Struct google_androidmanagement1::Policy[][src]

pub struct Policy {
    pub compliance_rules: Option<Vec<ComplianceRule>>,
    pub data_roaming_disabled: Option<bool>,
    pub network_reset_disabled: Option<bool>,
    pub share_location_disabled: Option<bool>,
    pub persistent_preferred_activities: Option<Vec<PersistentPreferredActivity>>,
    pub permitted_input_methods: Option<PackageNameList>,
    pub status_reporting_settings: Option<StatusReportingSettings>,
    pub bluetooth_config_disabled: Option<bool>,
    pub location_mode: Option<String>,
    pub mobile_networks_config_disabled: Option<bool>,
    pub install_unknown_sources_allowed: Option<bool>,
    pub block_applications_enabled: Option<bool>,
    pub long_support_message: Option<UserFacingMessage>,
    pub android_device_policy_tracks: Option<Vec<String>>,
    pub device_owner_lock_screen_info: Option<UserFacingMessage>,
    pub bluetooth_disabled: Option<bool>,
    pub status_bar_disabled: Option<bool>,
    pub choose_private_key_rules: Option<Vec<ChoosePrivateKeyRule>>,
    pub play_store_mode: Option<String>,
    pub usb_file_transfer_disabled: Option<bool>,
    pub outgoing_beam_disabled: Option<bool>,
    pub fun_disabled: Option<bool>,
    pub always_on_vpn_package: Option<AlwaysOnVpnPackage>,
    pub keyguard_disabled_features: Option<Vec<String>>,
    pub cell_broadcasts_config_disabled: Option<bool>,
    pub keyguard_disabled: Option<bool>,
    pub default_permission_policy: Option<String>,
    pub factory_reset_disabled: Option<bool>,
    pub bluetooth_contact_sharing_disabled: Option<bool>,
    pub network_escape_hatch_enabled: Option<bool>,
    pub name: Option<String>,
    pub app_auto_update_policy: Option<String>,
    pub set_user_icon_disabled: Option<bool>,
    pub stay_on_plugged_modes: Option<Vec<String>>,
    pub install_apps_disabled: Option<bool>,
    pub adjust_volume_disabled: Option<bool>,
    pub short_support_message: Option<UserFacingMessage>,
    pub ensure_verify_apps_enabled: Option<bool>,
    pub private_key_selection_enabled: Option<bool>,
    pub tethering_config_disabled: Option<bool>,
    pub camera_disabled: Option<bool>,
    pub wifi_configs_lockdown_enabled: Option<bool>,
    pub add_user_disabled: Option<bool>,
    pub kiosk_custom_launcher_enabled: Option<bool>,
    pub safe_boot_disabled: Option<bool>,
    pub remove_user_disabled: Option<bool>,
    pub open_network_configuration: Option<HashMap<String, String>>,
    pub account_types_with_management_disabled: Option<Vec<String>>,
    pub frp_admin_emails: Option<Vec<String>>,
    pub password_requirements: Option<PasswordRequirements>,
    pub maximum_time_to_lock: Option<String>,
    pub version: Option<String>,
    pub mount_physical_media_disabled: Option<bool>,
    pub vpn_config_disabled: Option<bool>,
    pub modify_accounts_disabled: Option<bool>,
    pub set_wallpaper_disabled: Option<bool>,
    pub skip_first_use_hints_enabled: Option<bool>,
    pub encryption_policy: Option<String>,
    pub sms_disabled: Option<bool>,
    pub recommended_global_proxy: Option<ProxyInfo>,
    pub wifi_config_disabled: Option<bool>,
    pub usb_mass_storage_enabled: Option<bool>,
    pub applications: Option<Vec<ApplicationPolicy>>,
    pub unmute_microphone_disabled: Option<bool>,
    pub debugging_features_allowed: Option<bool>,
    pub uninstall_apps_disabled: Option<bool>,
    pub outgoing_calls_disabled: Option<bool>,
    pub auto_time_required: Option<bool>,
    pub system_update: Option<SystemUpdate>,
    pub screen_capture_disabled: Option<bool>,
    pub credentials_config_disabled: Option<bool>,
    pub permission_grants: Option<Vec<PermissionGrant>>,
    pub create_windows_disabled: Option<bool>,
}

A policy resources represents a group settings that govern the behavior of a managed device and the apps installed on it.

Activities

This type is used in activities, which are methods you may call on this type or where this type is involved in. The list links the activity name, along with information about where it is used (one of request and response).

Fields

Rules declaring which mitigating actions to take when a device is not compliant with its policy. When the conditions for multiple rules are satisfied, all of the mitigating actions for the rules are taken. There is a maximum limit of 100 rules.

Whether roaming data services are disabled.

Whether resetting network settings is disabled.

Whether location sharing is disabled.

Default intent handler activities.

If present, only the input methods provided by packages in this list are permitted. If this field is present, but the list is empty, then only system input methods are permitted.

Status reporting settings

Whether configuring bluetooth is disabled.

The degree of location detection enabled. The user may change the value unless the user is otherwise blocked from accessing device settings.

Whether configuring mobile networks is disabled.

Whether the user is allowed to enable the "Unknown Sources" setting, which allows installation of apps from unknown sources.

Whether applications other than the ones configured in applications are blocked from being installed. When set, applications that were installed under a previous policy but no longer appear in the policy are automatically uninstalled.

A message displayed to the user in the device administators settings screen.

The app tracks for Android Device Policy the device can access. The device receives the latest version among all accessible tracks. If no tracks are specified, then the device only uses the production track.

The device owner information to be shown on the lock screen.

Whether bluetooth is disabled. Prefer this setting over bluetooth_config_disabled because bluetooth_config_disabled can be bypassed by the user.

Whether the status bar is disabled. This disables notifications, quick settings, and other screen overlays that allow escape from full-screen mode.

Rules for automatically choosing a private key and certificate to authenticate the device to a server. The rules are ordered by increasing precedence, so if an outgoing request matches more than one rule, the last rule defines which private key to use.

This mode controls which apps are available to the user in the Play Store and the behavior on the device when apps are removed from the policy.

Whether transferring files over USB is disabled.

Whether using NFC to beam data from apps is disabled.

Whether the user is allowed to have fun. Controls whether the Easter egg game in Settings is disabled.

Configuration for an always-on VPN connection. Use with vpn_config_disabled to prevent modification of this setting.

Disabled keyguard customizations, such as widgets.

Whether configuring cell broadcast is disabled.

Whether the keyguard is disabled.

The default permission policy for runtime permission requests.

Whether factory resetting from settings is disabled.

Whether bluetooth contact sharing is disabled.

Whether the network escape hatch is enabled. If a network connection can't be made at boot time, the escape hatch prompts the user to temporarily connect to a network in order to refresh the device policy. After applying policy, the temporary network will be forgotten and the device will continue booting. This prevents being unable to connect to a network if there is no suitable network in the last policy and the device boots into an app in lock task mode, or the user is otherwise unable to reach device settings.

The name of the policy in the form enterprises/{enterpriseId}/policies/{policyId}.

The app auto update policy, which controls when automatic app updates can be applied.

Whether changing the user icon is disabled.

The battery plugged in modes for which the device stays on. When using this setting, it is recommended to clear maximum_time_to_lock so that the device doesn't lock itself while it stays on.

Whether user installation of apps is disabled.

Whether adjusting the master volume is disabled.

A message displayed to the user in the settings screen wherever functionality has been disabled by the admin.

Whether app verification is force-enabled.

Allows showing UI on a device for a user to choose a private key alias if there are no matching rules in ChoosePrivateKeyRules. For devices below Android P, setting this may leave enterprise keys vulnerable.

Whether configuring tethering and portable hotspots is disabled.

Whether all cameras on the device are disabled.

Whether Wi-Fi networks defined in Open Network Configuration are locked so they can't be edited by the user.

Whether adding new users and profiles is disabled.

Whether the kiosk custom launcher is enabled. This replaces the home screen with a launcher that locks down the device to the apps installed via the applications setting. The apps appear on a single page in alphabetical order. It is recommended to also use status_bar_disabled to block access to device settings.

Whether rebooting the device into safe boot is disabled.

Whether removing other users is disabled.

Network configuration for the device. See configure networks for more information.

Account types that can't be managed by the user.

Email addresses of device administrators for factory reset protection. When the device is factory reset, it will require one of these admins to log in with the Google account email and password to unlock the device. If no admins are specified, the device won't provide factory reset protection.

Password requirements.

Maximum time in milliseconds for user activity until the device locks. A value of 0 means there is no restriction.

The version of the policy. This is a read-only field. The version is incremented each time the policy is updated.

Whether the user mounting physical external media is disabled.

Whether configuring VPN is disabled.

Whether adding or removing accounts is disabled.

Whether changing the wallpaper is disabled.

Flag to skip hints on the first use. Enterprise admin can enable the system recommendation for apps to skip their user tutorial and other introductory hints on first start-up.

Whether encryption is enabled

Whether sending and receiving SMS messages is disabled.

The network-independent global HTTP proxy. Typically proxies should be configured per-network in open_network_configuration. However for unusual configurations like general internal filtering a global HTTP proxy may be useful. If the proxy is not accessible, network access may break. The global proxy is only a recommendation and some apps may ignore it.

Whether configuring Wi-Fi access points is disabled.

Whether USB storage is enabled.

Policy applied to apps.

Whether the microphone is muted and adjusting microphone volume is disabled.

Whether the user is allowed to enable debugging features.

Whether user uninstallation of applications is disabled.

Whether outgoing calls are disabled.

Whether auto time is required, which prevents the user from manually setting the date and time.

The system update policy, which controls how OS updates are applied. If the update type is WINDOWED, the update window will automatically apply to Play app updates as well.

Whether screen capture is disabled.

Whether configuring user credentials is disabled.

Explicit permission or group grants or denials for all apps. These values override the default_permission_policy.

Whether creating windows besides app windows is disabled.

Trait Implementations

impl Default for Policy
[src]

Returns the "default value" for a type. Read more

impl Clone for Policy
[src]

Returns a copy of the value. Read more

Performs copy-assignment from source. Read more

impl Debug for Policy
[src]

Formats the value using the given formatter. Read more

impl RequestValue for Policy
[src]

impl ResponseResult for Policy
[src]

Auto Trait Implementations

impl Send for Policy

impl Sync for Policy