mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-02-25 09:11:16 -05:00
Fix action/options policy separator
This commit is contained in:
parent
0ae86fa285
commit
661a2ca160
@ -140,10 +140,10 @@ work-email work-gpg allow
|
||||
|
||||
where `work-email` is the Thunderbird + Enigmail app qube and `work-gpg` contains your GPG keys.
|
||||
|
||||
You may also edit the qrexec policy file for Split GPG in order to tell Qubes your default gpg vm (qrexec prompts will appear with the gpg vm preselected as the target, instead of the user needing to type a name in manually). To do this, append `,default_target=<vmname>` to `ask` in `/etc/qubes-rpc/policy/qubes.Gpg`. For the examples given on this page:
|
||||
You may also edit the qrexec policy file for Split GPG in order to tell Qubes your default gpg vm (qrexec prompts will appear with the gpg vm preselected as the target, instead of the user needing to type a name in manually). To do this, append `default_target=<vmname>` to `ask` in `/etc/qubes-rpc/policy/qubes.Gpg`. For the examples given on this page:
|
||||
|
||||
```
|
||||
@anyvm @anyvm ask,default_target=work-gpg
|
||||
@anyvm @anyvm ask default_target=work-gpg
|
||||
```
|
||||
|
||||
Note that, because this makes it easier to accept Split GPG's qrexec authorization prompts, it may decrease security if the user is not careful in reviewing presented prompts. This may also be inadvisable if there are multiple app qubes with Split GPG set up.
|
||||
|
Loading…
x
Reference in New Issue
Block a user