Skip to content

bus/accessibility/own

Allow owning a name on DBus public bus

Warning

Do not use it manually, It is automatically included in a profile by the aa:dbus own directive.

bus/session/com.canonical.AppMenu.Registrar

Allow access for connecting to/communication with the appmenu

bus/session/com.canonical.Unity.LauncherEntry

Access required for connecting to/communicating with the Unity Launcher

bus/session/com.canonical.dbusmenu

Dbus menu

bus/session/io.snapcraft.Launcher

Allow use of snapd's internal xdg-open

bus/session/io.snapcraft.PrivilegedDesktopLauncher

Can identify and launch other snaps.

bus/session/io.snapcraft.Settings

Allow use of snapd's internal 'xdg-settings'

bus/session/org.freedesktop.IBus.Portal

Allow access to the IBus portal

bus/session/org.freedesktop.ScreenSaver

Allow checking status, activating and locking the screensaver

bus/session/org.freedesktop.Secret

Provide full access to the secret-service API:

The secret-service allows managing (add/delete/lock/etc) collections and (add/delete/etc) items within collections. The API also has the concept of aliases for collections which is typically used to access the default collection. While it would be possible for an application developer to use a snap-specific collection and mediate by object path, application developers are meant to instead to treat collections (typically the default collection) as a database of key/value attributes each with an associated secret that applications may query. Because AppArmor does not mediate member data, typical and recommended usage of the API does not allow for application isolation. For details, see:

bus/session/org.freedesktop.portal.NetworkMonitor

Allow access to xdg-desktop-portal NetworkMonitor methods and signals

bus/session/org.freedesktop.systemd1

Allow managing systemd user units services. This allow full control over all services. When possible use the systemctl directive instead.

bus/session/org.gnome.Mutter.IdleMonitor

Allow to get the current idle time

bus/session/org.gnome.ScreenSaver

Allow checking status, activating and locking the screensaver (GNOME version)

bus/session/org.gnome.SessionManager

Allow registering a client with the session manager. This is needed for applications that want to be notified of session events, such as shutdown or logout, and to be able to inhibit those actions.

bus/session/org.gnome.SettingsDaemon.MediaKeys

Allow requesting interest in receiving media key events. This tells Gnome settings that our application should be notified when key events we are interested in are pressed, and allows us to receive those events.

bus/session/org.gnome.keyring.internal.Prompter

Allow accessing the GNOME crypto services prompt APIs as used by applications using libgcr (such as pinentry-gnome3) for secure pin entry to unlock GPG keys etc. See: https://developer.gnome.org/gcr/unstable/GcrPrompt.html https://developer.gnome.org/gcr/unstable/GcrSecretExchange.html https://github.com/snapcore/snapd/pull/7673#issuecomment-592229711

bus/session/org.gtk.vfs.Daemon

Each daemon (main and for mounts) implement this.

bus/session/org.gtk.vfs.MountTracker

The mount tracking interface. Allows to lookup mounts by ID and list mountable info. Allow to receive mount/umount signals from the mount tracker (gvfsd).

bus/session/org.kde.StatusNotifierWatcher

Allow to display Status Notifier Items in the KDE Plasma systray (including supporting context menu)

bus/session/own

Allow owning a name on DBus public bus

Warning

Do not use it manually, It is automatically included in a profile by the aa:dbus own directive.

bus/system/org.freedesktop.Avahi.AddressResolver

Avahi Address resolving

bus/system/org.freedesktop.Avahi.DomainBrowser

Domain browsing

bus/system/org.freedesktop.Avahi.HostNameResolver

Hostname resolving

bus/system/org.freedesktop.Avahi.RecordBrowser

Record browsing

bus/system/org.freedesktop.Avahi.ServiceResolver

Service resolving

bus/system/org.freedesktop.Avahi.ServiceTypeBrowser

Service type browsing

bus/system/org.freedesktop.ColorManager

Allow for color managed applications to communicate with colord

bus/system/org.freedesktop.NetworkManager

Allows observing NetworkManager settings. It grants access to listing MAC addresses, previous networks, etc but not secrets.

bus/system/org.freedesktop.PackageKit

Allow communication with PackageKit transactions. Transactions are exported with random object paths that currently take the form /@{int}_@{hex8}.

bus/system/org.freedesktop.PolicyKit1

Can talk to polkitd's CheckAuthorization API

bus/system/org.freedesktop.RealtimeKit1

Allow setting realtime priorities.

bus/system/org.freedesktop.UPower

Can query UPower for power devices, history and statistics.

bus/system/org.freedesktop.login1

Allow seting up login session & seat. It grants privileged access to user sessions.

bus/system/org.freedesktop.systemd1

Allow managing systemd units services. This allow full control over all services. When possible use the systemctl directive instead.

bus/system/org.freedesktop.systemd1.Manager

libnss-systemd (D-Bus portion from nameservice abstraction)

Also allow lookups for systemd-exec's DynamicUsers via D-Bus https://www.freedesktop.org/software/systemd/man/systemd.exec.html

bus/system/own

Allow owning a name on DBus public bus

Warning

Do not use it manually, It is automatically included in a profile by the aa:dbus own directive.