You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Raspberry Pi on a standard Raspbian install has the ability to basically visit any web page without restriction. By setting up a Chromium policy machine-wide, we can prevent malicious and unintended actions from users breaking the kiosk setup and workflow. The following should be set as a JSON file in the /boot directory. A symlink should be setup in /etc/chromium-browser/policies/managed that targets /boot/chromium_kiosk_settings.json. To prevent tampering and corrupted data, set /etc/fstab to mount the /boot directory as read-only.
The following should serve as a basis for the default kiosk settings policy for Chromium:
djchateau
changed the title
Create Chromium policy to unintended uses of kiosk.
Create Chromium policy to mitigate unintended uses of kiosk.
Jul 20, 2018
The Raspberry Pi on a standard Raspbian install has the ability to basically visit any web page without restriction. By setting up a Chromium policy machine-wide, we can prevent malicious and unintended actions from users breaking the kiosk setup and workflow. The following should be set as a JSON file in the /boot directory. A symlink should be setup in
/etc/chromium-browser/policies/managed
that targets/boot/chromium_kiosk_settings.json
. To prevent tampering and corrupted data, set/etc/fstab
to mount the/boot
directory as read-only.The following should serve as a basis for the default kiosk settings policy for Chromium:
The text was updated successfully, but these errors were encountered: