• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1# system_grant Non-ACL Permissions for System Applications
2
3Before requesting permissions for your application, read and understand the [permission request paths](determine-application-mode.md) and this topic to determine the permissions required.
4
5> **NOTE**
6>
7> - The permissions listed in this topic are available to system_basic or system_core applications, but not to normal applications.
8> - The authorization mode of these permissions is system_grant.
9> - These permissions cannot be requested via access control list (ACL).
10
11For details about the process for requesting the permissions, see [Workflow for Requesting Permissions](determine-application-mode.md).
12
13## ohos.permission.RECEIVER_STARTUP_COMPLETED
14
15Allows an application to subscribe to the startup broadcast.
16
17**Permission level**: system_basic
18
19**Authorization mode**: system_grant
20
21**Enable via ACL**: false
22
23**Valid since**: 9
24
25## ohos.permission.SYSTEM_LIGHT_CONTROL
26
27Allows an application to control lights, including turning on and off lights.
28
29**Permission level**: system_basic
30
31**Authorization mode**: system_grant
32
33**Enable via ACL**: false
34
35**Valid since**: 11
36
37## ohos.permission.GET_ALL_APP_ACCOUNTS
38
39Allows an application to obtain information about all application accounts.
40
41**Permission level**: system_core
42
43**Authorization mode**: system_grant
44
45**Enable via ACL**: false
46
47**Valid since**: 7
48
49## ohos.permission.MANAGE_DEVICE_AUTH_CRED
50
51Allows an application to call interfaces of the DeviceAuthCredMgr application.
52
53**Permission level**: system_basic
54
55**Authorization mode**: system_grant
56
57**Enable via ACL**: false
58
59**Valid since**: 10
60
61## ohos.permission.ACCESS_AUTH_RESPOOL
62
63Allows an SA to register the executor.
64
65**Permission level**: system_core
66
67**Authorization mode**: system_grant
68
69**Enable via ACL**: false
70
71**Valid since**: 9
72
73## ohos.permission.READ_ACCESSIBILITY_CONFIG
74
75Allows an application to read the accessibility configuration.
76
77**Permission level**: system_basic
78
79**Authorization mode**: system_grant
80
81**Enable via ACL**: false
82
83**Valid since**: 9
84
85## ohos.permission.WRITE_APP_PUSH_DATA
86
87Allows the push service to write data to an application.
88
89**Permission level**: system_basic
90
91**Authorization mode**: system_grant
92
93**Enable via ACL**: false
94
95**Valid since**: 10
96
97## ohos.permission.READ_APP_PUSH_DATA
98
99Allows the push service to read data from an application.
100
101**Permission level**: system_basic
102
103**Authorization mode**: system_grant
104
105**Enable via ACL**: false
106
107**Valid since**: 10
108
109## ohos.permission.NETSYS_INTERNAL
110
111Allows an SA to call the network diagnosis, Wi-Fi, network adapter listening, and iptables setting APIs of **netsys**.
112
113**Permission level**: system_basic
114
115**Authorization mode**: system_grant
116
117**Enable via ACL**: false
118
119**Valid since**: 10
120
121## ohos.permission.DISTRIBUTED_SOFTBUS_CENTER
122
123Allows networking between different devices.
124
125**Permission level**: system_basic
126
127**Authorization mode**: system_grant
128
129**Enable via ACL**: false
130
131**Valid since**: 9
132
133## ohos.permission.RESTRICT_APPLICATION_ACTIVE
134
135Allows a standby component to publish a customized network limit event.
136
137**Permission level**: system_basic
138
139**Authorization mode**: system_grant
140
141**Enable via ACL**: false
142
143**Valid since**: 10
144
145## ohos.permission.CONNECT_CELLULAR_CALL_SERVICE
146
147Allows a system service to access the cellular call SA.
148
149**Permission level**: system_basic
150
151**Authorization mode**: system_grant
152
153**Enable via ACL**: false
154
155**Valid since**: 10
156
157## ohos.permission.CONNECT_IMS_SERVICE
158
159Allows a system service to access the IMS SA.
160
161**Permission level**: system_basic
162
163**Authorization mode**: system_grant
164
165**Enable via ACL**: false
166
167**Valid since**: 10
168
169## ohos.permission.ENFORCE_USER_IDM
170
171Allows an SA to delete the IAM user information without a token.
172
173**Permission level**: system_core
174
175**Authorization mode**: system_grant
176
177**Enable via ACL**: false
178
179**Valid since**: 9
180
181## ohos.permission.WRITE_ACCESSIBILITY_CONFIG
182
183Allows an application to set the accessibility configuration.
184
185**Permission level**: system_basic
186
187**Authorization mode**: system_grant
188
189**Enable via ACL**: false
190
191**Valid since**: 9
192
193## ohos.permission.ENABLE_DISTRIBUTED_HARDWARE
194
195Allows a system service to enable distributed hardware resources.
196
197**Permission level**: system_basic
198
199**Authorization mode**: system_grant
200
201**Enable via ACL**: false
202
203**Valid since**: 11
204
205## ohos.permission.ACCESS_SUPER_HUB
206
207Allows an application to access Super Hub.
208
209**Permission level**: system_basic
210
211**Authorization mode**: system_grant
212
213**Enable via ACL**: false
214
215**Valid since**: 12
216
217## ohos.permission.CALLED_UIEXTENSION_ON_LOCK_SCREEN
218
219Allows a UIExtensionAbility to be displayed on the locked screen.
220
221**Permission level**: system_core
222
223**Authorization mode**: system_grant
224
225**Enable via ACL**: false
226
227**Valid since**: 14
228
229## ohos.permission.USE_USER_ACCESS_MANAGER
230
231Allows an application to query and configure user identity authentication policies, and verify the authentication result.
232
233**Permission level**: system_basic
234
235**Authorization mode**: system_grant
236
237**Enable via ACL**: false
238
239**Valid since**: 18
240
241## ohos.permission.SET_LAUNCH_REASON_MESSAGE
242
243Allows a system application to set the launch reason when starting another application.
244
245**Permission level**: system_basic
246
247**Authorization mode**: system_grant
248
249**Enable via ACL**: false
250
251**Valid since**: 18
252
253## ohos.permission.ACCESS_USER_ACCOUNT_INFO
254
255Allows a system application to access user account information.
256
257**Permission level**: system_basic
258
259**Authorization mode**: system_grant
260
261**Enable via ACL**: false
262
263**Valid since**: 18
264