pub struct AdvancedSecurityOverrides {
pub common_criteria_mode: Option<String>,
pub developer_settings: Option<String>,
pub google_play_protect_verify_apps: Option<String>,
pub mte_policy: Option<String>,
pub personal_apps_that_can_read_work_notifications: Option<Vec<String>>,
pub untrusted_apps_policy: Option<String>,
}
Expand description
Advanced security settings. In most cases, setting these is not needed.
This type is not used in any activity, and only used as part of another schema.
Fields§
§common_criteria_mode: Option<String>
Controls Common Criteria Mode—security standards defined in the Common Criteria for Information Technology Security Evaluation (https://www.commoncriteriaportal.org/) (CC). Enabling Common Criteria Mode increases certain security components on a device, including AES-GCM encryption of Bluetooth Long Term Keys, and Wi-Fi configuration stores.Warning: Common Criteria Mode enforces a strict security model typically only required for IT products used in national security systems and other highly sensitive organizations. Standard device use may be affected. Only enabled if required.
developer_settings: Option<String>
Controls access to developer settings: developer options and safe boot. Replaces safeBootDisabled (deprecated) and debuggingFeaturesAllowed (deprecated).
google_play_protect_verify_apps: Option<String>
Whether Google Play Protect verification (https://support.google.com/accounts/answer/2812853) is enforced. Replaces ensureVerifyAppsEnabled (deprecated).
mte_policy: Option<String>
Optional. Controls Memory Tagging Extension (MTE) (https://source.android.com/docs/security/test/memory-safety/arm-mte) on the device. The device needs to be rebooted to apply changes to the MTE policy.
personal_apps_that_can_read_work_notifications: Option<Vec<String>>
Personal apps that can read work profile notifications using a NotificationListenerService (https://developer.android.com/reference/android/service/notification/NotificationListenerService). By default, no personal apps (aside from system apps) can read work notifications. Each value in the list must be a package name.
untrusted_apps_policy: Option<String>
The policy for untrusted apps (apps from unknown sources) enforced on the device. Replaces install_unknown_sources_allowed (deprecated).
Trait Implementations§
Source§impl Clone for AdvancedSecurityOverrides
impl Clone for AdvancedSecurityOverrides
Source§fn clone(&self) -> AdvancedSecurityOverrides
fn clone(&self) -> AdvancedSecurityOverrides
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moreSource§impl Debug for AdvancedSecurityOverrides
impl Debug for AdvancedSecurityOverrides
Source§impl Default for AdvancedSecurityOverrides
impl Default for AdvancedSecurityOverrides
Source§fn default() -> AdvancedSecurityOverrides
fn default() -> AdvancedSecurityOverrides
Source§impl<'de> Deserialize<'de> for AdvancedSecurityOverrides
impl<'de> Deserialize<'de> for AdvancedSecurityOverrides
Source§fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where
__D: Deserializer<'de>,
fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where
__D: Deserializer<'de>,
impl Part for AdvancedSecurityOverrides
Auto Trait Implementations§
impl Freeze for AdvancedSecurityOverrides
impl RefUnwindSafe for AdvancedSecurityOverrides
impl Send for AdvancedSecurityOverrides
impl Sync for AdvancedSecurityOverrides
impl Unpin for AdvancedSecurityOverrides
impl UnwindSafe for AdvancedSecurityOverrides
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
Source§impl<T> Instrument for T
impl<T> Instrument for T
Source§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
Source§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
Source§impl<T> IntoEither for T
impl<T> IntoEither for T
Source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left
is true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read moreSource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left(&self)
returns true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read more