Configure with the Policy Kit GUI Tool
True Linux geeks work from the command line. But more Microsoft administrators are converting to Linux. For this audience, many, and perhaps most, readers learn more about tools based on newer concepts from the GUI.
To start the GUI PolicyKit configuration tool, run the following command:
$ sudo polkit-gnome-authorization
It opens the Authorizations tool, shown in Figure 10-9.
Monitor local virtuaiized syst Manage local virtuaiized sys v ^ gnome
^ mechanism
Change system time zon ^^ Change syctcm time Configure hardware clock ^ [^j freedesktop v sysL er t it oo Is backer ids
Manage system configuratic ^ rt self
Change user configuratio v policy kit
<^ Revoke authorizations from Read authorizations of other Modify defaults for implicit > Grant authorizations to othi hai
Action identifier: org ,f re e d e skto p. po licykit. re vo ke Description: Revoke authorizations from other users Vëndor; The PolicyKit Project implicit Authorizations
Implicit authorizations are authorizations automatically given to users based on certain criteria such as if they are on the local console. Anyone; No
Console: No
Active Console; Adrniri Authentication (keep indefinitely)
KaVert jo Defaults,.
Explicit Authorizations
This list displays authorizations that are either obtained through authentication or specifically given to the entity in question. Clocked authorizations are marked with a STOP sign.
Erilily Scope Obtained How Constraints
Qulock..
Revoke g) Show authorizations from all users
Figure 10-9. The PolicyKit Authorizations tool
Those of you familiar with the latest Fedora Linux releases may already know the capabilities of this tool. If you just want to look around the tool, open it without the administrative sudo. Unless your account is administratively enabled to modify PolicyKit settings, changes cannot be written. A number of these options are rather fine-grained and can be used to manage hardware in extensive detail. In many cases, the control goes beyond the capabilities of the hardware available to me; such settings are not tested.
NOTE The descriptions in this section include PolicyKit identifiers, whose names might be wrapped in the text due to their lengths. In this chapter, hyphens that appear in identifiers are required and part of the identifier names.
Post a comment