• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1# system_grant Permissions for System Applications That Cannot Be Requested via ACL
2
3<!--Kit: Ability Kit-->
4<!--Subsystem: Security-->
5<!--Owner: @xia-bubai-->
6<!--SE: @linshuqing; @hehehe-li-->
7<!--TSE: @leiyuqian-->
8
9Before requesting permissions for your application, read and understand the [permission request paths](determine-application-mode.md) and this topic to determine the permissions required.
10
11> **NOTE**
12>
13> - The permissions listed in this topic are available to system_basic or system_core applications, but not to normal applications.
14> - The authorization mode of these permissions is system_grant.
15> - These permissions cannot be requested via access control list (ACL).
16
17For details about the process for requesting the permissions, see [Workflow for Requesting Permissions](determine-application-mode.md).
18
19## ohos.permission.RECEIVER_STARTUP_COMPLETED
20
21Allows an application to subscribe to the startup broadcast.
22
23**Permission level**: system_basic
24
25**Authorization mode**: system_grant
26
27**Enable via ACL**: false
28
29**Valid since**: 9
30
31## ohos.permission.SYSTEM_LIGHT_CONTROL
32
33Allows an application to control lights, including turning on and off lights.
34
35**Permission level**: system_basic
36
37**Authorization mode**: system_grant
38
39**Enable via ACL**: false
40
41**Valid since**: 11
42
43## ohos.permission.GET_ALL_APP_ACCOUNTS
44
45Allows an application to obtain information about all application accounts.
46
47**Permission level**: system_core
48
49**Authorization mode**: system_grant
50
51**Enable via ACL**: false
52
53**Valid since**: 7
54
55## ohos.permission.MANAGE_DEVICE_AUTH_CRED
56
57Allows an application to call interfaces of the DeviceAuthCredMgr application.
58
59**Permission level**: system_basic
60
61**Authorization mode**: system_grant
62
63**Enable via ACL**: false
64
65**Valid since**: 10
66
67## ohos.permission.ACCESS_AUTH_RESPOOL
68
69Allows an SA to register the executor.
70
71**Permission level**: system_core
72
73**Authorization mode**: system_grant
74
75**Enable via ACL**: false
76
77**Valid since**: 9
78
79## ohos.permission.READ_ACCESSIBILITY_CONFIG
80
81Allows an application to read the accessibility configuration.
82
83**Permission level**: system_basic
84
85**Authorization mode**: system_grant
86
87**Enable via ACL**: false
88
89**Valid since**: 9
90
91## ohos.permission.WRITE_APP_PUSH_DATA
92
93Allows the push service to write data to an application.
94
95**Permission level**: system_basic
96
97**Authorization mode**: system_grant
98
99**Enable via ACL**: false
100
101**Valid since**: 10
102
103## ohos.permission.READ_APP_PUSH_DATA
104
105Allows the push service to read data from an application.
106
107**Permission level**: system_basic
108
109**Authorization mode**: system_grant
110
111**Enable via ACL**: false
112
113**Valid since**: 10
114
115## ohos.permission.NETSYS_INTERNAL
116
117Allows an SA to call the network diagnosis, Wi-Fi, network adapter listening, and iptables setting APIs of **netsys**.
118
119**Permission level**: system_basic
120
121**Authorization mode**: system_grant
122
123**Enable via ACL**: false
124
125**Valid since**: 10
126
127## ohos.permission.DISTRIBUTED_SOFTBUS_CENTER
128
129Allows networking between different devices.
130
131**Permission level**: system_basic
132
133**Authorization mode**: system_grant
134
135**Enable via ACL**: false
136
137**Valid since**: 9
138
139## ohos.permission.RESTRICT_APPLICATION_ACTIVE
140
141Allows a standby component to publish a customized network limit event.
142
143**Permission level**: system_basic
144
145**Authorization mode**: system_grant
146
147**Enable via ACL**: false
148
149**Valid since**: 10
150
151## ohos.permission.CONNECT_CELLULAR_CALL_SERVICE
152
153Allows a system service to access the cellular call SA.
154
155**Permission level**: system_basic
156
157**Authorization mode**: system_grant
158
159**Enable via ACL**: false
160
161**Valid since**: 10
162
163## ohos.permission.CONNECT_IMS_SERVICE
164
165Allows a system service to access the IMS SA.
166
167**Permission level**: system_basic
168
169**Authorization mode**: system_grant
170
171**Enable via ACL**: false
172
173**Valid since**: 10
174
175## ohos.permission.ENFORCE_USER_IDM
176
177Allows an SA to delete the IAM user information without a token.
178
179**Permission level**: system_core
180
181**Authorization mode**: system_grant
182
183**Enable via ACL**: false
184
185**Valid since**: 9
186
187## ohos.permission.WRITE_ACCESSIBILITY_CONFIG
188
189Allows an application to set the accessibility configuration.
190
191**Permission level**: system_basic
192
193**Authorization mode**: system_grant
194
195**Enable via ACL**: false
196
197**Valid since**: 9
198
199## ohos.permission.ENABLE_DISTRIBUTED_HARDWARE
200
201Allows a system service to enable distributed hardware resources.
202
203**Permission level**: system_basic
204
205**Authorization mode**: system_grant
206
207**Enable via ACL**: false
208
209**Valid since**: 11
210
211## ohos.permission.ACCESS_SUPER_HUB
212
213Allows an application to access Super Hub.
214
215**Permission level**: system_basic
216
217**Authorization mode**: system_grant
218
219**Enable via ACL**: false
220
221**Valid since**: 12
222
223## ohos.permission.CALLED_UIEXTENSION_ON_LOCK_SCREEN
224
225Allows a UIExtensionAbility to be displayed on the locked screen.
226
227**Permission level**: system_core
228
229**Authorization mode**: system_grant
230
231**Enable via ACL**: false
232
233**Valid since**: 14
234
235## ohos.permission.USE_USER_ACCESS_MANAGER
236
237Allows an application to query and configure user identity authentication policies, and verify the authentication result.
238
239**Permission level**: system_basic
240
241**Authorization mode**: system_grant
242
243**Enable via ACL**: false
244
245**Valid since**: 18
246
247## ohos.permission.SET_LAUNCH_REASON_MESSAGE
248
249Allows a system application to set the launch reason when starting another application.
250
251**Permission level**: system_basic
252
253**Authorization mode**: system_grant
254
255**Enable via ACL**: false
256
257**Valid since**: 18
258
259## ohos.permission.ACCESS_USER_ACCOUNT_INFO
260
261Allows a system application to access user account information.
262
263**Permission level**: system_basic
264
265**Authorization mode**: system_grant
266
267**Enable via ACL**: false
268
269**Valid since**: 18
270