Hi there! Are you looking for the official Deno documentation? Try docs.deno.com for all your Deno learning needs.

DeviceSignals

import type { DeviceSignals } from "https://googleapis.deno.dev/v1/verifiedaccess:v2.ts";

The device signals as reported by Chrome. Unless otherwise specified, signals are available on all platforms.

interface DeviceSignals {
readonly allowScreenLock?: boolean;
readonly antivirus?: Antivirus;
readonly browserVersion?: string;
readonly builtInDnsClientEnabled?: boolean;
readonly chromeRemoteDesktopAppBlocked?: boolean;
readonly crowdStrikeAgent?: CrowdStrikeAgent;
readonly deviceAffiliationIds?: string[];
readonly deviceEnrollmentDomain?: string;
readonly deviceManufacturer?: string;
readonly deviceModel?: string;
readonly diskEncryption?:
| "DISK_ENCRYPTION_UNSPECIFIED"
| "DISK_ENCRYPTION_UNKNOWN"
| "DISK_ENCRYPTION_DISABLED"
| "DISK_ENCRYPTION_ENCRYPTED";
readonly displayName?: string;
hostname?: string;
readonly imei?: string[];
readonly macAddresses?: string[];
readonly meid?: string[];
readonly operatingSystem?:
| "OPERATING_SYSTEM_UNSPECIFIED"
| "CHROME_OS"
| "CHROMIUM_OS"
| "WINDOWS"
| "MAC_OS_X"
| "LINUX";
readonly osFirewall?:
| "OS_FIREWALL_UNSPECIFIED"
| "OS_FIREWALL_UNKNOWN"
| "OS_FIREWALL_DISABLED"
| "OS_FIREWALL_ENABLED";
readonly osVersion?: string;
readonly passwordProtectionWarningTrigger?:
| "PASSWORD_PROTECTION_WARNING_TRIGGER_UNSPECIFIED"
| "POLICY_UNSET"
| "PASSWORD_PROTECTION_OFF"
| "PASSWORD_REUSE"
| "PHISHING_REUSE";
readonly profileAffiliationIds?: string[];
readonly profileEnrollmentDomain?: string;
readonly realtimeUrlCheckMode?: "REALTIME_URL_CHECK_MODE_UNSPECIFIED" | "REALTIME_URL_CHECK_MODE_DISABLED" | "REALTIME_URL_CHECK_MODE_ENABLED_MAIN_FRAME";
readonly safeBrowsingProtectionLevel?:
| "SAFE_BROWSING_PROTECTION_LEVEL_UNSPECIFIED"
| "INACTIVE"
| "STANDARD"
| "ENHANCED";
readonly screenLockSecured?:
| "SCREEN_LOCK_SECURED_UNSPECIFIED"
| "SCREEN_LOCK_SECURED_UNKNOWN"
| "SCREEN_LOCK_SECURED_DISABLED"
| "SCREEN_LOCK_SECURED_ENABLED";
readonly secureBootMode?:
| "SECURE_BOOT_MODE_UNSPECIFIED"
| "SECURE_BOOT_MODE_UNKNOWN"
| "SECURE_BOOT_MODE_DISABLED"
| "SECURE_BOOT_MODE_ENABLED";
readonly serialNumber?: string;
readonly siteIsolationEnabled?: boolean;
systemDnsServers?: string[];
readonly thirdPartyBlockingEnabled?: boolean;
readonly trigger?: "TRIGGER_UNSPECIFIED" | "TRIGGER_BROWSER_NAVIGATION" | "TRIGGER_LOGIN_SCREEN";
readonly windowsMachineDomain?: string;
readonly windowsUserDomain?: string;
}

§Properties

§
readonly allowScreenLock?: boolean
[src]

Output only. Value of the AllowScreenLock policy on the device. See https://chromeenterprise.google/policies/?policy=AllowScreenLock for more details. Available on ChromeOS only.

§
readonly antivirus?: Antivirus
[src]

Output only. Information about Antivirus software on the device. Available on Windows only.

§
readonly browserVersion?: string
[src]

Output only. Current version of the Chrome browser which generated this set of signals. Example value: "107.0.5286.0".

§
readonly builtInDnsClientEnabled?: boolean
[src]

Output only. Whether Chrome's built-in DNS client is used. The OS DNS client is otherwise used. This value may be controlled by an enterprise policy: https://chromeenterprise.google/policies/#BuiltInDnsClientEnabled.

§
readonly chromeRemoteDesktopAppBlocked?: boolean
[src]

Output only. Whether access to the Chrome Remote Desktop application is blocked via a policy.

§
readonly crowdStrikeAgent?: CrowdStrikeAgent
[src]

Output only. Crowdstrike agent properties installed on the device, if any. Available on Windows and MacOS only.

§
readonly deviceAffiliationIds?: string[]
[src]

Output only. Affiliation IDs of the organizations that are affiliated with the organization that is currently managing the device. When the sets of device and profile affiliation IDs overlap, it means that the organizations managing the device and user are affiliated. To learn more about user affiliation, visit https://support.google.com/chrome/a/answer/12801245?ref_topic=9027936.

§
readonly deviceEnrollmentDomain?: string
[src]

Output only. Enrollment domain of the customer which is currently managing the device.

§
readonly deviceManufacturer?: string
[src]

Output only. The name of the device's manufacturer.

§
readonly deviceModel?: string
[src]

Output only. The name of the device's model.

§
readonly diskEncryption?: "DISK_ENCRYPTION_UNSPECIFIED" | "DISK_ENCRYPTION_UNKNOWN" | "DISK_ENCRYPTION_DISABLED" | "DISK_ENCRYPTION_ENCRYPTED"
[src]

Output only. The encryption state of the disk. On ChromeOS, the main disk is always ENCRYPTED.

§
readonly displayName?: string
[src]

Output only. The display name of the device, as defined by the user.

§
hostname?: string
[src]

Hostname of the device.

§
readonly imei?: string[]
[src]

Output only. International Mobile Equipment Identity (IMEI) of the device. Available on ChromeOS only.

§
readonly macAddresses?: string[]
[src]

Output only. MAC addresses of the device.

§
readonly meid?: string[]
[src]

Output only. Mobile Equipment Identifier (MEID) of the device. Available on ChromeOS only.

§
readonly operatingSystem?: "OPERATING_SYSTEM_UNSPECIFIED" | "CHROME_OS" | "CHROMIUM_OS" | "WINDOWS" | "MAC_OS_X" | "LINUX"
[src]

Output only. The type of the Operating System currently running on the device.

§
readonly osFirewall?: "OS_FIREWALL_UNSPECIFIED" | "OS_FIREWALL_UNKNOWN" | "OS_FIREWALL_DISABLED" | "OS_FIREWALL_ENABLED"
[src]

Output only. The state of the OS level firewall. On ChromeOS, the value will always be ENABLED on regular devices and UNKNOWN on devices in developer mode. Support for MacOS 15 (Sequoia) and later has been introduced in Chrome M131.

§
readonly osVersion?: string
[src]

Output only. The current version of the Operating System. On Windows and linux, the value will also include the security patch information.

§
readonly passwordProtectionWarningTrigger?: "PASSWORD_PROTECTION_WARNING_TRIGGER_UNSPECIFIED" | "POLICY_UNSET" | "PASSWORD_PROTECTION_OFF" | "PASSWORD_REUSE" | "PHISHING_REUSE"
[src]

Output only. Whether the Password Protection Warning feature is enabled or not. Password protection alerts users when they reuse their protected password on potentially suspicious sites. This setting is controlled by an enterprise policy: https://chromeenterprise.google/policies/#PasswordProtectionWarningTrigger. Note that the policy unset does not have the same effects as having the policy explicitly set to PASSWORD_PROTECTION_OFF.

§
readonly profileAffiliationIds?: string[]
[src]

Output only. Affiliation IDs of the organizations that are affiliated with the organization that is currently managing the Chrome Profile’s user or ChromeOS user.

§
readonly profileEnrollmentDomain?: string
[src]

Output only. Enrollment domain of the customer which is currently managing the profile.

§
readonly realtimeUrlCheckMode?: "REALTIME_URL_CHECK_MODE_UNSPECIFIED" | "REALTIME_URL_CHECK_MODE_DISABLED" | "REALTIME_URL_CHECK_MODE_ENABLED_MAIN_FRAME"
[src]

Output only. Whether Enterprise-grade (i.e. custom) unsafe URL scanning is enabled or not. This setting may be controlled by an enterprise policy: https://chromeenterprise.google/policies/#EnterpriseRealTimeUrlCheckMode

§
readonly safeBrowsingProtectionLevel?: "SAFE_BROWSING_PROTECTION_LEVEL_UNSPECIFIED" | "INACTIVE" | "STANDARD" | "ENHANCED"
[src]

Output only. Safe Browsing Protection Level. That setting may be controlled by an enterprise policy: https://chromeenterprise.google/policies/#SafeBrowsingProtectionLevel.

§
readonly screenLockSecured?: "SCREEN_LOCK_SECURED_UNSPECIFIED" | "SCREEN_LOCK_SECURED_UNKNOWN" | "SCREEN_LOCK_SECURED_DISABLED" | "SCREEN_LOCK_SECURED_ENABLED"
[src]

Output only. The state of the Screen Lock password protection. On ChromeOS, this value will always be ENABLED as there is not way to disable requiring a password or pin when unlocking the device.

§
readonly secureBootMode?: "SECURE_BOOT_MODE_UNSPECIFIED" | "SECURE_BOOT_MODE_UNKNOWN" | "SECURE_BOOT_MODE_DISABLED" | "SECURE_BOOT_MODE_ENABLED"
[src]

Output only. Whether the device's startup software has its Secure Boot feature enabled. Available on Windows only.

§
readonly serialNumber?: string
[src]

Output only. The serial number of the device. On Windows, this represents the BIOS's serial number. Not available on most Linux distributions.

§
readonly siteIsolationEnabled?: boolean
[src]

Output only. Whether the Site Isolation (a.k.a Site Per Process) setting is enabled. That setting may be controlled by an enterprise policy: https://chromeenterprise.google/policies/#SitePerProcess

§
systemDnsServers?: string[]
[src]

List of the addesses of all OS level DNS servers configured in the device's network settings.

§
readonly thirdPartyBlockingEnabled?: boolean
[src]

Output only. Deprecated. The corresponding policy is now deprecated. Whether Chrome is blocking third-party software injection or not. This setting may be controlled by an enterprise policy: https://chromeenterprise.google/policies/?policy=ThirdPartyBlockingEnabled. Available on Windows only.

§
readonly trigger?: "TRIGGER_UNSPECIFIED" | "TRIGGER_BROWSER_NAVIGATION" | "TRIGGER_LOGIN_SCREEN"
[src]

Output only. The trigger which generated this set of signals.

§
readonly windowsMachineDomain?: string
[src]

Output only. Windows domain that the current machine has joined. Available on Windows only.

§
readonly windowsUserDomain?: string
[src]

Output only. Windows domain for the current OS user. Available on Windows only.