summaryrefslogtreecommitdiffstats
path: root/vendor/github.com/matterbridge/msgraph.go/beta/IOSManagedAppProtectionModel.go
diff options
context:
space:
mode:
authorWim <wim@42.be>2020-03-08 17:08:18 +0100
committerGitHub <noreply@github.com>2020-03-08 17:08:18 +0100
commit9785edd26366be8eb11c2435f50f90a5c8eea7fc (patch)
treee8e236b5b273e7535c607507cc059f3b957068a1 /vendor/github.com/matterbridge/msgraph.go/beta/IOSManagedAppProtectionModel.go
parent2a0bc11b684f63305258e338c5f1d0e91eb24414 (diff)
downloadmatterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.tar.gz
matterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.tar.bz2
matterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.zip
Remove replace directives and use own fork to make go get work again (#1028)
See https://github.com/golang/go/issues/30354 go get doesn't honor the go.mod replace options.
Diffstat (limited to 'vendor/github.com/matterbridge/msgraph.go/beta/IOSManagedAppProtectionModel.go')
-rw-r--r--vendor/github.com/matterbridge/msgraph.go/beta/IOSManagedAppProtectionModel.go39
1 files changed, 39 insertions, 0 deletions
diff --git a/vendor/github.com/matterbridge/msgraph.go/beta/IOSManagedAppProtectionModel.go b/vendor/github.com/matterbridge/msgraph.go/beta/IOSManagedAppProtectionModel.go
new file mode 100644
index 00000000..ad3f1dd3
--- /dev/null
+++ b/vendor/github.com/matterbridge/msgraph.go/beta/IOSManagedAppProtectionModel.go
@@ -0,0 +1,39 @@
+// Code generated by msgraph-generate.go DO NOT EDIT.
+
+package msgraph
+
+// IOSManagedAppProtection Policy used to configure detailed management settings targeted to specific security groups and for a specified set of apps on an iOS device
+type IOSManagedAppProtection struct {
+ // TargetedManagedAppProtection is the base model of IOSManagedAppProtection
+ TargetedManagedAppProtection
+ // AppDataEncryptionType Type of encryption which should be used for data in a managed app.
+ AppDataEncryptionType *ManagedAppDataEncryptionType `json:"appDataEncryptionType,omitempty"`
+ // MinimumRequiredSdkVersion Versions less than the specified version will block the managed app from accessing company data.
+ MinimumRequiredSdkVersion *string `json:"minimumRequiredSdkVersion,omitempty"`
+ // DeployedAppCount Count of apps to which the current policy is deployed.
+ DeployedAppCount *int `json:"deployedAppCount,omitempty"`
+ // FaceIDBlocked Indicates whether use of the FaceID is allowed in place of a pin if PinRequired is set to True.
+ FaceIDBlocked *bool `json:"faceIdBlocked,omitempty"`
+ // ExemptedAppProtocols Apps in this list will be exempt from the policy and will be able to receive data from managed apps.
+ ExemptedAppProtocols []KeyValuePair `json:"exemptedAppProtocols,omitempty"`
+ // MinimumWipeSdkVersion Versions less than the specified version will block the managed app from accessing company data.
+ MinimumWipeSdkVersion *string `json:"minimumWipeSdkVersion,omitempty"`
+ // AllowedIOSDeviceModels Semicolon seperated list of device models allowed, as a string, for the managed app to work.
+ AllowedIOSDeviceModels *string `json:"allowedIosDeviceModels,omitempty"`
+ // AppActionIfIOSDeviceModelNotAllowed Defines a managed app behavior, either block or wipe, if the specified device model is not allowed.
+ AppActionIfIOSDeviceModelNotAllowed *ManagedAppRemediationAction `json:"appActionIfIosDeviceModelNotAllowed,omitempty"`
+ // ThirdPartyKeyboardsBlocked Defines if third party keyboards are allowed while accessing a managed app
+ ThirdPartyKeyboardsBlocked *bool `json:"thirdPartyKeyboardsBlocked,omitempty"`
+ // FilterOpenInToOnlyManagedApps Defines if open-in operation is supported from the managed app to the filesharing locations selected. This setting only applies when AllowedOutboundDataTransferDestinations is set to ManagedApps and DisableProtectionOfManagedOutboundOpenInData is set to False.
+ FilterOpenInToOnlyManagedApps *bool `json:"filterOpenInToOnlyManagedApps,omitempty"`
+ // DisableProtectionOfManagedOutboundOpenInData Disable protection of data transferred to other apps through IOS OpenIn option. This setting is only allowed to be True when AllowedOutboundDataTransferDestinations is set to ManagedApps.
+ DisableProtectionOfManagedOutboundOpenInData *bool `json:"disableProtectionOfManagedOutboundOpenInData,omitempty"`
+ // ProtectInboundDataFromUnknownSources Protect incoming data from unknown source. This setting is only allowed to be True when AllowedInboundDataTransferSources is set to AllApps.
+ ProtectInboundDataFromUnknownSources *bool `json:"protectInboundDataFromUnknownSources,omitempty"`
+ // CustomBrowserProtocol A custom browser protocol to open weblink on iOS.
+ CustomBrowserProtocol *string `json:"customBrowserProtocol,omitempty"`
+ // Apps undocumented
+ Apps []ManagedMobileApp `json:"apps,omitempty"`
+ // DeploymentSummary undocumented
+ DeploymentSummary *ManagedAppPolicyDeploymentSummary `json:"deploymentSummary,omitempty"`
+}