1# system_grant Permissions for System Applications That Cannot Be Requested via ACL 2 3<!--Kit: Ability Kit--> 4<!--Subsystem: Security--> 5<!--Owner: @xia-bubai--> 6<!--SE: @linshuqing; @hehehe-li--> 7<!--TSE: @leiyuqian--> 8 9Before requesting permissions for your application, read and understand the [permission request paths](determine-application-mode.md) and this topic to determine the permissions required. 10 11> **NOTE** 12> 13> - The permissions listed in this topic are available to system_basic or system_core applications, but not to normal applications. 14> - The authorization mode of these permissions is system_grant. 15> - These permissions cannot be requested via access control list (ACL). 16 17For details about the process for requesting the permissions, see [Workflow for Requesting Permissions](determine-application-mode.md). 18 19## ohos.permission.RECEIVER_STARTUP_COMPLETED 20 21Allows an application to subscribe to the startup broadcast. 22 23**Permission level**: system_basic 24 25**Authorization mode**: system_grant 26 27**Enable via ACL**: false 28 29**Valid since**: 9 30 31## ohos.permission.SYSTEM_LIGHT_CONTROL 32 33Allows an application to control lights, including turning on and off lights. 34 35**Permission level**: system_basic 36 37**Authorization mode**: system_grant 38 39**Enable via ACL**: false 40 41**Valid since**: 11 42 43## ohos.permission.GET_ALL_APP_ACCOUNTS 44 45Allows an application to obtain information about all application accounts. 46 47**Permission level**: system_core 48 49**Authorization mode**: system_grant 50 51**Enable via ACL**: false 52 53**Valid since**: 7 54 55## ohos.permission.MANAGE_DEVICE_AUTH_CRED 56 57Allows an application to call interfaces of the DeviceAuthCredMgr application. 58 59**Permission level**: system_basic 60 61**Authorization mode**: system_grant 62 63**Enable via ACL**: false 64 65**Valid since**: 10 66 67## ohos.permission.ACCESS_AUTH_RESPOOL 68 69Allows an SA to register the executor. 70 71**Permission level**: system_core 72 73**Authorization mode**: system_grant 74 75**Enable via ACL**: false 76 77**Valid since**: 9 78 79## ohos.permission.READ_ACCESSIBILITY_CONFIG 80 81Allows an application to read the accessibility configuration. 82 83**Permission level**: system_basic 84 85**Authorization mode**: system_grant 86 87**Enable via ACL**: false 88 89**Valid since**: 9 90 91## ohos.permission.WRITE_APP_PUSH_DATA 92 93Allows the push service to write data to an application. 94 95**Permission level**: system_basic 96 97**Authorization mode**: system_grant 98 99**Enable via ACL**: false 100 101**Valid since**: 10 102 103## ohos.permission.READ_APP_PUSH_DATA 104 105Allows the push service to read data from an application. 106 107**Permission level**: system_basic 108 109**Authorization mode**: system_grant 110 111**Enable via ACL**: false 112 113**Valid since**: 10 114 115## ohos.permission.NETSYS_INTERNAL 116 117Allows an SA to call the network diagnosis, Wi-Fi, network adapter listening, and iptables setting APIs of **netsys**. 118 119**Permission level**: system_basic 120 121**Authorization mode**: system_grant 122 123**Enable via ACL**: false 124 125**Valid since**: 10 126 127## ohos.permission.DISTRIBUTED_SOFTBUS_CENTER 128 129Allows networking between different devices. 130 131**Permission level**: system_basic 132 133**Authorization mode**: system_grant 134 135**Enable via ACL**: false 136 137**Valid since**: 9 138 139## ohos.permission.RESTRICT_APPLICATION_ACTIVE 140 141Allows a standby component to publish a customized network limit event. 142 143**Permission level**: system_basic 144 145**Authorization mode**: system_grant 146 147**Enable via ACL**: false 148 149**Valid since**: 10 150 151## ohos.permission.CONNECT_CELLULAR_CALL_SERVICE 152 153Allows a system service to access the cellular call SA. 154 155**Permission level**: system_basic 156 157**Authorization mode**: system_grant 158 159**Enable via ACL**: false 160 161**Valid since**: 10 162 163## ohos.permission.CONNECT_IMS_SERVICE 164 165Allows a system service to access the IMS SA. 166 167**Permission level**: system_basic 168 169**Authorization mode**: system_grant 170 171**Enable via ACL**: false 172 173**Valid since**: 10 174 175## ohos.permission.ENFORCE_USER_IDM 176 177Allows an SA to delete the IAM user information without a token. 178 179**Permission level**: system_core 180 181**Authorization mode**: system_grant 182 183**Enable via ACL**: false 184 185**Valid since**: 9 186 187## ohos.permission.WRITE_ACCESSIBILITY_CONFIG 188 189Allows an application to set the accessibility configuration. 190 191**Permission level**: system_basic 192 193**Authorization mode**: system_grant 194 195**Enable via ACL**: false 196 197**Valid since**: 9 198 199## ohos.permission.ENABLE_DISTRIBUTED_HARDWARE 200 201Allows a system service to enable distributed hardware resources. 202 203**Permission level**: system_basic 204 205**Authorization mode**: system_grant 206 207**Enable via ACL**: false 208 209**Valid since**: 11 210 211## ohos.permission.ACCESS_SUPER_HUB 212 213Allows an application to access Super Hub. 214 215**Permission level**: system_basic 216 217**Authorization mode**: system_grant 218 219**Enable via ACL**: false 220 221**Valid since**: 12 222 223## ohos.permission.CALLED_UIEXTENSION_ON_LOCK_SCREEN 224 225Allows a UIExtensionAbility to be displayed on the locked screen. 226 227**Permission level**: system_core 228 229**Authorization mode**: system_grant 230 231**Enable via ACL**: false 232 233**Valid since**: 14 234 235## ohos.permission.USE_USER_ACCESS_MANAGER 236 237Allows an application to query and configure user identity authentication policies, and verify the authentication result. 238 239**Permission level**: system_basic 240 241**Authorization mode**: system_grant 242 243**Enable via ACL**: false 244 245**Valid since**: 18 246 247## ohos.permission.SET_LAUNCH_REASON_MESSAGE 248 249Allows a system application to set the launch reason when starting another application. 250 251**Permission level**: system_basic 252 253**Authorization mode**: system_grant 254 255**Enable via ACL**: false 256 257**Valid since**: 18 258 259## ohos.permission.ACCESS_USER_ACCOUNT_INFO 260 261Allows a system application to access user account information. 262 263**Permission level**: system_basic 264 265**Authorization mode**: system_grant 266 267**Enable via ACL**: false 268 269**Valid since**: 18 270