Hi there! Are you looking for the official Deno documentation? Try docs.deno.com for all your Deno learning needs.

AdvancedSecurityOverrides

import type { AdvancedSecurityOverrides } from "https://googleapis.deno.dev/v1/androidmanagement:v1.ts";

Advanced security settings. In most cases, setting these is not needed.

interface AdvancedSecurityOverrides {
commonCriteriaMode?: "COMMON_CRITERIA_MODE_UNSPECIFIED" | "COMMON_CRITERIA_MODE_DISABLED" | "COMMON_CRITERIA_MODE_ENABLED";
developerSettings?: "DEVELOPER_SETTINGS_UNSPECIFIED" | "DEVELOPER_SETTINGS_DISABLED" | "DEVELOPER_SETTINGS_ALLOWED";
googlePlayProtectVerifyApps?: "GOOGLE_PLAY_PROTECT_VERIFY_APPS_UNSPECIFIED" | "VERIFY_APPS_ENFORCED" | "VERIFY_APPS_USER_CHOICE";
mtePolicy?:
| "MTE_POLICY_UNSPECIFIED"
| "MTE_USER_CHOICE"
| "MTE_ENFORCED"
| "MTE_DISABLED";
personalAppsThatCanReadWorkNotifications?: string[];
untrustedAppsPolicy?:
| "UNTRUSTED_APPS_POLICY_UNSPECIFIED"
| "DISALLOW_INSTALL"
| "ALLOW_INSTALL_IN_PERSONAL_PROFILE_ONLY"
| "ALLOW_INSTALL_DEVICE_WIDE";
}

§Properties

§
commonCriteriaMode?: "COMMON_CRITERIA_MODE_UNSPECIFIED" | "COMMON_CRITERIA_MODE_DISABLED" | "COMMON_CRITERIA_MODE_ENABLED"
[src]

Controls Common Criteria Mode—security standards defined in the Common Criteria for Information Technology Security Evaluation (https://www.commoncriteriaportal.org/) (CC). Enabling Common Criteria Mode increases certain security components on a device, including AES-GCM encryption of Bluetooth Long Term Keys, and Wi-Fi configuration stores.Warning: Common Criteria Mode enforces a strict security model typically only required for IT products used in national security systems and other highly sensitive organizations. Standard device use may be affected. Only enabled if required.

§
developerSettings?: "DEVELOPER_SETTINGS_UNSPECIFIED" | "DEVELOPER_SETTINGS_DISABLED" | "DEVELOPER_SETTINGS_ALLOWED"
[src]

Controls access to developer settings: developer options and safe boot. Replaces safeBootDisabled (deprecated) and debuggingFeaturesAllowed (deprecated).

§
googlePlayProtectVerifyApps?: "GOOGLE_PLAY_PROTECT_VERIFY_APPS_UNSPECIFIED" | "VERIFY_APPS_ENFORCED" | "VERIFY_APPS_USER_CHOICE"
[src]

Whether Google Play Protect verification (https://support.google.com/accounts/answer/2812853) is enforced. Replaces ensureVerifyAppsEnabled (deprecated).

§
mtePolicy?: "MTE_POLICY_UNSPECIFIED" | "MTE_USER_CHOICE" | "MTE_ENFORCED" | "MTE_DISABLED"
[src]

Optional. Controls Memory Tagging Extension (MTE) (https://source.android.com/docs/security/test/memory-safety/arm-mte) on the device. The device needs to be rebooted to apply changes to the MTE policy.

§
personalAppsThatCanReadWorkNotifications?: string[]
[src]

Personal apps that can read work profile notifications using a NotificationListenerService (https://developer.android.com/reference/android/service/notification/NotificationListenerService). By default, no personal apps (aside from system apps) can read work notifications. Each value in the list must be a package name.

§
untrustedAppsPolicy?: "UNTRUSTED_APPS_POLICY_UNSPECIFIED" | "DISALLOW_INSTALL" | "ALLOW_INSTALL_IN_PERSONAL_PROFILE_ONLY" | "ALLOW_INSTALL_DEVICE_WIDE"
[src]

The policy for untrusted apps (apps from unknown sources) enforced on the device. Replaces install_unknown_sources_allowed (deprecated).