# @ohos.enterprise.restrictions (Restrictions) This **restrictions** module provides APIs for disallowing general features of devices. You can globally disable or enable the features such as Bluetooth, HDC, USB, and Wi-Fi. > **NOTE** > > - The initial APIs of this module are supported since API version 12. Newly added APIs will be marked with a superscript to indicate their earliest API version. > > - The APIs of this module can be used only in the stage model. > > - The APIs of this module can be called only by a device administrator application that is enabled. For details, see [MDM Kit Development](../../mdm/mdm-kit-guide.md). ## Modules to Import ```ts import { restrictions } from '@kit.MDMKit'; ``` ## restrictions.setDisallowedPolicy setDisallowedPolicy(admin: Want, feature: string, disallow: boolean): void Disallows a feature. **Required permissions**: ohos.permission.ENTERPRISE_MANAGE_RESTRICTIONS or ohos.permission.PERSONAL_MANAGE_RESTRICTIONS15+ **System capability**: SystemCapability.Customization.EnterpriseDeviceManager **Parameters** | Name | Type | Mandatory| Description | | -------- | ------------------------------------------------------- | ---- | ------------------------------------------------------------ | | admin | [Want](../apis-ability-kit/js-apis-app-ability-want.md) | Yes | EnterpriseAdminExtensionAbility. | | feature | string | Yes | Feature to set.
- **bluetooth**: Bluetooth capability. If allowed or disallowed Bluetooth devices have already been configured via [addDisallowedBluetoothDevices](js-apis-enterprise-bluetoothManager.md#bluetoothmanageradddisallowedbluetoothdevices20) and [addAllowedBluetoothDevices](js-apis-enterprise-bluetoothManager.md#bluetoothmanageraddallowedbluetoothdevices), disabling the device Bluetooth capability through **setDisallowedPolicy** will take precedence. The device restrictions will not apply until Bluetooth is re-enabled.
- **modifyDateTime**: capability of modifying the system time. Currently, this feature is available only for 2-in-1 devices.
- **printer**: printing capability. Currently, this feature is available only for 2-in-1 devices.
- **hdc**: OpenHarmony Device Connector (HDC).
- **microphone**: microphone capability.
- **fingerprint**: fingerprint authentication capability. If this capability has been disabled for a user using [setDisallowedPolicyForAccount](#restrictionssetdisallowedpolicyforaccount14), a policy conflict will be reported when **setDisallowedPolicy** is invoked.
- **usb**: USB capability. After this capability is disabled, the external USB device cannot be used. This means that the current device in host mode cannot connect to other external devices.
A policy conflict will be reported if **setDisallowedPolicy** is called in the following three scenarios:
1. Available USB devices have been added via [addAllowedUsbDevices](js-apis-enterprise-usbManager.md#usbmanageraddallowedusbdevices).
2. The access policy of the USB storage device has been set to read-only or disabled via [setUsbStorageDeviceAccessPolicy](js-apis-enterprise-usbManager.md#usbmanagersetusbstoragedeviceaccesspolicy).
3. Disallowed USB device types have been added via [addDisallowedUsbDevices](js-apis-enterprise-usbManager.md#usbmanageradddisallowedusbdevices14).
- **wifi**: Wi-Fi capability.
- **tethering**14+: network sharing capability. The device can share the network (hotspot) with other devices.
- **inactiveUserFreeze**14+: capability of freezing inactive users. Currently, this feature is available only for 2-in-1 devices. When the system switches to the enterprise space user, the personal space users are inactive users.
- **camera**14+: camera capability.
- **mtpClient**18+: MTP client capability (including reading and writing). Currently, this feature is available only for 2-in-1 devices. The Media Transfer Protocol (MTP) allows users to access media files linearly on mobile devices. If the MTP client's write permission has already been disabled for a user via [setDisallowedPolicyForAccount](#restrictionssetdisallowedpolicyforaccount14), using **setDisallowedPolicy** to disable this feature will throw a policy conflict error.
- **mtpServer**18+: MTP server capability. Currently, this feature is available only for mobile phones, tablets, and 2-in-1 devices.
- **sambaClient**20+: samba client capability. Currently, this feature is available only for 2-in-1 devices.
Samba is a free software that implements the SMB protocol on Linux and UNIX systems, consisting of both server and client programs.
Server Messages Block (SMB) is a communication protocol for sharing files and printers on a local area network (LAN). It provides shared access to files, printers, and other resources between different computers within the LAN.
The SMB protocol follows a client-server model, allowing clients to access shared file systems, printers, and other resources on servers through this protocol.
- **sambaServer**20+: samba server capability. This feature is available only for 2-in-1 devices.
- **backupAndRestore**20+: backup and restore capability. If this feature is disabled, the **Settings** > **System** > **Backup & Restore** and **Settings** > **Cloud** options will become unavailable. This feature is available only for mobile phones and tablets. To completely disable the backup and restore capability, you are advised to call [applicationManager.addDisallowedRunningBundlesSync](./js-apis-enterprise-applicationManager.md#applicationmanageradddisallowedrunningbundlessync) to disable applications with this feature, such as Backup & Restore, HiSuite, and Cloud.
- **maintenanceMode**20+: device maintenance mode. Currently, this feature is available only for mobile phones, tablets, and 2-in-1 devices.
- **mms**20+: Multimedia Messaging Service (MMS), which is the capability of a device to receive and send MMS messages. Currently, this feature is available only for mobile phones and tablets.
- **sms**20+: Short Messaging Service (SMS), which is the capability of a device to receive and send SMS messages. Currently, this feature is available only for mobile phones and tablets.
- **mobileData**20+: cellular data. Currently, this feature is available only for mobile phones and tablets.
- **airplaneMode**20+: airplane mode. Currently, this feature is available only for mobile phones and tablets.
- **vpn**20+: Virtual Private Network (VPN).
- **notification**20+: device notification capability. When this feature is disabled, notifications sent by third-party applications will not be displayed.
- **nfc**20+: Near Field Communication (NFC).
**NOTE**
Since API version 15, applications granted with the ohos.permission.PERSONAL_MANAGE_RESTRICTIONS permission and [activated as device administrator applications](./js-apis-enterprise-adminManager.md#adminmanagerstartadminprovision15) can set the following features: **bluetooth**, **hdc**, **microphone**, **usb**, **wifi**, **tethering**, and **camera**.| | disallow | boolean | Yes | Whether to disallow the feature. The value **true** means to disallow the feature; the value **false** means the opposite. | **Error codes** For details about the error codes, see [Enterprise Device Management Error Codes](errorcode-enterpriseDeviceManager.md) and [Universal Error Codes](../errorcode-universal.md). | ID| Error Message | | -------- | ------------------------------------------------------------ | | 9200001 | The application is not an administrator application of the device. | | 9200002 | The administrator application does not have permission to manage the device. | | 201 | Permission verification failed. The application does not have the permission required to call the API. | **Example** ```ts import { Want } from '@kit.AbilityKit'; let wantTemp: Want = { bundleName: 'com.example.myapplication', abilityName: 'EntryAbility', }; try { restrictions.setDisallowedPolicy(wantTemp, 'printer', true); console.info('Succeeded in setting printer disabled'); } catch (err) { console.error(`Failed to set printer disabled. Code is ${err.code}, message is ${err.message}`); } ``` ## restrictions.getDisallowedPolicy getDisallowedPolicy(admin: Want, feature: string): boolean Obtains a disallowed feature. **Required permissions**: ohos.permission.ENTERPRISE_MANAGE_RESTRICTIONS or ohos.permission.PERSONAL_MANAGE_RESTRICTIONS15+ **System capability**: SystemCapability.Customization.EnterpriseDeviceManager **Parameters** | Name | Type | Mandatory| Description | | ------- | ------------------------------------------------------- | ---- | ------------------------------------------------------------ | | admin | [Want](../apis-ability-kit/js-apis-app-ability-want.md) | Yes | EnterpriseAdminExtensionAbility. | | feature | string | Yes | Feature to set.
- **bluetooth**: Bluetooth capability.
- **modifyDateTime**: capability of modifying the system time. Currently, this feature is available only for 2-in-1 devices.
- **printer**: printing capability. Currently, this feature is available only for 2-in-1 devices.
- **hdc**: OpenHarmony Device Connector (HDC).
- **microphone**: microphone capability.
- **fingerprint**: fingerprint authentication capability.
- **usb**: USB capability. After this capability is disabled, the external USB device cannot be used. This means that the current device in host mode cannot connect to other external devices.
- **wifi**: Wi-Fi capability.
- **tethering**14+: network sharing capability. The device can share the network (hotspot) with other devices.
- **inactiveUserFreeze**14+: capability of freezing inactive users. Currently, this feature is available only for 2-in-1 devices. When the system switches to the enterprise space user, the personal space users are inactive users.
- **camera**14+: camera capability.
- **mtpClient**18+: MTP client capability (including reading and writing). Currently, this feature is available only for 2-in-1 devices. The Media Transfer Protocol (MTP) allows users to access media files linearly on mobile devices.
- **mtpServer**18+: MTP server capability. Currently, this feature is available only for mobile phones, tablets, and 2-in-1 devices.
- **sambaClient**20+: samba client capability. Currently, this feature is available only for 2-in-1 devices.
Samba is a free software that implements the SMB protocol on Linux and UNIX systems, consisting of both server and client programs.
Server Messages Block (SMB) is a communication protocol for sharing files and printers on a local area network (LAN). It provides shared access to files, printers, and other resources between different computers within the LAN.
The SMB protocol follows a client-server model, allowing clients to access shared file systems, printers, and other resources on servers through this protocol.
- **sambaServer**20+: samba server capability. This feature is available only for 2-in-1 devices.
- **backupAndRestore**20+: backup and restore capability. If this feature is disabled, the **Settings** > **System** > **Backup & Restore** and **Settings** > **Cloud** options will become unavailable. This feature is available only for mobile phones and tablets.
- **maintenanceMode**20+: device maintenance mode. Currently, this feature is available only for mobile phones, tablets, and 2-in-1 devices.
- **mms**20+: Multimedia Messaging Service (MMS), which is the capability of a device to receive and send MMS messages. Currently, this feature is available only for mobile phones and tablets.
- **sms**20+: Short Messaging Service (SMS), which is the capability of a device to receive and send SMS messages. Currently, this feature is available only for mobile phones and tablets.
- **mobileData**20+: cellular data. Currently, this feature is available only for mobile phones and tablets.
- **airplaneMode**20+: airplane mode. Currently, this feature is available only for mobile phones and tablets.
- **vpn**20+: Virtual Private Network (VPN).
- **notification**20+: device notification capability.
- **nfc**20+: Near Field Communication (NFC).
**NOTE**
Since API version 15, applications granted with the ohos.permission.PERSONAL_MANAGE_RESTRICTIONS permission and [activated as device administrator applications](./js-apis-enterprise-adminManager.md#adminmanagerstartadminprovision15) can obtain the following features: **bluetooth**, **hdc**, **microphone**, **usb**, **wifi**, **tethering**, and **camera**.| **Return value** | Type | Description | | ------- | ------------------------------------------------------------ | | boolean | The value **true** means the feature is disallowed; the value **false** means the opposite.| **Error codes** For details about the error codes, see [Enterprise Device Management Error Codes](errorcode-enterpriseDeviceManager.md) and [Universal Error Codes](../errorcode-universal.md). | ID| Error Message | | -------- | ------------------------------------------------------------ | | 9200001 | The application is not an administrator application of the device. | | 9200002 | The administrator application does not have permission to manage the device. | | 201 | Permission verification failed. The application does not have the permission required to call the API. | **Example** ```ts import { Want } from '@kit.AbilityKit'; let wantTemp: Want = { bundleName: 'com.example.myapplication', abilityName: 'EntryAbility', }; try { let result: boolean = restrictions.getDisallowedPolicy(wantTemp, 'printer'); console.info(`Succeeded in querying is the printing function disabled : ${result}`); } catch (err) { console.error(`Failed to set printer disabled. Code is ${err.code}, message is ${err.message}`); } ``` ## restrictions.setDisallowedPolicyForAccount14+ setDisallowedPolicyForAccount(admin: Want, feature: string, disallow: boolean, accountId: number): void Disallows a feature for a specified user. **Required permissions**: ohos.permission.ENTERPRISE_MANAGE_RESTRICTIONS **System capability**: SystemCapability.Customization.EnterpriseDeviceManager **Parameters** | Name | Type | Mandatory| Description | | -------- | ------------------------------------------------------- | ---- | ------------------------------------------------------------ | | admin | [Want](../apis-ability-kit/js-apis-app-ability-want.md) | Yes | EnterpriseAdminExtensionAbility. | | feature | string | Yes | Feature to set.
- **fingerprint**: device fingerprint authentication capability. Currently, this feature is available only for 2-in-1 devices. The rules for using this parameter are as follows:
1. If this capability has been disabled through the [setDisallowedPolicy](#restrictionssetdisallowedpolicy) API, using **setDisallowedPolicyForAccount** will throw a policy conflict.
2. When **setDisallowedPolicyForAccount** is used to disable or enable the device fingerprint authentication capability for a specified user, any subsequent action via the [setDisallowedPolicy](#restrictionssetdisallowedpolicy) API will override the previous setting. If [setDisallowedPolicy](#restrictionssetdisallowedpolicy) enables the capability, all users gain access to the device fingerprint authentication.
- **mtpClient**20+: MTP client capability (writing). Currently, this feature is available only for 2-in-1 devices. The Media Transfer Protocol (MTP) allows users to access media files linearly on mobile devices. If the MTP client's write permission has already been disabled for a user via [setDisallowedPolicy](#restrictionssetdisallowedpolicy), using **setDisallowedPolicyForAccount** to disable this feature will throw a policy conflict error.| | disallow | boolean | Yes | Whether to disallow the feature. The value **true** means to disallow the feature; the value **false** means the opposite. | | accountId | number | Yes | User ID, which must be greater than or equal to 0.
You can call [getOsAccountLocalId](../apis-basic-services-kit/js-apis-osAccount.md#getosaccountlocalid9) to obtain the user ID.| **Error codes** For details about the error codes, see [Enterprise Device Management Error Codes](errorcode-enterpriseDeviceManager.md) and [Universal Error Codes](../errorcode-universal.md). | ID| Error Message | | -------- | ------------------------------------------------------------ | | 9200001 | The application is not an administrator application of the device. | | 9200002 | the administrator application does not have permission to manage the device. | | 9200010 | A conflict policy has been configured. | | 201 | Permission verification failed. The application does not have the permission required to call the API. | | 401 | Parameter error. Possible causes: 1. Mandatory parameters are left unspecified; 2. Incorrect parameter types; 3. Parameter verification failed. | **Example** ```ts import { Want } from '@kit.AbilityKit'; let wantTemp: Want = { bundleName: 'com.example.myapplication', abilityName: 'EntryAbility', }; try { restrictions.setDisallowedPolicyForAccount(wantTemp, 'fingerprint', true, 100); console.info('Succeeded in setting fingerprint disabled'); } catch (err) { console.error(`Failed to set fingerprint disabled. Code is ${err.code}, message is ${err.message}`); } ``` ## restrictions.getDisallowedPolicyForAccount14+ getDisallowedPolicyForAccount(admin: Want, feature: string, accountId: number): boolean Obtains the status of a feature for a specified user. **Required permissions**: ohos.permission.ENTERPRISE_MANAGE_RESTRICTIONS **System capability**: SystemCapability.Customization.EnterpriseDeviceManager **Parameters** | Name | Type | Mandatory| Description | | ------- | ------------------------------------------------------- | ---- | ------------------------------------------------------------ | | admin | [Want](../apis-ability-kit/js-apis-app-ability-want.md) | Yes | EnterpriseAdminExtensionAbility. | | feature | string | Yes | Feature to set.
- **fingerprint**: device fingerprint authentication capability. Currently, this feature is available only for 2-in-1 devices. Note that when [setDisallowedPolicyForAccount](#restrictionssetdisallowedpolicyforaccount14) is used to disable or enable the device fingerprint authentication capability for a specified user, any subsequent action via the [setDisallowedPolicy](#restrictionssetdisallowedpolicy) API will override the previous setting. The value **false** will be returned.
- **mtpClient**20+: MTP client capability (writing). Currently, this feature is available only for 2-in-1 devices. The Media Transfer Protocol (MTP) allows users to access media files linearly on mobile devices.| | accountId | number | Yes | User ID, which must be greater than or equal to 0.
You can call [getOsAccountLocalId](../apis-basic-services-kit/js-apis-osAccount.md#getosaccountlocalid9) to obtain the user ID.| **Return value** | Type | Description | | ------- | ------------------------------------------------------------ | | boolean | The value **true** means the feature is disabled; the value **false** means the opposite.| **Error codes** For details about the error codes, see [Enterprise Device Management Error Codes](errorcode-enterpriseDeviceManager.md) and [Universal Error Codes](../errorcode-universal.md). | ID| Error Message | | -------- | ------------------------------------------------------------ | | 9200001 | The application is not an administrator application of the device. | | 9200002 | the administrator application does not have permission to manage the device. | | 201 | Permission verification failed. The application does not have the permission required to call the API. | | 401 | Parameter error. Possible causes: 1. Mandatory parameters are left unspecified; 2. Incorrect parameter types; 3. Parameter verification failed. | **Example** ```ts import { Want } from '@kit.AbilityKit'; let wantTemp: Want = { bundleName: 'com.example.myapplication', abilityName: 'EntryAbility', }; try { let result: boolean = restrictions.getDisallowedPolicyForAccount(wantTemp, 'fingerprint', 100); console.info(`Succeeded in querying is the fingerprint function disabled : ${result}`); } catch (err) { console.error(`Failed to set fingerprint disabled. Code is ${err.code}, message is ${err.message}`); } ``` ## restrictions.addDisallowedListForAccount14+ addDisallowedListForAccount(admin: Want, feature: string, list: Array\, accountId: number): void Adds a list of applications that are not allowed to use a feature for a specified user. **Required permissions**: ohos.permission.ENTERPRISE_MANAGE_RESTRICTIONS **System capability**: SystemCapability.Customization.EnterpriseDeviceManager **Parameters** | Name | Type | Mandatory| Description | | -------- | ------------------------------------------------------- | ---- | ------------------------------------------------------------ | | admin | [Want](../apis-ability-kit/js-apis-app-ability-want.md) | Yes | EnterpriseAdminExtensionAbility. | | feature | string | Yes | Feature to set.
- **snapshotSkip**: screen snapshot capability.| | list | Array\ | Yes | List of content such as the bundle names. | | accountId | number | Yes | User ID, which must be greater than or equal to 0.
You can call [getOsAccountLocalId](../apis-basic-services-kit/js-apis-osAccount.md#getosaccountlocalid9) to obtain the user ID.| **Error codes** For details about the error codes, see [Enterprise Device Management Error Codes](errorcode-enterpriseDeviceManager.md) and [Universal Error Codes](../errorcode-universal.md). | ID| Error Message | | -------- | ------------------------------------------------------------ | | 9200001 | The application is not an administrator application of the device. | | 9200002 | The administrator application does not have permission to manage the device. | | | 201 | Permission verification failed. The application does not have the permission required to call the API. | | 401 | Parameter error. Possible causes: 1. Mandatory parameters are left unspecified; 2. Incorrect parameter types; 3. Parameter verification failed. | **Example** ```ts import { Want } from '@kit.AbilityKit'; let wantTemp: Want = { bundleName: 'com.example.myapplication', abilityName: 'EntryAbility', }; let valueList:Array = ["com.xx.aa.", "com.xx.bb"]; try { restrictions.addDisallowedListForAccount(wantTemp, 'snapshotSkip', valueList, 100); console.info('Succeeded in adding disallowed snapshotSkip feature'); } catch (err) { console.error(`Failed to add disallowed snapshotSkip feature. Code is ${err.code}, message is ${err.message}`); } ``` ## restrictions.removeDisallowedListForAccount14+ removeDisallowedListForAccount(admin: Want, feature: string, list: Array\, accountId: number): void Removes the list of applications that are not allowed to use a feature for a specified user. **Required permissions**: ohos.permission.ENTERPRISE_MANAGE_RESTRICTIONS **System capability**: SystemCapability.Customization.EnterpriseDeviceManager **Parameters** | Name | Type | Mandatory| Description | | -------- | ------------------------------------------------------- | ---- | ------------------------------------------------------------ | | admin | [Want](../apis-ability-kit/js-apis-app-ability-want.md) | Yes | EnterpriseAdminExtensionAbility. | | feature | string | Yes | Feature to set.
- **snapshotSkip**: screen snapshot capability.| | list | Array\ | Yes | List of content such as the bundle names. | | accountId | number | Yes | User ID, which must be greater than or equal to 0.
You can call [getOsAccountLocalId](../apis-basic-services-kit/js-apis-osAccount.md#getosaccountlocalid9) to obtain the user ID.| **Error codes** For details about the error codes, see [Enterprise Device Management Error Codes](errorcode-enterpriseDeviceManager.md) and [Universal Error Codes](../errorcode-universal.md). | ID| Error Message | | -------- | ------------------------------------------------------------ | | 9200001 | The application is not an administrator application of the device. | | 9200002 | The administrator application does not have permission to manage the device. | | | 201 | Permission verification failed. The application does not have the permission required to call the API. | | 401 | Parameter error. Possible causes: 1. Mandatory parameters are left unspecified; 2. Incorrect parameter types; 3. Parameter verification failed. | **Example** ```ts import { Want } from '@kit.AbilityKit'; let wantTemp: Want = { bundleName: 'com.example.myapplication', abilityName: 'EntryAbility', }; let valueList:Array = ["com.xx.aa.", "com.xx.bb"]; try { restrictions.removeDisallowedListForAccount(wantTemp, 'snapshotSkip', valueList, 100); console.info('Succeeded in removing disallowed snapshotSkip feature'); } catch (err) { console.error(`Failed to remove disallowed snapshotSkip feature. Code is ${err.code}, message is ${err.message}`); } ``` ## restrictions.getDisallowedListForAccount14+ getDisallowedListForAccount(admin: Want, feature: string, accountId: number): Array\ Obtains the list of applications that are not allowed to use a feature for a specified user. **Required permissions**: ohos.permission.ENTERPRISE_MANAGE_RESTRICTIONS **System capability**: SystemCapability.Customization.EnterpriseDeviceManager **Parameters** | Name | Type | Mandatory| Description | | ------- | ------------------------------------------------------- | ---- | ------------------------------------------------------------ | | admin | [Want](../apis-ability-kit/js-apis-app-ability-want.md) | Yes | EnterpriseAdminExtensionAbility. | | feature | string | Yes | Feature to set.
- **snapshotSkip**: screen snapshot capability.| | accountId | number | Yes | User ID, which must be greater than or equal to 0.
You can call [getOsAccountLocalId](../apis-basic-services-kit/js-apis-osAccount.md#getosaccountlocalid9) to obtain the user ID.| **Return value** | Type | Description | | ------- | ------------------------------------------------------------ | | Array\ | List of applications that have been added by the user and for which a certain feature is disabled.| **Error codes** For details about the error codes, see [Enterprise Device Management Error Codes](errorcode-enterpriseDeviceManager.md) and [Universal Error Codes](../errorcode-universal.md). | ID| Error Message | | -------- | ------------------------------------------------------------ | | 9200001 | The application is not an administrator application of the device. | | 9200002 | The administrator application does not have permission to manage the device. | | 201 | Permission verification failed. The application does not have the permission required to call the API. | | 401 | Parameter error. Possible causes: 1. Mandatory parameters are left unspecified; 2. Incorrect parameter types; 3. Parameter verification failed. | **Example** ```ts import { Want } from '@kit.AbilityKit'; let wantTemp: Want = { bundleName: 'com.example.myapplication', abilityName: 'EntryAbility', }; try { let result: Array = restrictions.getDisallowedListForAccount(wantTemp, 'snapshotSkip', 100); console.info('Succeeded in querying disallowed list for account'); } catch (err) { console.error(`Failed to query disallowed list for account. Code is ${err.code}, message is ${err.message}`); } ``` ## restrictions.setUserRestriction20+ setUserRestriction(admin: Want, settingsItem: string, restricted: boolean): void Sets restrictions on user behaviors. **Required permissions**: ohos.permission.ENTERPRISE_SET_USER_RESTRICTION **System capability**: SystemCapability.Customization.EnterpriseDeviceManager **Parameters** | Name | Type | Mandatory| Description | | -------- | ------------------------------------------------------- | ---- | ------------------------------------------------------------ | | admin | [Want](../apis-ability-kit/js-apis-app-ability-want.md) | Yes | EnterpriseAdminExtensionAbility. | | settingsItem | string | Yes | User behavior.
- **setApn**: setting APN. Currently, only mobile phones and tablets are supported.
- **powerLongPress**: long-pressing the power button to open the power menu. Currently, only mobile phones and tablets are supported.| | restricted | boolean | Yes | Whether to restrict the user behavior. The value **true** means to restrict the user behavior; the value **false** means the opposite. | **Error codes** For details about the error codes, see [Enterprise Device Management Error Codes](errorcode-enterpriseDeviceManager.md) and [Universal Error Codes](../errorcode-universal.md). | ID| Error Message | | -------- | ------------------------------------------------------------ | | 9200001 | The application is not an administrator application of the device. | | 9200002 | The administrator application does not have permission to manage the device. | | | 201 | Permission verification failed. The application does not have the permission required to call the API. | **Example** ```ts import { Want } from '@kit.AbilityKit'; import { restrictions } from '@kit.MDMKit'; let wantTemp: Want = { bundleName: 'com.example.myapplication', abilityName: 'EntryAbility', }; try { restrictions.setUserRestriction(wantTemp, 'setApn', true); console.info('Succeeded in restricting from setting apn'); } catch (err) { console.error(`Failed to restrict from setting apn. Code is ${err.code}, message is ${err.message}`); } ```