Skip to content

Commit

Permalink
Moved images to their own directory
Browse files Browse the repository at this point in the history
  • Loading branch information
jibel committed Sep 21, 2023
1 parent 8e68d6c commit bdc061e
Show file tree
Hide file tree
Showing 50 changed files with 39 additions and 39 deletions.
6 changes: 3 additions & 3 deletions docs/explanation/apparmor.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ AppArmor profiles must be available in the assets sharing directory on your Acti

In this directory, next to `Policies` in your domain folder, create a directory matching your distribution name. For instance `Ubuntu`, which will be the assets sharing directory.

![Assets folder in sysvol](../images/assets-folder.png)
![Assets folder in sysvol](../images/explanation/apparmor/assets-folder.png)

It must also contain a `GPT.ini` file of the form:

Expand Down Expand Up @@ -53,7 +53,7 @@ We highly recommend developing AppArmor profiles separately from ADSys, testing

The form is a list of AppArmor profile paths, relative to the `apparmor/` subdirectory of your assets sharing file system, one per line.

![List of machine profiles example](../images/apparmor-machine-ui.png)
![List of machine profiles example](../images/explanation/apparmor/apparmor-machine-ui.png)

When set to enabled, adsys will load the configured AppArmor profiles on refresh. AppArmor's caching functionality is leveraged to ensure redundant reloads are kept to a minimum, i.e. a loaded profile will be parsed again only if a change occurred in the profile definition.

Expand All @@ -67,7 +67,7 @@ AppArmor supports confining executables on a user-by-user basis via the [`pam_ap

The form accepts a path to a single file, relative to the `apparmor/` directory of your assets sharing file system.

![User profile entry example](../images/apparmor-user-ui.png)
![User profile entry example](../images/explanation/apparmor/apparmor-user-ui.png)

### Installing the AppArmor PAM module

Expand Down
6 changes: 3 additions & 3 deletions docs/explanation/certificates.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ Unlike the other ADSys policy managers which are configured in the special Ubunt

* Computer Configuration > Policies > Windows Settings > Security Settings > Public Key Policies > Certificate Services Client - Auto-Enrollment

![Certificate GPO tree view](../images/certificate-settings.png)
![Certificate GPO tree view](../images/explanation/certificates/certificate-settings.png)

## Feature availability

Expand Down Expand Up @@ -38,7 +38,7 @@ Auto-enrollment configuration will override any settings referenced higher in th

Certificate auto-enrollment is configured by setting the **Configuration Model** to **Enabled** and ticking the following checkbox: **Update certificates that use certificate templates**.

![Certificate GPO properties](../images/certificate-gpo.png)
![Certificate GPO properties](../images/explanation/certificates/certificate-gpo.png)

The policy can be disabled by performing _any_ of the following:

Expand All @@ -51,7 +51,7 @@ For more advanced configuration, a list of policy servers can be specified in th

* Computer Configuration > Policies > Windows Settings > Security Settings > Public Key Policies > Certificate Services Client - Certificate Enrollment Policy

![Certificate advanced configuration](../images/advanced-configuration.png)
![Certificate advanced configuration](../images/explanation/certificates/advanced-configuration.png)

## Applying the policy

Expand Down
6 changes: 3 additions & 3 deletions docs/explanation/dconf.md
Original file line number Diff line number Diff line change
Expand Up @@ -28,16 +28,16 @@ Depending on the type of settings, appropriate widgets are displayed to the AD s
Setting a key to `enabled` will apply a value to any machines or user targeted by the GPO.
It allows the Active Directory administrator to enter a value that will be applied to the target object (user or machine). This setting will be enforced on the client. Only an administrator of the client system can override it, but it will be reset to the Active Directory setting on next refresh.

![Enabled setting](../images/enabled.png)
![Enabled setting](../images/explanation/dconf/enabled.png)

#### Disabled

Setting a key to `disabled` will prevent user updates. However, no value can be explicitly entered by the Active Directory administrator. The default value of the client system will then be used (which may differ between machines).

![Disabled setting](../images/disabled.png)
![Disabled setting](../images/explanation/dconf/disabled.png)

#### Not configured

Finally, `not configured` is the default state. The setting is managed as usual directly on the client and without Active Directory.

![Not configure setting](../images/not_configured.png)
![Not configure setting](../images/explanation/dconf/not_configured.png)
8 changes: 4 additions & 4 deletions docs/explanation/network-shares.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ Access control and file permissions should be configured on the shared location.

User mount policies are located under `Computer Configuration > Policies > Administrative Templates > Ubuntu > Client management > System Drive Mapping`, as shown in the following picture.

![Path to User Drive Mapping policy](../images/system-mounts-policy-loc.png)
![Path to User Drive Mapping policy](../images/explanation/network-shares/system-mounts-policy-loc.png)

### Setting up the policy

Expand All @@ -30,7 +30,7 @@ Additional mount options are not supported yet.

All entries must be separated by a line break.

![List of user mounts example](../images/system-mounts-list.png)
![List of user mounts example](../images/explanation/network-shares/system-mounts-list.png)

### Rules precedence

Expand All @@ -54,15 +54,15 @@ Credentials authentication for mounts are disabled on ADSys. Instead, authentica

User mount policies are located under `User Configuration > Policies > Administrative Templates > Ubuntu > Session management > User Drive Mapping`, as shown in the following picture.

![Path to User Drive Mapping policy](../images/user-mounts-policy-loc.png)
![Path to User Drive Mapping policy](../images/explanation/network-shares/user-mounts-policy-loc.png)

### Setting up the policy

The format is a list of shared drives that should be mounted for the user. They must follow the structure {protocol}://{host name or ip address}/{shared location}. If the drive is to be mounted anonymously, the tag [anonymous] should be added as a prefix to the listed entry, i.e. [anonymous]{protocol}://{host name or ip address}/{shared location}.

All entries must be separated by a line break.

![List of user mounts example](../images/user-mounts-list.png)
![List of user mounts example](../images/explanation/network-shares/user-mounts-list.png)

The mount process is handled with GVfs and it defines in which directory the shared drive will be mounted into. Usually, it's mounted under `/run/user/%U/gvfs/`.

Expand Down
2 changes: 1 addition & 1 deletion docs/explanation/privileges.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ The Admin privilege manager allows to grant or revoke superuser privileges for t

All those settings are globally enforced on the machine and are available at `Computer Configuration > Policies > Administrative Templates > Ubuntu > Client management > Privilege Authorization`.

![Privileges screen in AD](../images/privileges-options.png)
![Privileges screen in AD](../images/explanation/privileges/privileges-options.png)

## Feature availability

Expand Down
4 changes: 2 additions & 2 deletions docs/explanation/proxy.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ Proxy settings are configurable under the following GPO path:

* System-wide level, located in `Computer Configuration > Policies > Administrative Templates > Ubuntu > Client management > System proxy configuration`

![System proxy settings in GPO editor](../images/system-proxy-settings-list.png)
![System proxy settings in GPO editor](../images/explanation/proxy/system-proxy-settings-list.png)

## Feature availability

Expand All @@ -33,7 +33,7 @@ The `System proxy configuration` category provides a list of configurable proxy
* Ignored hosts
* Auto configuration URL

![HTTP proxy setting in GPO editor](../images/system-proxy-settings-focus.png)
![HTTP proxy setting in GPO editor](../images/explanation/proxy/system-proxy-settings-focus.png)

Configured settings will then be forwarded to `ubuntu-proxy-manager` which will apply them on all supported backends (e.g. environment variables, APT, GSettings). For an up-to-date list of supported backends, proxy formats and behaviors, refer to the ubuntu-proxy-manager [documentation](https://github.com/ubuntu/ubuntu-proxy-manager/blob/main/README.md).

Expand Down
6 changes: 3 additions & 3 deletions docs/explanation/scripts.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ Those scripts, can be triggered on:

Scripts can be shell scripts, or any binary that can be executed on Linux.

![Scripts options in AD](../images/gpo-scripts.png)
![Scripts options in AD](../images/explanation/scripts/gpo-scripts.png)

## Feature availability

Expand All @@ -25,7 +25,7 @@ Scripts must be available in the assets sharing directory on your Active Directo

In this directory, next to `Policies` in your domain folder, create a directory matching your distribution name. For instance `Ubuntu`, which will be the assets sharing directory.

![Assets folder in sysvol](../images/assets-folder.png)
![Assets folder in sysvol](../images/explanation/scripts/assets-folder.png)

It must also contain a `GPT.ini` file of the form:

Expand All @@ -49,7 +49,7 @@ Making manual changes to a file every time scripts are changed can be unproducti

The form is a list of scripts path, relative to the `scripts/` subdirectory of your assets sharing file system, one per line.

![List of scripts example](../images/scripts-list.png)
![List of scripts example](../images/explanation/scripts/scripts-list.png)

### Not configured or Disabled

Expand Down
4 changes: 2 additions & 2 deletions docs/how-to/join-machine-ad.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ There are 2 ways to join an AD domain:

Joining during installation is only supported by the Ubuntu Desktop graphical installer Ubiquity. So, start an installation of Ubuntu Desktop as you would usually do and proceed to the page **"Who are you?"**. Enter user and computer name information.

![Who are you installer screen](../images/installer-whoareyou.png)
![Who are you installer screen](../images/how-to/join-machine-ad/installer-whoareyou.png)

> *Note about the host name:*
>
Expand All @@ -23,7 +23,7 @@ Check the box **"Use Active Directory"** and click **"Continue"** to proceed wit

On this page you can enter the address of the Active Directory controller and credentials of the user allowed to add machines to the domain.

![Configure Active Directory installer screen](../images/installer-configure_ad.png)
![Configure Active Directory installer screen](../images/how-to/join-machine-ad/installer-configure_ad.png)

You can verify that the server is reachable by pressing **"Test Connection"**.

Expand Down
4 changes: 2 additions & 2 deletions docs/how-to/set-up-ad.md
Original file line number Diff line number Diff line change
Expand Up @@ -31,9 +31,9 @@ For more information read the Microsoft documentation ["create and manage the Ce

Once loaded successfully in Active Directory, the Ubuntu specific settings are available in the **Group Policy Management Editor** under `[Policy Name] > Computer Configuration > Policies > Administrative Templates > Ubuntu` for the machine policies and `[Policy Name] > User Configuration > Policies > Administrative Templates > Ubuntu` for the user policies.

![Ubuntu GPOs in Active Directory](../images/gpo_editor-tree.png)
![Ubuntu GPOs in Active Directory](../images/how-to/set-up-ad/gpo_editor-tree.png)

![Ubuntu Settings details page](../images/gpo_editor-details.png)
![Ubuntu Settings details page](../images/how-to/set-up-ad/gpo_editor-details.png)

## Recommended readings

Expand Down
30 changes: 15 additions & 15 deletions docs/how-to/use-gpo.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,10 +10,10 @@ As explained in previous chapter, there are 2 sets of Ubuntu specific settings i
For this example we will use a test domain called `warthogs.biz` with 2 separate OUs.

* The machine is called `adclient04` and belongs to `warthogs.biz > MainOffice`
![Main Office OU in Active Directory](../images/gpo_ou_computer.png)
![Main Office OU in Active Directory](../images/how-to/use-gpo/gpo_ou_computer.png)

* The user is called `bob` and belongs to `warthogs.biz > IT Dept > RnD`
![IT Deps/RnD OU in Active Directory](../images/gpo_ou_user.png)
![IT Deps/RnD OU in Active Directory](../images/how-to/use-gpo/gpo_ou_user.png)

In this example, we will demonstrate how to change dconf settings. We will first modify the greeter background image to illustrate how to enforce a computer setting and the list of preferred applications in the launcher for the user settings.

Expand All @@ -26,11 +26,11 @@ Launch the GPO Management editor and create a GPO in `warthogs.biz > MainOffice`
1. Enter a valid absolute path to a `.png` image on the client machine, e.g. `/usr/share/backgrounds/ubuntu-default-greyscale-wallpaper.png`.
1. Refresh the GPO rule on the client by rebooting the machine or running `adsysctl update -m` (You may be prompted to enter your password to check if have enough privileges to run the command)

![GDM Picture URI setting](../images/gpo_setting_enabled.png)
![GDM Picture URI setting](../images/how-to/use-gpo/gpo_setting_enabled.png)

The change is now visible on the greeter.

![Greeter with custom background](../images/gpo_gdm_background.png)
![Greeter with custom background](../images/how-to/use-gpo/gpo_gdm_background.png)

> Files are not copied by the Active Directory client and must already exist on the target system at this given path.
Expand All @@ -46,13 +46,13 @@ snap-store_ubuntu-software.desktop
yelp.desktop
```

![Favorite applications settings](../images/gpo_setting_enabled_list_of_apps.png)
![Favorite applications settings](../images/how-to/use-gpo/gpo_setting_enabled_list_of_apps.png)

4. Refresh the GPO rule applied to the user by logging in or running `adsysctl update` as your current user or `adsysctl update --all` to refresh the computer and all active users.

The list of applications showing up on the left side for your current Active Directory user should be updated.

![Customized list of applications](../images/gpo_setting_enabled_list_of_apps_applied.png)
![Customized list of applications](../images/how-to/use-gpo/gpo_setting_enabled_list_of_apps_applied.png)

> There are other ways of defining a list in ADSys / Active Directory integration. Check the **“Different types of widgets”** section below.
Expand All @@ -79,13 +79,13 @@ Next section will detail how to configure this and what happens when the Active

Most GPO rules can have 3 states: `enabled`, `disabled`, `not configured`. These states may have different meanings depending on the manager.

![States](../images/gpo_setting_states.png)
![States](../images/how-to/use-gpo/gpo_setting_states.png)

### General information of a setting

The **left pane** of the GPO Management Editor contains the options that can be edited when a setting is enabled.

![list of values for each release](../images/gpo_setting_left_pane.png)
![list of values for each release](../images/how-to/use-gpo/gpo_setting_left_pane.png)

There is a default value for all the releases and an override for each supported release of Ubuntu. More about multiple releases in the next section.

Expand All @@ -97,7 +97,7 @@ The **right pane** of the GPO Management editor contains the general information
* The default value of the key that is used if nothing is set on the left pane. Note that if defaults differ between releases, this will be a list per release.
* The list of releases that support this setting.

![General information of a setting](../images/gpo_setting_right_pane.png)
![General information of a setting](../images/how-to/use-gpo/gpo_setting_right_pane.png)

### Different types of widgets

Expand All @@ -107,13 +107,13 @@ The type `Text` represents a single line of text. If you don’t enclose a strin

The default value will be already set.

![Text field](../images/gpo_widget_text.png)
![Text field](../images/how-to/use-gpo/gpo_widget_text.png)

#### Text list

A multiline text field is used for this case. A list can be:

![Text list](../images/gpo_widget_multiline.png)
![Text list](../images/how-to/use-gpo/gpo_widget_multiline.png)

* One item per line: any end of line will be considered as a delimiter
Example:
Expand Down Expand Up @@ -175,19 +175,19 @@ Ensure that you enter the valid type of list, as expected by dconf setting. ADSy

A list field is a limited list of values to choose from. It is represented by a drop down list.

![Dropdown field](../images/gpo_widget_dropdown.png)
![Dropdown field](../images/how-to/use-gpo/gpo_widget_dropdown.png)

#### Checkbox

A checkbox will correspond to set to `true` or `false` values for the corresponding setting. The default value will be already selected.

![Checkbox field](../images/gpo_widget_checkbox.png)
![Checkbox field](../images/how-to/use-gpo/gpo_widget_checkbox.png)

#### Decimal

Decimal values are fields that allow only digits with optional upper and lower bounds. A spinner helps the user to increase or decrease the value.

![Checkbox field](../images/gpo_widget_decimal.png)
![Checkbox field](../images/how-to/use-gpo/gpo_widget_decimal.png)

The limits, if any, will be specified in the right section, per release.

Expand All @@ -203,6 +203,6 @@ By definition, override takes precedence over the default value defined at the t

Finally, note that the help text on the right panel will list each default per release if they differ between themselves. In addition, it will list the supported releases for this setting.

![Different defaults between releases](../images/gpo_setting_multireleases.png)
![Different defaults between releases](../images/how-to/use-gpo/gpo_setting_multireleases.png)

> Multi-release overrides are only available when your Active Directory administrative templates defines more than one release. If this is not the case, you will only see the top entry to define your policy.
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
Binary file added docs/images/explanation/scripts/assets-folder.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
2 changes: 1 addition & 1 deletion docs/reference/adsys-daemon.md
Original file line number Diff line number Diff line change
Expand Up @@ -194,7 +194,7 @@ More information is available in the [next chapter](adsysctl.md) covering adsysc

**ADSys** uses a privilege mechanism based on polkit to manage authorizations. Many commands require elevated privileges to be executed. If the adsys client is executed with insufficient privileges to execute a command, the user will be prompted to enter its password. If allowed then the command will be executed and denied otherwise.

![Polkit authentication dialog](../images/daemon-polkit.png)
![Polkit authentication dialog](../images/reference/adsys-daemon/daemon-polkit.png)

This is configurable by the administrator as any service controlled by polkit. For more information `man polkit`.

Expand Down

0 comments on commit bdc061e

Please sign in to comment.