Class: Google::Apis::AndroidmanagementV1::AdvancedSecurityOverrides
- Inherits:
-
Object
- Object
- Google::Apis::AndroidmanagementV1::AdvancedSecurityOverrides
- Includes:
- Core::Hashable, Core::JsonObjectSupport
- Defined in:
- lib/google/apis/androidmanagement_v1/classes.rb,
lib/google/apis/androidmanagement_v1/representations.rb,
lib/google/apis/androidmanagement_v1/representations.rb
Overview
Advanced security settings. In most cases, setting these is not needed.
Instance Attribute Summary collapse
-
#common_criteria_mode ⇒ String
Controls Common Criteria Mode—security standards defined in the Common Criteria for Information Technology Security Evaluation (https://www. commoncriteriaportal.org/) (CC).
-
#content_protection_policy ⇒ String
Optional.
-
#developer_settings ⇒ String
Controls access to developer settings: developer options and safe boot.
-
#google_play_protect_verify_apps ⇒ String
Whether Google Play Protect verification (https://support.google.com/accounts/ answer/2812853) is enforced.
-
#mte_policy ⇒ String
Optional.
-
#personal_apps_that_can_read_work_notifications ⇒ Array<String>
Personal apps that can read work profile notifications using a NotificationListenerService (https://developer.android.com/reference/android/ service/notification/NotificationListenerService).
-
#untrusted_apps_policy ⇒ String
The policy for untrusted apps (apps from unknown sources) enforced on the device.
Instance Method Summary collapse
-
#initialize(**args) ⇒ AdvancedSecurityOverrides
constructor
A new instance of AdvancedSecurityOverrides.
-
#update!(**args) ⇒ Object
Update properties of this object.
Constructor Details
#initialize(**args) ⇒ AdvancedSecurityOverrides
Returns a new instance of AdvancedSecurityOverrides.
116 117 118 |
# File 'lib/google/apis/androidmanagement_v1/classes.rb', line 116 def initialize(**args) update!(**args) end |
Instance Attribute Details
#common_criteria_mode ⇒ String
Controls Common Criteria Mode—security standards defined in the Common
Criteria for Information Technology Security Evaluation (https://www.
commoncriteriaportal.org/) (CC). Enabling Common Criteria Mode increases
certain security components on a device, including AES-GCM encryption of
Bluetooth Long Term Keys, and Wi-Fi configuration stores.Common Criteria Mode
is only supported on company-owned devices running Android 11 or above.Warning:
Common Criteria Mode enforces a strict security model typically only required
for IT products used in national security systems and other highly sensitive
organizations. Standard device use may be affected. Only enabled if required.
Corresponds to the JSON property commonCriteriaMode
73 74 75 |
# File 'lib/google/apis/androidmanagement_v1/classes.rb', line 73 def common_criteria_mode @common_criteria_mode end |
#content_protection_policy ⇒ String
Optional. Controls whether content protection, which scans for deceptive apps,
is enabled. This is supported on Android 15 and above.
Corresponds to the JSON property contentProtectionPolicy
79 80 81 |
# File 'lib/google/apis/androidmanagement_v1/classes.rb', line 79 def content_protection_policy @content_protection_policy end |
#developer_settings ⇒ String
Controls access to developer settings: developer options and safe boot.
Replaces safeBootDisabled (deprecated) and debuggingFeaturesAllowed (
deprecated).
Corresponds to the JSON property developerSettings
86 87 88 |
# File 'lib/google/apis/androidmanagement_v1/classes.rb', line 86 def developer_settings @developer_settings end |
#google_play_protect_verify_apps ⇒ String
Whether Google Play Protect verification (https://support.google.com/accounts/
answer/2812853) is enforced. Replaces ensureVerifyAppsEnabled (deprecated).
Corresponds to the JSON property googlePlayProtectVerifyApps
92 93 94 |
# File 'lib/google/apis/androidmanagement_v1/classes.rb', line 92 def google_play_protect_verify_apps @google_play_protect_verify_apps end |
#mte_policy ⇒ String
Optional. Controls Memory Tagging Extension (MTE) (https://source.android.com/
docs/security/test/memory-safety/arm-mte) on the device. The device needs to
be rebooted to apply changes to the MTE policy.
Corresponds to the JSON property mtePolicy
99 100 101 |
# File 'lib/google/apis/androidmanagement_v1/classes.rb', line 99 def mte_policy @mte_policy end |
#personal_apps_that_can_read_work_notifications ⇒ Array<String>
Personal apps that can read work profile notifications using a
NotificationListenerService (https://developer.android.com/reference/android/
service/notification/NotificationListenerService). By default, no personal
apps (aside from system apps) can read work notifications. Each value in the
list must be a package name.
Corresponds to the JSON property personalAppsThatCanReadWorkNotifications
108 109 110 |
# File 'lib/google/apis/androidmanagement_v1/classes.rb', line 108 def personal_apps_that_can_read_work_notifications @personal_apps_that_can_read_work_notifications end |
#untrusted_apps_policy ⇒ String
The policy for untrusted apps (apps from unknown sources) enforced on the
device. Replaces install_unknown_sources_allowed (deprecated).
Corresponds to the JSON property untrustedAppsPolicy
114 115 116 |
# File 'lib/google/apis/androidmanagement_v1/classes.rb', line 114 def untrusted_apps_policy @untrusted_apps_policy end |
Instance Method Details
#update!(**args) ⇒ Object
Update properties of this object
121 122 123 124 125 126 127 128 129 |
# File 'lib/google/apis/androidmanagement_v1/classes.rb', line 121 def update!(**args) @common_criteria_mode = args[:common_criteria_mode] if args.key?(:common_criteria_mode) @content_protection_policy = args[:content_protection_policy] if args.key?(:content_protection_policy) @developer_settings = args[:developer_settings] if args.key?(:developer_settings) @google_play_protect_verify_apps = args[:google_play_protect_verify_apps] if args.key?(:google_play_protect_verify_apps) @mte_policy = args[:mte_policy] if args.key?(:mte_policy) @personal_apps_that_can_read_work_notifications = args[:personal_apps_that_can_read_work_notifications] if args.key?(:personal_apps_that_can_read_work_notifications) @untrusted_apps_policy = args[:untrusted_apps_policy] if args.key?(:untrusted_apps_policy) end |