolicykit_blocker">Блокировать</checkBox>
</presentation>
<presentation id="org-freedesktop-Policykit-user-pr">
<dropdownList noSort="true" defaultItem="1" refId="OrgFreedesktopPolicykit_setter">Варианты ограничений:</dropdownList>
</presentation>
</presentationTable>
</resources>
</policyDefinitionResources>