1 <?xml version=
"1.0" encoding=
"UTF-8"?>
2 <!DOCTYPE plist PUBLIC
"-//Apple Computer//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
6 <string>The name of the requested right is matched against the keys. An exact match has priority, otherwise the longest match from the start is used. Note that the right will only match wildcard rules (ending in a ".") during this reduction.
8 allow rule: this is always allowed
9 <key
>com.apple.TestApp.benign
</key
>
10 <string
>allow
</string
>
12 deny rule: this is always denied
13 <key
>com.apple.TestApp.dangerous
</key
>
14 <string
>deny
</string
>
16 user rule: successful authentication as a user in the specified group(
5) allows the associated right.
18 The shared property specifies whether a credential generated on success is shared with other apps (i.e., those in the same "session"). This property defaults to false if not specified.
20 The timeout property specifies the maximum age of a (cached/shared) credential accepted for this rule.
22 The allow-root property specifies whether a right should be allowed automatically if the requesting process is running with uid ==
0. This defaults to false if not specified.
24 See remaining rules for examples.
33 <string>Matches otherwise unmatched rights (i.e., is a default).
</string>
35 <string>default
</string>
37 <key>config.add.
</key>
40 <string>allow
</string>
42 <string>Wildcard right for adding rights. Anyone is allowed to add any (non-wildcard) rights.
</string>
44 <key>config.config.
</key>
49 <string>Wildcard right for any change to meta-rights for db modification. Not allowed programmatically (just edit this file).
</string>
51 <key>config.modify.
</key>
56 <string>Wildcard right for modifying rights. Admins are allowed to modify any (non-wildcard) rights. Root does not require authentication.
</string>
61 <string>is-root
</string>
62 <string>authenticate-admin
</string>
65 <key>config.remove.
</key>
70 <string>Wildcard right for deleting rights. Admins are allowed to delete any (non-wildcard) rights. Root does not require authentication.
</string>
75 <string>is-root
</string>
76 <string>authenticate-admin
</string>
79 <key>config.remove.system.
</key>
84 <string>Wildcard right for deleting system rights.
</string>
89 <string>default
</string>
94 <string>default
</string>
96 <key>sys.openfile.
</key>
101 <string>See authopen(
1) for information on the use of this right.
</string>
103 <string>admin
</string>
107 <integer>300</integer>
109 <key>system.device.dvd.setregion.initial
</key>
112 <string>user
</string>
114 <string>Used by the DVD player to set the region code the first time. Note that changing the region code after it has been set requires a different right (system.device.dvd.setregion.change).
</string>
116 <string>admin
</string>
120 <key>system.login.console
</key>
123 <string>evaluate-mechanisms
</string>
125 <string>Login mechanism based rule. Not for general use, yet.
</string>
126 <key>mechanisms
</key>
128 <string>builtin:smartcard-sniffer,privileged
</string>
129 <string>loginwindow:login
</string>
130 <string>builtin:reset-password,privileged
</string>
131 <string>builtin:auto-login,privileged
</string>
132 <string>builtin:authenticate,privileged
</string>
133 <string>HomeDirMechanism:login,privileged
</string>
134 <string>HomeDirMechanism:status
</string>
135 <string>MCXMechanism:login
</string>
136 <string>loginwindow:success
</string>
137 <string>loginwindow:done
</string>
140 <key>system.login.done
</key>
143 <string>evaluate-mechanisms
</string>
144 <key>mechanisms
</key>
148 <key>system.login.screensaver
</key>
151 <string>rule
</string>
153 <string>The owner or any administrator can unlock the screensaver.
</string>
155 <string>authenticate-session-owner-or-admin
</string>
157 <key>system.login.tty
</key>
160 <string>evaluate-mechanisms
</string>
163 <key>mechanisms
</key>
165 <string>push_hints_to_context
</string>
166 <string>authinternal
</string>
169 <key>system.keychain.create.loginkc
</key>
171 <key>allow-root
</key>
174 <string>evaluate-mechanisms
</string>
176 <string>Used by the Security framework when you add an item to an unconfigured default keychain.
</string>
177 <key>mechanisms
</key>
179 <string>loginKC:queryCreate
</string>
180 <string>loginKC:showPasswordUI
</string>
181 <string>authinternal
</string>
183 <key>session-owner
</key>
188 <key>system.keychain.modify
</key>
191 <string>user
</string>
193 <string>Used by Keychain Access when editing a system keychain.
</string>
195 <string>admin
</string>
199 <integer>300</integer>
201 <key>system.preferences
</key>
203 <key>allow-root
</key>
206 <string>user
</string>
208 <string>Checked by the Admin framework when making changes to certain System Preferences.
</string>
210 <string>admin
</string>
214 <key>system.preferences.accounts
</key>
216 <key>allow-root
</key>
219 <string>user
</string>
221 <string>Checked by the Admin framework when making changes to the Accounts preference pane.
</string>
223 <string>admin
</string>
227 <key>system.preferences.parental-controls
</key>
230 <string>user
</string>
232 <string>Checked when making changes to the Parental Controls preference pane.
</string>
234 <string>admin
</string>
238 <key>system.preferences.accessibility
</key>
240 <key>allow-root
</key>
243 <string>user
</string>
245 <string>Checked by the Admin framework when enabling or disabling the Accessibility APIs.
</string>
247 <string>admin
</string>
253 <key>system.printingmanager
</key>
256 <string>rule
</string>
258 <string>For printing to locked printers.
</string>
260 <string>authenticate-admin
</string>
262 <key>system.print.admin
</key>
265 <string>rule
</string>
270 <string>is-lpadmin
</string>
271 <string>is-admin
</string>
272 <string>default
</string>
275 <key>system.identity.write.
</key>
278 <string>rule
</string>
280 <string>For creating, changing or deleting local user accounts and groups.
</string>
285 <string>is-admin
</string>
286 <string>authenticate-admin
</string>
289 <key>system.identity.write.credential
</key>
292 <string>rule
</string>
294 <string>Checked when changing authentication credentials (password or certificate) for a local user account.
</string>
296 <string>default
</string>
298 <key>system.identity.write.self
</key>
301 <string>user
</string>
303 <string>Checked when changing authentication credentials (password or certificate) for the current user's account.
</string>
304 <key>authenticate-user
</key>
306 <key>session-owner
</key>
309 <key>system.global-login-items.
</key>
312 <string>rule
</string>
317 <string>is-admin
</string>
318 <string>default
</string>
321 <key>system.sharepoints.
</key>
323 <key>allow-root
</key>
326 <string>user
</string>
328 <string>Checked when making changes to the Sharepoints.
</string>
330 <string>admin
</string>
334 <key>com.apple.activitymonitor.kill
</key>
337 <string>user
</string>
339 <string>Used by Activity Monitor to authorize killing processes not owned by the user.
</string>
341 <string>admin
</string>
347 <key>com.apple.Safari.parental-controls
</key>
349 <key>allow-root
</key>
352 <string>user
</string>
354 <string>Checked when changing parental controls for Safari.
</string>
356 <string>admin
</string>
362 <key>com.apple.docset.install
</key>
365 <string>user
</string>
367 <string>Used by Xcode to restrict access to a daemon it uses to install and update documentation sets.
</string>
369 <string>admin
</string>
373 <key>system.privilege.admin
</key>
375 <key>allow-root
</key>
378 <string>user
</string>
380 <string>Used by AuthorizationExecuteWithPrivileges(...).
381 AuthorizationExecuteWithPrivileges() is used by programs requesting
382 to run a tool as root (e.g., some installers).
</string>
384 <string>admin
</string>
388 <integer>300</integer>
390 <key>system.privilege.taskport
</key>
392 <key>allow-root
</key>
395 <string>user
</string>
397 <string>Used by task_for_pid(...).
398 Task_for_pid is called by programs requesting full control over another program
399 for things like debugging or performance analysis. This authorization only applies
400 if the requesting and target programs are run by the same user; it will never
401 authorize access to the program of another user.
</string>
403 <string>admin
</string>
407 <key>system.restart
</key>
410 <string>evaluate-mechanisms
</string>
412 <string>Checked if the foreground console user tries to restart the system while other users are logged in via fast-user switching.
</string>
413 <key>mechanisms
</key>
415 <string>RestartAuthorization:restart
</string>
416 <string>RestartAuthorization:authenticate
</string>
417 <string>RestartAuthorization:success
</string>
420 <key>system.shutdown
</key>
423 <string>evaluate-mechanisms
</string>
425 <string>Checked if the foreground console user tries to shut down the system while other users are logged in via fast-user switching.
</string>
426 <key>mechanisms
</key>
428 <string>RestartAuthorization:shutdown
</string>
429 <string>RestartAuthorization:authenticate
</string>
430 <string>RestartAuthorization:success
</string>
433 <key>system.burn
</key>
436 <string>allow
</string>
438 <string>For burning media.
</string>
440 <key>system.services.directory.configure
</key>
443 <string>user
</string>
445 <string>admin
</string>
446 <key>allow-root
</key>
451 <integer>300</integer>
453 <string>For making Directory Services changes.
</string>
455 <key>com.apple.server.admin.streaming
</key>
458 <string>user
</string>
460 <string>For making administrative requests to the QuickTime Streaming Server.
</string>
462 <string>admin
</string>
465 <key>allow-root
</key>
470 <key>com.apple.trust-settings.admin
</key>
473 <string>For modifying Trust Settings in the Local Admin domain.
</string>
474 <key>allow-root
</key>
477 <string>user
</string>
479 <string>admin
</string>
481 <key>com.apple.trust-settings.user
</key>
484 <string>authenticate-session-owner
</string>
486 <string>For modifying per-user Trust Settings.
</string>
488 <key>system.install.admin.user
</key>
491 <string>user
</string>
493 <string>Checked when user is installing in admin domain (/Applications).
</string>
495 <string>admin
</string>
499 <integer>300</integer>
501 <key>system.install.root.user
</key>
504 <string>user
</string>
506 <string>Checked when user is installing in root domain (/System).
</string>
508 <string>admin
</string>
512 <integer>300</integer>
514 <key>system.install.root.admin
</key>
517 <string>user
</string>
519 <string>Checked when admin is installing in root domain (/System).
</string>
521 <string>admin
</string>
525 <integer>300</integer>
527 <key>com.apple.appserver.privilege.admin
</key>
530 <string>rule
</string>
532 <string>For administrative access to the Application Server management tool.
</string>
534 <string>appserver-admin
</string>
536 <key>com.apple.appserver.privilege.user
</key>
539 <string>rule
</string>
541 <string>For user access to the Application Server management tool.
</string>
546 <string>appserver-admin
</string>
547 <string>appserver-user
</string>
550 <key>com.apple.dashboard.advisory.allow
</key>
553 <string>user
</string>
555 <string>admin
</string>
559 <integer>300</integer>
561 <key>com.apple.desktopservices
</key>
564 <string>user
</string>
566 <string>For privileged file operations from within the Finder.
</string>
568 <string>admin
</string>
574 <key>com.apple.builtin.generic-new-passphrase
</key>
577 <string>evaluate-mechanisms
</string>
578 <key>mechanisms
</key>
580 <string>builtin:generic-new-passphrase
</string>
583 <key>com.apple.builtin.generic-unlock
</key>
586 <string>evaluate-mechanisms
</string>
587 <key>mechanisms
</key>
589 <string>builtin:generic-unlock
</string>
592 <key>com.apple.builtin.confirm-access
</key>
595 <string>evaluate-mechanisms
</string>
598 <key>mechanisms
</key>
600 <string>builtin:confirm-access
</string>
603 <key>com.apple.builtin.confirm-access-password
</key>
606 <string>evaluate-mechanisms
</string>
607 <key>mechanisms
</key>
609 <string>builtin:confirm-access-password
</string>
618 <string>allow
</string>
620 <string>Allow anyone.
</string>
622 <key>authenticate-admin
</key>
625 <string>user
</string>
627 <string>Authenticate as an administrator.
</string>
629 <string>admin
</string>
635 <key>authenticate-session-owner
</key>
638 <string>user
</string>
640 <string>Authenticate as the session owner.
</string>
641 <key>session-owner
</key>
644 <key>authenticate-session-owner-or-admin
</key>
646 <key>allow-root
</key>
649 <string>user
</string>
651 <string>Authenticate either as the owner or as an administrator.
</string>
653 <string>admin
</string>
654 <key>session-owner
</key>
662 <string>user
</string>
664 <string>Verify that the user asking for authorization is an administrator.
</string>
666 <string>admin
</string>
667 <key>authenticate-user
</key>
670 <string>true
</string>
672 <key>is-lpadmin
</key>
675 <string>user
</string>
677 <string>Verify that the user asking for authorization is an lp administrator.
</string>
679 <string>lpadmin
</string>
680 <key>authenticate-user
</key>
685 <key>allow-root
</key>
688 <string>user
</string>
689 <key>authenticate-user
</key>
692 <string>Verify that the process that created this AuthorizationRef is running as root.
</string>
694 <key>appserver-user
</key>
697 <string>user
</string>
699 <string>appserverusr
</string>
701 <key>appserver-admin
</key>
704 <string>user
</string>
706 <string>appserveradm
</string>
711 <string>user
</string>
713 <string>Default rule.
714 Credentials remain valid for
5 minutes after they've been obtained.
715 An acquired credential is shared by all clients.
718 <string>admin
</string>
722 <integer>300</integer>
724 <key>authenticate
</key>
727 <string>evaluate-mechanisms
</string>
728 <key>mechanisms
</key>
730 <string>builtin:smartcard-sniffer,privileged
</string>
731 <string>builtin:authenticate
</string>
732 <string>builtin:authenticate,privileged
</string>