DevicePolicy
specifies device specific restrictions necessary to acquire a
given access level. A DevicePolicy
specifies requirements for requests from
devices to be granted access levels, it does not do any enforcement on the
device. DevicePolicy
acts as an AND over all specified fields, and each
repeated field is an OR over its elements. Any unset fields are ignored. For
example, if the proto is { os_type : DESKTOP_WINDOWS, os_type :
DESKTOP_LINUX, encryption_status: ENCRYPTED}, then the DevicePolicy will be
true for requests originating from encrypted Linux desktops and encrypted
Windows desktops.
Inherits
- Object
Extended By
- Google::Protobuf::MessageExts::ClassMethods
Includes
- Google::Protobuf::MessageExts
Methods
#allowed_device_management_levels
def allowed_device_management_levels() -> ::Array<::Google::Identity::AccessContextManager::Type::DeviceManagementLevel>
- (::Array<::Google::Identity::AccessContextManager::Type::DeviceManagementLevel>) — Allowed device management levels, an empty list allows all management levels.
#allowed_device_management_levels=
def allowed_device_management_levels=(value) -> ::Array<::Google::Identity::AccessContextManager::Type::DeviceManagementLevel>
- value (::Array<::Google::Identity::AccessContextManager::Type::DeviceManagementLevel>) — Allowed device management levels, an empty list allows all management levels.
- (::Array<::Google::Identity::AccessContextManager::Type::DeviceManagementLevel>) — Allowed device management levels, an empty list allows all management levels.
#allowed_encryption_statuses
def allowed_encryption_statuses() -> ::Array<::Google::Identity::AccessContextManager::Type::DeviceEncryptionStatus>
- (::Array<::Google::Identity::AccessContextManager::Type::DeviceEncryptionStatus>) — Allowed encryptions statuses, an empty list allows all statuses.
#allowed_encryption_statuses=
def allowed_encryption_statuses=(value) -> ::Array<::Google::Identity::AccessContextManager::Type::DeviceEncryptionStatus>
- value (::Array<::Google::Identity::AccessContextManager::Type::DeviceEncryptionStatus>) — Allowed encryptions statuses, an empty list allows all statuses.
- (::Array<::Google::Identity::AccessContextManager::Type::DeviceEncryptionStatus>) — Allowed encryptions statuses, an empty list allows all statuses.
#os_constraints
def os_constraints() -> ::Array<::Google::Identity::AccessContextManager::V1::OsConstraint>
- (::Array<::Google::Identity::AccessContextManager::V1::OsConstraint>) — Allowed OS versions, an empty list allows all types and all versions.
#os_constraints=
def os_constraints=(value) -> ::Array<::Google::Identity::AccessContextManager::V1::OsConstraint>
- value (::Array<::Google::Identity::AccessContextManager::V1::OsConstraint>) — Allowed OS versions, an empty list allows all types and all versions.
- (::Array<::Google::Identity::AccessContextManager::V1::OsConstraint>) — Allowed OS versions, an empty list allows all types and all versions.
#require_admin_approval
def require_admin_approval() -> ::Boolean
- (::Boolean) — Whether the device needs to be approved by the customer admin.
#require_admin_approval=
def require_admin_approval=(value) -> ::Boolean
- value (::Boolean) — Whether the device needs to be approved by the customer admin.
- (::Boolean) — Whether the device needs to be approved by the customer admin.
#require_corp_owned
def require_corp_owned() -> ::Boolean
- (::Boolean) — Whether the device needs to be corp owned.
#require_corp_owned=
def require_corp_owned=(value) -> ::Boolean
- value (::Boolean) — Whether the device needs to be corp owned.
- (::Boolean) — Whether the device needs to be corp owned.
#require_screenlock
def require_screenlock() -> ::Boolean
-
(::Boolean) — Whether or not screenlock is required for the DevicePolicy to be true.
Defaults to
false
.
#require_screenlock=
def require_screenlock=(value) -> ::Boolean
-
value (::Boolean) — Whether or not screenlock is required for the DevicePolicy to be true.
Defaults to
false
.
-
(::Boolean) — Whether or not screenlock is required for the DevicePolicy to be true.
Defaults to
false
.