Index: chrome/browser/chromeos/policy/proto/chrome_device_policy.proto |
diff --git a/chrome/browser/chromeos/policy/proto/chrome_device_policy.proto b/chrome/browser/chromeos/policy/proto/chrome_device_policy.proto |
index b29121c67e6d2047801d43ad04b78151f279be77..4cd56b10b0b8d2df22dde041c5a8bf07373a20cf 100644 |
--- a/chrome/browser/chromeos/policy/proto/chrome_device_policy.proto |
+++ b/chrome/browser/chromeos/policy/proto/chrome_device_policy.proto |
@@ -273,6 +273,17 @@ message UptimeLimitProto { |
optional int64 uptime_limit = 1; |
} |
+message AttestationSettingsProto { |
+ // Attestation involves proving that a cryptographic key is protected by a |
+ // legitimate Chrome OS TPM and reporting the operating mode of the platform. |
+ // This setting enables attestation features at a device level. If this is |
+ // enabled a machine key will be generated and certified by the Chrome OS |
+ // CA. If this setting is disabled, the device will not communicate with the |
+ // Chrome OS CA under any circumstances. Even users with attestation settings |
+ // enabled will not be able to use those features on the device. |
+ optional bool attestation_enabled = 1; |
+} |
+ |
message ChromeDeviceSettingsProto { |
optional DevicePolicyRefreshRateProto device_policy_refresh_rate = 1; |
optional UserWhitelistProto user_whitelist = 2; |
@@ -298,4 +309,5 @@ message ChromeDeviceSettingsProto { |
optional AllowRedeemChromeOsRegistrationOffersProto allow_redeem_offers = 22; |
optional StartUpFlagsProto start_up_flags = 23; |
optional UptimeLimitProto uptime_limit = 24; |
+ optional AttestationSettingsProto attestation_settings = 25; |
} |