mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 22:07:22 +00:00
Add explanations for different group types and access restrictions
This commit is contained in:
parent
43b4caabb5
commit
c79c669ad5
@ -410,6 +410,7 @@ Group accounts are specified using `<UserGroup>`. Nested groups aren't supported
|
||||
:::row:::
|
||||
:::column span="2":::
|
||||
**Local group**
|
||||
|
||||
Specify the group type as **LocalGroup** and put the group name in Name attribute. Any Microsoft Entra accounts that are added to the local group won't have the kiosk settings applied.
|
||||
:::column-end:::
|
||||
:::column span="2":::
|
||||
@ -424,6 +425,7 @@ Specify the group type as **LocalGroup** and put the group name in Name attribut
|
||||
:::row:::
|
||||
:::column span="2":::
|
||||
**Active Directory group**
|
||||
|
||||
Both security and distribution groups are supported. Specify the group type as <strong>ActiveDirectoryGroup</strong>. Use the domain name as the prefix in the name attribute.
|
||||
:::column-end:::
|
||||
:::column span="2":::
|
||||
@ -438,6 +440,7 @@ Both security and distribution groups are supported. Specify the group type as <
|
||||
:::row:::
|
||||
:::column span="2":::
|
||||
**Microsoft Entra group**
|
||||
|
||||
Use the object ID of the Microsoft Entra group. You can find the object ID on the overview page for the group in **Users and groups** > **All groups**. Specify the group type as `AzureActiveDirectoryGroup`. The kiosk device must have internet connectivity when users that belong to the group sign-in.
|
||||
:::column-end:::
|
||||
:::column span="2":::
|
||||
@ -538,6 +541,7 @@ You can specify user access to Downloads folder, Removable drives, or no restric
|
||||
:::row:::
|
||||
:::column span="2":::
|
||||
**Block everything**
|
||||
|
||||
Either don't use the node or leave it empty
|
||||
:::column-end:::
|
||||
:::column span="2":::
|
||||
@ -589,7 +593,7 @@ Either don't use the node or leave it empty
|
||||
:::column span="2":::
|
||||
**No restrictions, all locations are allowed**
|
||||
:::column-end:::
|
||||
:::column span="3":::
|
||||
:::column span="2":::
|
||||
```xml
|
||||
<rs5:FileExplorerNamespaceRestrictions>
|
||||
<v3:NoRestriction />
|
||||
@ -603,34 +607,9 @@ Either don't use the node or leave it empty
|
||||
|
||||
::: zone-end
|
||||
|
||||
---
|
||||
## Next steps
|
||||
|
||||
## Practical examples
|
||||
|
||||
### Kiosk experience with Microsoft Edge example
|
||||
|
||||
[!INCLUDE [assigned-access-example-kiosk-edge](includes/assigned-access-example-kiosk-edge.md)]
|
||||
|
||||
### Kiosk experience with UWP app example
|
||||
|
||||
[!INCLUDE [assigned-access-example-kiosk-uwp](includes/assigned-access-example-kiosk-uwp.md)]
|
||||
|
||||
::: zone pivot="windows-10"
|
||||
|
||||
### File Explorer restrictions example
|
||||
|
||||
[!INCLUDE [assigned-access-example-file-explorer-restrictions](includes/assigned-access-example-file-explorer-restrictions.md)]
|
||||
|
||||
::: zone-end
|
||||
|
||||
### Global Profile example
|
||||
|
||||
The following configuration demonstrates that only a global profile is used, with no user configured.
|
||||
|
||||
[!INCLUDE [assigned-access-example-global-profile](includes/assigned-access-example-global-profile.md)]
|
||||
|
||||
### User Group example
|
||||
|
||||
The following configuration demonstrates how to assign profiles to different users and groups, including a user configured to automatically sign in.
|
||||
|
||||
[!INCLUDE [assigned-access-example-usergroup](includes/assigned-access-example-usergroup.md)]
|
||||
> [!div class="nextstepaction"]
|
||||
> Review some practical examples of Assigned Access XML configurations:
|
||||
>
|
||||
> [Assigned Access examples](assigned-access-examples.md)
|
@ -0,0 +1,45 @@
|
||||
---
|
||||
title: Assigned Access examples
|
||||
description: Practical examples of XML files to configure Assigned Access.
|
||||
ms.date: 02/26/2024
|
||||
ms.topic: reference
|
||||
zone_pivot_groups: windows-versions-11-10
|
||||
appliesto:
|
||||
---
|
||||
|
||||
# Assigned Access examples
|
||||
|
||||
This artcile contains examples of XML files to configure a device with Assigned Access. The files can be easily modified to fit your specific needs.
|
||||
|
||||
To learn more:
|
||||
|
||||
- [Create an Assigned Access configuration XML file](assigned-access-configuration-file.md).
|
||||
- [Assigned Access XML Schema Definition (XSD)](assigned-access-xsd.md).
|
||||
|
||||
## Kiosk experience with Microsoft Edge example
|
||||
|
||||
[!INCLUDE [assigned-access-example-kiosk-edge](includes/assigned-access-example-kiosk-edge.md)]
|
||||
|
||||
## Kiosk experience with UWP app example
|
||||
|
||||
[!INCLUDE [assigned-access-example-kiosk-uwp](includes/assigned-access-example-kiosk-uwp.md)]
|
||||
|
||||
::: zone pivot="windows-10"
|
||||
|
||||
## File Explorer restrictions example
|
||||
|
||||
[!INCLUDE [assigned-access-example-file-explorer-restrictions](includes/assigned-access-example-file-explorer-restrictions.md)]
|
||||
|
||||
::: zone-end
|
||||
|
||||
## Global Profile example
|
||||
|
||||
The following configuration demonstrates that only a global profile is used, with no user configured.
|
||||
|
||||
[!INCLUDE [assigned-access-example-global-profile](includes/assigned-access-example-global-profile.md)]
|
||||
|
||||
## User Group example
|
||||
|
||||
The following configuration demonstrates how to assign profiles to different users and groups, including a user configured to automatically sign in.
|
||||
|
||||
[!INCLUDE [assigned-access-example-usergroup](includes/assigned-access-example-usergroup.md)]
|
@ -33,6 +33,8 @@ items:
|
||||
href: /windows/client-management/mdm/assignedaccess-csp
|
||||
- name: Assigned Access XSD
|
||||
href: assigned-access-xsd.md
|
||||
- name: Assigned Access XML examples
|
||||
href: assigned-access-examples.md
|
||||
- name: Shell Launcher XSD
|
||||
href: shell-launcher-xsd.md
|
||||
- name: Assigned Access policy settings
|
||||
|
Loading…
x
Reference in New Issue
Block a user