JFIF x x C C " } !1AQa "q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w !1AQ aq"2B #3Rbr{
File "AdvancedSecurityOverrides.php"
Full Path: /home/palsarh/web/palsarh.in/public_html/vendor/google/apiclient-services/src/AndroidManagement/AdvancedSecurityOverrides.php
File size: 13.85 KB
MIME-type: text/x-php
Charset: utf-8
<?php
/*
* Copyright 2014 Google Inc.
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not
* use this file except in compliance with the License. You may obtain a copy of
* the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
* License for the specific language governing permissions and limitations under
* the License.
*/
namespace Google\Service\AndroidManagement;
class AdvancedSecurityOverrides extends \Google\Collection
{
/**
* Unspecified. Defaults to COMMON_CRITERIA_MODE_DISABLED.
*/
public const COMMON_CRITERIA_MODE_COMMON_CRITERIA_MODE_UNSPECIFIED = 'COMMON_CRITERIA_MODE_UNSPECIFIED';
/**
* Default. Disables Common Criteria Mode.
*/
public const COMMON_CRITERIA_MODE_COMMON_CRITERIA_MODE_DISABLED = 'COMMON_CRITERIA_MODE_DISABLED';
/**
* Enables Common Criteria Mode.
*/
public const COMMON_CRITERIA_MODE_COMMON_CRITERIA_MODE_ENABLED = 'COMMON_CRITERIA_MODE_ENABLED';
/**
* Unspecified. Defaults to CONTENT_PROTECTION_DISABLED.
*/
public const CONTENT_PROTECTION_POLICY_CONTENT_PROTECTION_POLICY_UNSPECIFIED = 'CONTENT_PROTECTION_POLICY_UNSPECIFIED';
/**
* Content protection is disabled and the user cannot change this.
*/
public const CONTENT_PROTECTION_POLICY_CONTENT_PROTECTION_DISABLED = 'CONTENT_PROTECTION_DISABLED';
/**
* Content protection is enabled and the user cannot change this.Supported on
* Android 15 and above. A NonComplianceDetail with API_LEVEL is reported if
* the Android version is less than 15.
*/
public const CONTENT_PROTECTION_POLICY_CONTENT_PROTECTION_ENFORCED = 'CONTENT_PROTECTION_ENFORCED';
/**
* Content protection is not controlled by the policy. The user is allowed to
* choose the behavior of content protection.Supported on Android 15 and
* above. A NonComplianceDetail with API_LEVEL is reported if the Android
* version is less than 15.
*/
public const CONTENT_PROTECTION_POLICY_CONTENT_PROTECTION_USER_CHOICE = 'CONTENT_PROTECTION_USER_CHOICE';
/**
* Unspecified. Defaults to DEVELOPER_SETTINGS_DISABLED.
*/
public const DEVELOPER_SETTINGS_DEVELOPER_SETTINGS_UNSPECIFIED = 'DEVELOPER_SETTINGS_UNSPECIFIED';
/**
* Default. Disables all developer settings and prevents the user from
* accessing them.
*/
public const DEVELOPER_SETTINGS_DEVELOPER_SETTINGS_DISABLED = 'DEVELOPER_SETTINGS_DISABLED';
/**
* Allows all developer settings. The user can access and optionally configure
* the settings.
*/
public const DEVELOPER_SETTINGS_DEVELOPER_SETTINGS_ALLOWED = 'DEVELOPER_SETTINGS_ALLOWED';
/**
* Unspecified. Defaults to VERIFY_APPS_ENFORCED.
*/
public const GOOGLE_PLAY_PROTECT_VERIFY_APPS_GOOGLE_PLAY_PROTECT_VERIFY_APPS_UNSPECIFIED = 'GOOGLE_PLAY_PROTECT_VERIFY_APPS_UNSPECIFIED';
/**
* Default. Force-enables app verification.
*/
public const GOOGLE_PLAY_PROTECT_VERIFY_APPS_VERIFY_APPS_ENFORCED = 'VERIFY_APPS_ENFORCED';
/**
* Allows the user to choose whether to enable app verification.
*/
public const GOOGLE_PLAY_PROTECT_VERIFY_APPS_VERIFY_APPS_USER_CHOICE = 'VERIFY_APPS_USER_CHOICE';
/**
* Unspecified. Defaults to MTE_USER_CHOICE.
*/
public const MTE_POLICY_MTE_POLICY_UNSPECIFIED = 'MTE_POLICY_UNSPECIFIED';
/**
* The user can choose to enable or disable MTE on the device if the device
* supports this.
*/
public const MTE_POLICY_MTE_USER_CHOICE = 'MTE_USER_CHOICE';
/**
* MTE is enabled on the device and the user is not allowed to change this
* setting. This can be set on fully managed devices and work profiles on
* company-owned devices. A NonComplianceDetail with MANAGEMENT_MODE is
* reported for other management modes. A NonComplianceDetail with
* DEVICE_INCOMPATIBLE is reported if the device does not support
* MTE.Supported on Android 14 and above. A NonComplianceDetail with API_LEVEL
* is reported if the Android version is less than 14.
*/
public const MTE_POLICY_MTE_ENFORCED = 'MTE_ENFORCED';
/**
* MTE is disabled on the device and the user is not allowed to change this
* setting. This applies only on fully managed devices. In other cases, a
* NonComplianceDetail with MANAGEMENT_MODE is reported. A NonComplianceDetail
* with DEVICE_INCOMPATIBLE is reported if the device does not support
* MTE.Supported on Android 14 and above. A NonComplianceDetail with API_LEVEL
* is reported if the Android version is less than 14.
*/
public const MTE_POLICY_MTE_DISABLED = 'MTE_DISABLED';
/**
* Unspecified. Defaults to DISALLOW_INSTALL.
*/
public const UNTRUSTED_APPS_POLICY_UNTRUSTED_APPS_POLICY_UNSPECIFIED = 'UNTRUSTED_APPS_POLICY_UNSPECIFIED';
/**
* Default. Disallow untrusted app installs on entire device.
*/
public const UNTRUSTED_APPS_POLICY_DISALLOW_INSTALL = 'DISALLOW_INSTALL';
/**
* For devices with work profiles, allow untrusted app installs in the
* device's personal profile only.
*/
public const UNTRUSTED_APPS_POLICY_ALLOW_INSTALL_IN_PERSONAL_PROFILE_ONLY = 'ALLOW_INSTALL_IN_PERSONAL_PROFILE_ONLY';
/**
* Allow untrusted app installs on entire device.
*/
public const UNTRUSTED_APPS_POLICY_ALLOW_INSTALL_DEVICE_WIDE = 'ALLOW_INSTALL_DEVICE_WIDE';
protected $collection_key = 'personalAppsThatCanReadWorkNotifications';
/**
* Controls Common Criteria Mode—security standards defined in the Common
* Criteria for Information Technology Security Evaluation
* (https://www.commoncriteriaportal.org/) (CC). Enabling Common Criteria Mode
* increases certain security components on a device, see CommonCriteriaMode
* for details.Warning: Common Criteria Mode enforces a strict security model
* typically only required for IT products used in national security systems
* and other highly sensitive organizations. Standard device use may be
* affected. Only enabled if required. If Common Criteria Mode is turned off
* after being enabled previously, all user-configured Wi-Fi networks may be
* lost and any enterprise-configured Wi-Fi networks that require user input
* may need to be reconfigured.
*
* @var string
*/
public $commonCriteriaMode;
/**
* Optional. Controls whether content protection, which scans for deceptive
* apps, is enabled. This is supported on Android 15 and above.
*
* @var string
*/
public $contentProtectionPolicy;
/**
* Controls access to developer settings: developer options and safe boot.
* Replaces safeBootDisabled (deprecated) and debuggingFeaturesAllowed
* (deprecated). On personally-owned devices with a work profile, setting this
* policy will not disable safe boot. In this case, a NonComplianceDetail with
* MANAGEMENT_MODE is reported.
*
* @var string
*/
public $developerSettings;
/**
* Whether Google Play Protect verification
* (https://support.google.com/accounts/answer/2812853) is enforced. Replaces
* ensureVerifyAppsEnabled (deprecated).
*
* @var string
*/
public $googlePlayProtectVerifyApps;
/**
* Optional. Controls Memory Tagging Extension (MTE)
* (https://source.android.com/docs/security/test/memory-safety/arm-mte) on
* the device. The device needs to be rebooted to apply changes to the MTE
* policy. On Android 15 and above, a NonComplianceDetail with PENDING is
* reported if the policy change is pending a device reboot.
*
* @var string
*/
public $mtePolicy;
/**
* Personal apps that can read work profile notifications using a
* NotificationListenerService (https://developer.android.com/reference/androi
* d/service/notification/NotificationListenerService). By default, no
* personal apps (aside from system apps) can read work notifications. Each
* value in the list must be a package name.
*
* @var string[]
*/
public $personalAppsThatCanReadWorkNotifications;
/**
* The policy for untrusted apps (apps from unknown sources) enforced on the
* device. Replaces install_unknown_sources_allowed (deprecated).
*
* @var string
*/
public $untrustedAppsPolicy;
/**
* Controls Common Criteria Mode—security standards defined in the Common
* Criteria for Information Technology Security Evaluation
* (https://www.commoncriteriaportal.org/) (CC). Enabling Common Criteria Mode
* increases certain security components on a device, see CommonCriteriaMode
* for details.Warning: Common Criteria Mode enforces a strict security model
* typically only required for IT products used in national security systems
* and other highly sensitive organizations. Standard device use may be
* affected. Only enabled if required. If Common Criteria Mode is turned off
* after being enabled previously, all user-configured Wi-Fi networks may be
* lost and any enterprise-configured Wi-Fi networks that require user input
* may need to be reconfigured.
*
* Accepted values: COMMON_CRITERIA_MODE_UNSPECIFIED,
* COMMON_CRITERIA_MODE_DISABLED, COMMON_CRITERIA_MODE_ENABLED
*
* @param self::COMMON_CRITERIA_MODE_* $commonCriteriaMode
*/
public function setCommonCriteriaMode($commonCriteriaMode)
{
$this->commonCriteriaMode = $commonCriteriaMode;
}
/**
* @return self::COMMON_CRITERIA_MODE_*
*/
public function getCommonCriteriaMode()
{
return $this->commonCriteriaMode;
}
/**
* Optional. Controls whether content protection, which scans for deceptive
* apps, is enabled. This is supported on Android 15 and above.
*
* Accepted values: CONTENT_PROTECTION_POLICY_UNSPECIFIED,
* CONTENT_PROTECTION_DISABLED, CONTENT_PROTECTION_ENFORCED,
* CONTENT_PROTECTION_USER_CHOICE
*
* @param self::CONTENT_PROTECTION_POLICY_* $contentProtectionPolicy
*/
public function setContentProtectionPolicy($contentProtectionPolicy)
{
$this->contentProtectionPolicy = $contentProtectionPolicy;
}
/**
* @return self::CONTENT_PROTECTION_POLICY_*
*/
public function getContentProtectionPolicy()
{
return $this->contentProtectionPolicy;
}
/**
* Controls access to developer settings: developer options and safe boot.
* Replaces safeBootDisabled (deprecated) and debuggingFeaturesAllowed
* (deprecated). On personally-owned devices with a work profile, setting this
* policy will not disable safe boot. In this case, a NonComplianceDetail with
* MANAGEMENT_MODE is reported.
*
* Accepted values: DEVELOPER_SETTINGS_UNSPECIFIED,
* DEVELOPER_SETTINGS_DISABLED, DEVELOPER_SETTINGS_ALLOWED
*
* @param self::DEVELOPER_SETTINGS_* $developerSettings
*/
public function setDeveloperSettings($developerSettings)
{
$this->developerSettings = $developerSettings;
}
/**
* @return self::DEVELOPER_SETTINGS_*
*/
public function getDeveloperSettings()
{
return $this->developerSettings;
}
/**
* Whether Google Play Protect verification
* (https://support.google.com/accounts/answer/2812853) is enforced. Replaces
* ensureVerifyAppsEnabled (deprecated).
*
* Accepted values: GOOGLE_PLAY_PROTECT_VERIFY_APPS_UNSPECIFIED,
* VERIFY_APPS_ENFORCED, VERIFY_APPS_USER_CHOICE
*
* @param self::GOOGLE_PLAY_PROTECT_VERIFY_APPS_* $googlePlayProtectVerifyApps
*/
public function setGooglePlayProtectVerifyApps($googlePlayProtectVerifyApps)
{
$this->googlePlayProtectVerifyApps = $googlePlayProtectVerifyApps;
}
/**
* @return self::GOOGLE_PLAY_PROTECT_VERIFY_APPS_*
*/
public function getGooglePlayProtectVerifyApps()
{
return $this->googlePlayProtectVerifyApps;
}
/**
* Optional. Controls Memory Tagging Extension (MTE)
* (https://source.android.com/docs/security/test/memory-safety/arm-mte) on
* the device. The device needs to be rebooted to apply changes to the MTE
* policy. On Android 15 and above, a NonComplianceDetail with PENDING is
* reported if the policy change is pending a device reboot.
*
* Accepted values: MTE_POLICY_UNSPECIFIED, MTE_USER_CHOICE, MTE_ENFORCED,
* MTE_DISABLED
*
* @param self::MTE_POLICY_* $mtePolicy
*/
public function setMtePolicy($mtePolicy)
{
$this->mtePolicy = $mtePolicy;
}
/**
* @return self::MTE_POLICY_*
*/
public function getMtePolicy()
{
return $this->mtePolicy;
}
/**
* Personal apps that can read work profile notifications using a
* NotificationListenerService (https://developer.android.com/reference/androi
* d/service/notification/NotificationListenerService). By default, no
* personal apps (aside from system apps) can read work notifications. Each
* value in the list must be a package name.
*
* @param string[] $personalAppsThatCanReadWorkNotifications
*/
public function setPersonalAppsThatCanReadWorkNotifications($personalAppsThatCanReadWorkNotifications)
{
$this->personalAppsThatCanReadWorkNotifications = $personalAppsThatCanReadWorkNotifications;
}
/**
* @return string[]
*/
public function getPersonalAppsThatCanReadWorkNotifications()
{
return $this->personalAppsThatCanReadWorkNotifications;
}
/**
* The policy for untrusted apps (apps from unknown sources) enforced on the
* device. Replaces install_unknown_sources_allowed (deprecated).
*
* Accepted values: UNTRUSTED_APPS_POLICY_UNSPECIFIED, DISALLOW_INSTALL,
* ALLOW_INSTALL_IN_PERSONAL_PROFILE_ONLY, ALLOW_INSTALL_DEVICE_WIDE
*
* @param self::UNTRUSTED_APPS_POLICY_* $untrustedAppsPolicy
*/
public function setUntrustedAppsPolicy($untrustedAppsPolicy)
{
$this->untrustedAppsPolicy = $untrustedAppsPolicy;
}
/**
* @return self::UNTRUSTED_APPS_POLICY_*
*/
public function getUntrustedAppsPolicy()
{
return $this->untrustedAppsPolicy;
}
}
// Adding a class alias for backwards compatibility with the previous class name.
class_alias(AdvancedSecurityOverrides::class, 'Google_Service_AndroidManagement_AdvancedSecurityOverrides');