mirror of
https://github.com/Qubes-Community/Contents.git
synced 2024-10-01 01:05:51 -04:00
Added the missing policy/ directory in the dom0 setup description
See https://www.qubes-os.org/doc/qrexec/#policy-files for more info.
This commit is contained in:
parent
86aa77566f
commit
c6cade4f92
@ -112,12 +112,12 @@ If you still want to encrypt your keys you must refer to the [Securing Your Priv
|
|||||||
|
|
||||||
To control which VM is allowed as a client, which may act as the server and how we want this interaction to happen, we have to write a policy file for qrexec in `dom0`.
|
To control which VM is allowed as a client, which may act as the server and how we want this interaction to happen, we have to write a policy file for qrexec in `dom0`.
|
||||||
|
|
||||||
1. Create and edit `/etc/qubes-rpc/qubes.SshAgent`.
|
1. Create and edit `/etc/qubes-rpc/policy/qubes.SshAgent`.
|
||||||
|
|
||||||
- Open the file with e.g. `nano`.
|
- Open the file with e.g. `nano`.
|
||||||
|
|
||||||
```shell_prompt
|
```shell_prompt
|
||||||
[user@fedora-32 ~]$ sudo nano /etc/qubes-rpc/qubes.SshAgent
|
[user@fedora-32 ~]$ sudo nano /etc/qubes-rpc/policy/qubes.SshAgent
|
||||||
```
|
```
|
||||||
|
|
||||||
- If you want to explicitly allow only this connection, add the following line:
|
- If you want to explicitly allow only this connection, add the following line:
|
||||||
|
Loading…
Reference in New Issue
Block a user