arc_support: This policy controls who may start a <ph name="PRODUCT_OS_NAME">$2<ex>ChromiumOS</ex></ph>
session. It does not prevent users from signing in to additional Google accounts
within Android. If you want to prevent this, configure the Android-specific <ph
name="ACCOUNT_TYPES_WITH_MANAGEMENT_DISABLED_CLOUDDPC_POLICY_NAME">accountTypesWithManagementDisabled</ph>
policy as part of <ph name="ARC_POLICY_POLICY_NAME">ArcPolicy</ph>.
caption: Login user white list
deprecated: true
desc: "Defines the list of users that are allowed to login to the device. Entries\
\ are of the form <ph name=\"USER_ALLOWLIST_ENTRY_FORMAT\">user@domain</ph>, such\
\ as <ph name=\"USER_ALLOWLIST_ENTRY_EXAMPLE\">[email protected]</ph>. To\
\ allow arbitrary users on a domain, use entries of the form <ph name=\"USER_ALLOWLIST_ENTRY_WILDCARD\"\
>*@domain</ph>.\n\n If this policy is not configured, there are no restrictions\
\ on which users are allowed to sign in. Note that creating new users still requires\
\ the <ph name=\"DEVICE_ALLOW_NEW_USERS_POLICY_NAME\">DeviceAllowNewUsers</ph> policy\
\ to be configured appropriately.\n\n This policy is deprecated, please use\
\ <ph name=\"DEVICE_USER_ALLOWLIST_POLICY_NAME\">DeviceUserAllowlist</ph> instead.\n\
\ "
device_only: true
example_value:
- [email protected]
features:
dynamic_refresh: true
owners:
- file://components/policy/OWNERS
- [email protected]
schema:
items:
type: string
sensitiveValue: true
type: array
supported_on:
- chrome_os:12-100
tags: []
type: list
generate_device_proto: False