Red Hat Enterprise Linux 8 Show
Configuring and customizing the GNOME 3 desktop environment on RHEL 8Abstract This document describes how to customize and use GNOME 3, which is the only desktop environment available in RHEL 8. The basics of using GNOME Shell and displaying the graphics are given, as well as the instructions for system administrators for configuring GNOME on a low level and customizing the desktop environment for multiple users. The documentation also describes how to handle selected system administration tasks using the desktop environment. Making open source more inclusiveRed Hat is committed to replacing problematic language in our code, documentation, and web properties. We are beginning with these four terms: master, slave, blacklist, and whitelist. Because of the enormity of this endeavor, these changes will be implemented gradually over several upcoming releases. For more details, see our CTO Chris Wright’s message. Providing feedback on Red Hat documentationWe appreciate your feedback on our documentation. Let us know how we can improve it. Submitting comments on specific passages
Submitting feedback through Bugzilla (account required)
Chapter 1. Getting started with GNOME1.1. What GNOME 3 isRed Hat Enterprise Linux 8 is shipped with the default desktop environment GNOME 3. GNOME 3 represents a presentation layer that provides a graphical user interface as well as the focused working environment, which enables you to access all your work from one place. 1.2. GNOME environments, back ends, and display protocolsGNOME 3 provides two user environments:
Both environments can use two different protocols as their graphical back ends:
The default combination in RHEL 8 is GNOME Standard environment using GNOME Shell on Wayland as the display server. However, due to certain Wayland limitations, you might want to switch the graphics protocol stack to X11. You may also want to switch from GNOME Standard to GNOME Classic. Additional resources
1.3. Launching applications in GNOMEThis section describes various approaches that you can use to launch available applications in GNOME 3. 1.3.1. Launching an application in GNOME StandardThis procedure launches a graphical application in the GNOME Standard user environment. Prerequisites
Procedure
1.3.2. Launching an application in GNOME ClassicThis procedure launches a graphical application in the GNOME Classic user environment. Prerequisites
Procedure
1.3.3. Launching an application in GNOME using a commandThis procedure launches a graphical application in GNOME by entering a command. Prerequisites
Procedure
1.4. Managing desktop iconsYou can enable the desktop icons functionality and move files to the desktop. 1.4.1. Desktop icons in RHEL 8 In RHEL 8, the Files application no
longer provides the desktop icons functionality. Instead, desktop icons are provided by the Desktop icons GNOME Shell extension, which is available from the Desktop icons in GNOME Classic The GNOME Classic environment includes the Desktop icons in GNOME Standard In GNOME Standard, desktop icons are disabled by default. If you have only the GNOME Standard environment available, and not GNOME Classic, you must install the 1.4.2. Enabling desktop icons in GNOME StandardThis procedure enables the desktop icons functionality in the GNOME Standard environment. Procedure
1.4.3. Creating a desktop icon for a fileThis procedure creates a desktop icon for an existing file. Prerequisites
Procedure
Verification steps
1.5. Disabling the hot corner functionality on GNOME ShellThe GNOME environment provides the hot corner functionality, which is enabled by default. This means that when you move the cursor to the area of the upper-left corner and push the cursor to the screen corner, the Activities Overview menu opens automatically. However, you may want to disable this feature to not open Activities Overview unintentionally. To do so, you can use the following tools:
The selection of the tool might depend on whether you want to disable the hot corner functionality for a single user or for all users on the system. By using dconf Editor or gsettings, you can disable hot corner only for a single user. To disable hot corner system-wide, use the No topleft hot corner extension. 1.5.1. Disabling the hot corner functionality for a single userTo disable the hot corner functionality for a single user, you can use either the dconf Editor application or the gsettings command-line utility. 1.5.1.1. Disabling hot corner using dconf EditorTo disable the hot corner functionality using the dconf Editor application, follow this procedure. This procedure disables the hot corner functionality for a single user. Prerequisites
Procedure
1.5.1.2. Disabling hot corner using gsettingsTo disable the hot corner functionality using the gsettings command-line utility, follow this procedure. This procedure disables the hot corner functionality for a single user. Procedure
Verification steps
1.5.2. Disabling the hot corner functionality for all users With the GNOME
Shell extension called No topleft hot corner provided by the Prerequisites
Procedure
1.6. Configuring sound in GNOMEYou can configure sound volume and other sound options in GNOME. 1.6.1. Sound configuration tools in GNOME In RHEL 8, the PulseAudio sound server handles sound output and input. PulseAudio lets programs output the audio using the To configure sound, you can use one of the following graphical applications in GNOME: System menu The system menu is located in the top-right screen corner. It enables you only to set the intensity of the sound output or sound input through the sound bar. The sound bar for input sound is available only if you are running an application that is using an internal microphone (built-in audio), such as some teleconference tools.
GNOME Control Center The GNOME Control Center (Settings) application provides other general options to configure sound. Tweaks The Tweaks application enables you to configure only volume over-amplification.
Additional resources
1.6.2. Accessing sound configuration in GNOME Control CenterThis procedure opens the sound configuration screen in the GNOME Control Center application. Procedure
1.6.3. Sound options in GNOME Control CenterThrough the Sound menu in GNOME Control Center, you can configure the following sound options: Output and Input The Output and Input menus show only the built-in audio devices unless you connect any external device that can handle sound. The Output menu enables you to select the required profile from available analog or digital profiles that are displayed depending on available output devices. Sound Effects The Sound Effects menu sets the volume and theme of system audio alerts. Applications The Applications menu shows all currently running applications that can process sound, and allows you to amplify or lower the sound of a particular application.The Output tab on the sound configuration screen
1.7. Handling graphics and photosGNOME provides multiple tools to handle graphics and photography. You can check the available tools under the Graphics & Photography menu in GNOME Software. Procedure
1.8. Handling printingIn GNOME, you can set up printing using the Settings application. 1.8.1. Starting the Settings application for setting up printingProcedure
1.8.2. Adding a new printer in SettingsThis section describes how to add a new printer using the Settings application. Prerequisites
Procedure
1.8.3. Configuring a printer in the Settings applicationThis section describes how to configure a new printer, and how to maintain a configuration of a printer using the Settings application. Procedure
Displaying and modifying printer’s detailsProcedure
Setting the default printerProcedure
Removing a printerProcedure
1.8.4. Printing a test page in the Setting applicationThis section describes how to print a test page to make sure that the printer functions properly. You might want to print a test page if one of the below prerequisites is met. Prerequisites
Procedure
1.8.5. Setting print options using the Settings application
This section describes how to set print options using the Settings application. Procedure
1.9. Sharing media between applicationsRed Hat Enterprise Linux 8 includes the PipeWire media server, which ensures access to multimedia devices and media sharing between applications. When running a remote desktop session on GNOME Shell on Wayland, PipeWire and the VNC server is used. The functionality of remote desktop session is provided by the On X.Org, just VNC is needed to run a remote desktop
session. This functionality on X.Org is provided by the PipeWire is used also with teleconference tools such as BlueJeans when running on GNOME Shell on Wayland. In such case, the To check the status of the ~]$ systemctl --user status pipewire 1.10. Customizing GNOME Shell environment with the Tweaks toolYou can customize the GNOME Shell environment for a particular user by using the Tweaks tool. Procedure
Chapter 2. Overview of GNOME environmentsYou can switch between several user interfaces in GNOME. Additionally, GNOME can run on several different graphics back ends. 2.1. GNOME environments, back ends, and display protocolsGNOME 3 provides two user environments:
Both environments can use two different protocols as their graphical back ends:
The default combination in RHEL 8 is GNOME Standard environment using GNOME Shell on Wayland as the display server. However, due to certain Wayland limitations, you might want to switch the graphics protocol stack to X11. You may also want to switch from GNOME Standard to GNOME Classic. Additional resources
2.2. GNOME StandardGNOME Standard user interface includes these major components: Top bar The horizontal bar at the top of the screen provides access to some of the basic functions of GNOME Standard, such as the Activities Overview, clock and calendar, system status icons, and the system menu. System menu The system menu is located in the top right corner, and enables you:
The Activities Overview features windows and applications views that let the user run applications and windows and switch between them. The search entry at the top allows for searching various items available on the desktop, including applications, documents, files, and configuration tools. The vertical bar on the left side contains a list of favorite and running applications. You can add or remove applications from the default list of favorites according to your needs. The workspace list displayed on the right side allows the user to switch between multiple workspaces, or move applications and windows from one workspace to another. Message tray The message tray provides access to pending notifications. The message tray shows when the user presses Super+M.The GNOME 3 Standard Desktop
2.3. GNOME ClassicGNOME Classic represents a mode for users who prefer a more traditional desktop experience that is similar to GNOME 2 environment used with Red Hat Enterprise Linux 6. It is based on GNOME 3 technologies, and at the same time it includes multiple features similar to GNOME 2. GNOME Classic user interface consists of these major components: Applications and Places The Applications menu is displayed at the top left of the screen. It gives the user access to applications organized into categories. If you enable window overview, you can also open the Activities Overview from that menu. The Places menu is displayed next to the Applications menu on the top bar. It gives the user quick access to important folders, for example Downloads or Pictures. TaskbarThe taskbar is displayed at the bottom of the screen, and features:
The system menu is located in the top right corner, and enables the following actions:
The GNOME 3 Classic desktop with the Rhythmbox application and the Favorites submenu of the Applications menu
In GNOME Classic, the overview of windows that are open is not available by default. You can see the list of all open windows in the taskbar at the bottom of the screen. However, you can enable the windows overview similar to what is by default available in GNOME Standard by changing the default settings of the GNOME Classic environment as described in Section 2.4, “Enabling window overview in GNOME Classic”. 2.4. Enabling window overview in GNOME ClassicIn GNOME Classic, the overview of open windows is not available by default. This procedure enables the window overview for all users on the system. Enabling the window overview by this procedure is not a permanent change. Each update of the To keep the window overview enabled, apply the procedure after each update of Procedure
Verification steps
2.5. Graphics back ends in RHEL 8In RHEL 8, you can choose between two protocols to build a graphical user interface: X11 The X11 protocol uses X.Org as the display server. Displaying graphics based on this protocol works the same way as in RHEL 7, where this was the only option. Wayland The Wayland protocol on RHEL 8 uses GNOME Shell as its compositor and display server, which is further referred as GNOME Shell on Wayland. Displaying graphics based on the Wayland protocol has some differences and limitation compared to X11. New installations of RHEL 8 automatically select GNOME Shell on Wayland. However, you can switch to X.Org, or select the required combination of GNOME environment and display server as described in Section 2.8, “Selecting GNOME environment and display protocol”. Note that there are also a few environments where X.Org is preferred over GNOME Shell on Wayland, such as:
The Nvidia graphics by default use Additional resources
2.6. Key differences between the Wayland and X11 protocolX11 applications Client applications need to be ported to the Wayland protocol or use a graphical toolkit that has a Wayland backend, such as GTK, to be able to work natively with the compositor and display server based on Wayland. Legacy X11 applications that cannot be ported to Wayland automatically use Xwayland as a proxy between the X11 legacy clients and the Wayland compositor. Xwayland functions both as an X11 server and a Wayland client. The role of Xwayland is to translate the X11 protocol into the Wayland protocol and reversely, so that X11 legacy applications can work with the display server based on Wayland. On GNOME Shell on Wayland, Xwayland is started automatically at startup, which ensures that most X11 legacy applications work as expected when using GNOME Shell on Wayland. However, the X11 and Wayland protocols are different, and hence some clients relying on X11-specific features may behave differently under Xwayland. For such specific clients, you can switch to the X.Org display server as described in Section 2.8, “Selecting GNOME environment and display protocol”. libinput Red Hat Enterprise Linux 8 uses a new unified input stack, GNOME Shell on Wayland uses Mice, touchscreens, trackballs, pointing sticks Red Hat Enterprise Linux 8 uses the X.Org Gestures GNOME Shell on Wayland supports new touchpad and touchscreen gestures. These gestures include:
2.7. Current Wayland limitations
Nvidia drivers Proprietary Nvidia binary drivers are not supported with GNOME Shell on Wayland. To avoid any complications while using the Nvidia GPU, GNOME Shell automatically falls back to X.Org, which means that the login screen does not provide any option based on the Wayland protocol.
The Remote desktop With GNOME Shell on Wayland, VNC support is provided by the For more advanced VNC usage, you need to switch to X.org, where traditional VNC tools are available. For more information, see Overview of GNOME environments . X Display Manager The X Display Manager Control Protocol (XDMCP) is not supported with GNOME Shell on Wayland. Hence, it is not possible to use the X display manager to start a session on the X.Org display server from the same or another computer. Additional limitations The following additional limitations related to the Wayland protocol should be noted:
Additional resources
2.8. Selecting GNOME environment and display protocolThe default desktop environment for Red Hat Enterprise Linux 8 is GNOME Standard with GNOME Shell on Wayland as the display server. However, due to certain limitations of Wayland, you might want to switch the graphics protocol stack. You might also want to switch from GNOME Standard to GNOME Classic. Procedure
The change of GNOME environment and graphics protocol stack resulting from the above procedure is persistent across user logouts, and also when powering off or rebooting the computer. Chapter 3. Installing applications in GNOMEThis section describes various approaches that you can use to install a new application in GNOME 3. Prerequisites
3.1. The GNOME Software applicationGNOME Software is an utility that enables you to install and update applications, software components, and GNOME Shell extensions in a graphical interface. GNOME Software provides a
catalog of graphical applications, which are the applications that include a GNOME Software uses the PackageKit and Flatpak technologies as its back ends. 3.2. Installing an application using GNOME SoftwareThis procedure installs a graphical application using the GNOME Software installer. Procedure
3.3. Installing an application to open a file typeThis procedure installs an application that can open a given file type. Prerequisites
Procedure
3.4. Installing an RPM package in GNOMEThis procedure installs an RPM software package that you manually downloaded as a file. Procedure
3.5. Installing an application from the application search in GNOMEThis procedure installs a graphical application that you find in the GNOME application search. Procedure
3.6. Additional resources
Chapter 4. Registering the system for updates using GNOMEYou must register your system in order to get software updates for your system. This section explains how you can register your system using GNOME. Prerequisites
4.1. Registering a system using Red Hat account on GNOMEFollow the steps in this procedure to enroll your system with your Red Hat account. Prerequisites
Procedure
4.2. Registering a system using an activation key on GNOMEFollow the steps in this procedure to register your system with an activation key. You can get the activation key from your organization administrator. Prerequisites
Procedure
4.3. Unregistering the system using GNOMEFollow the steps in this procedure to unregister your system. After unregistering, your system no longer receives software updates. Procedure
4.4. Additional resources
Chapter 5. Accessing the desktop remotelyYou can connect to the desktop on a RHEL server from a remote client. 5.1. Remote desktop access optionsRHEL provides several options for remotely connecting to the desktop. Each option fits a different use case: Single-user access using GNOME tools This method enables remote access on the client and the server using graphical GNOME applications. It configures a Virtual Network Computing (VNC) session so that only a single user can connect to the desktop on the server at a given time. Depending on the session type, this method uses different components to implement screen sharing:
This method configures a VNC session so that multiple remote clients can connect to the server in parallel. You must first enable the VNC access on the client and the server using command-line tools. Any VNC client application can connect to a server configured using this method. Accessing a single application using X11 forwarding over SSHThis method executes an SSH command on the client that launches an individual graphical on the server. The application window opens on the client. This method is useful when you do not require a full remote desktop session. 5.2. Remotely accessing the desktop as a single userYou can remotely connect to the desktop on a RHEL server using graphical GNOME applications. Only a single user can connect to the desktop on the server at a given time. 5.2.1. Enabling desktop sharing on the server using GNOMEThis procedure configures a RHEL server to enable a remote desktop connection from a single client. Procedure
5.2.2. Connecting to a shared desktop using GNOME This procedure connects to a remote desktop session using the Remote Desktop Viewer application ( Prerequisites
Procedure
Verification steps
5.2.3. Disabling encryption in GNOME VNCYou can disable encryption in the GNOME remote desktop solution. This enables VNC clients that do not support the encryption to connect to the server. Procedure
5.3. Remotely accessing the desktop as multiple usersYou can remotely connect to the desktop on a RHEL server and open multiple sessions as different users at the same time. 5.3.1. The mapping of port and display numbers to users in VNCWith VNC, the client can connect to the desktop sessions of different users on the server. A display number and a TCP port number are attached to each server user that exports a VNC session. The client uses the port number to specify which server user it connects to. If several clients connect using the same port number, they all open a VNC session to the same server user. You must configure a mapping for each server user that exports a VNC session. For every such user, you must pick a unique port and display number. The recommended mapping Red Hat recommends that you start with port number 5902 and display number 2 for the first user, and increment the numbers by one for each additional server user. Port number 5900 and display number 0 represent the server user that is currently logged into the graphical session. You cannot start a VNC server for the user who is already logged into the graphical session. Table 5.1. Port and display number pairs
Red Hat recommends that you do not configure the Firewall rules You must open the selected ports in your firewall configuration. Allowing the 5.3.2. VNC server configuration filesSeveral configuration files affect the behavior of the VNC server. You can configure the user mapping and various global options. General options You can configure general options of the VNC server in
the option1=value option2 For example: session=gnome alwaysshared securitytypes=vncauth,tlsvnc desktop=sandbox geometry=2000x1200 The priority of configuration files The VNC server reads the following files for general options, in order from most important to least important:
User mapping You can configure the mapping between users and their associated port and display numbers in the :number=user For example: :2=test :3=vncuser
Additional resources
5.3.3. Enabling multi-user VNC access on the serverThis procedure configures a RHEL server so that multiple users can open VNC sessions on it at the same time. Prerequisites
Procedure
5.3.4. Connecting to the VNC server as multiple users This procedure connects to a remote desktop session using the Prerequisites
Procedure
5.4. Remotely accessing an individual applicationYou can remotely launch a graphical application on a RHEL server and use it from the remote client. 5.4.1. Enabling X11 forwarding on the serverThis procedure configures a RHEL server so that remote clients can use graphical applications on the server over SSH. Procedure
5.4.2. Launching an application remotely using X11 forwardingThis procedure accesses a graphical application on a RHEL server from a remote client using SSH. Prerequisites
Procedure
Chapter 6. Configuring GNOME at low level6.1. Introduction to configuring GNOMETo be able to configure the GNOME Desktop Environment, you need to understand these basic terms:
dconf has two different meanings. Firstly, dconf is a key-based Binary Large Object (BLOB) database for storing GNOME configurations. dconf manages user settings such as GDM, application, and proxy settings, and serves as the back end for GSettings. Secondly, dconf is a command-line utility which is used for reading and writing individual values or entire directories from and to a dconf database. GSettings is a high-level API for application settings which serves as the front end for dconf. gsettings is a command-line tool which is used to view and change user settings. 6.2. Managing user and system GNOME settingsdconf allows system administrators and users several levels of control over GNOME configuration:
6.3. Displaying GSettings values for desktop applicationsViewing and editing of the GSettings values can be achieved with one of the following tools:
The dconf-editor application and gsettings utility have the following in common:
The dconf-editor provides a GUI for browsing the settings and their editing. It presents the hierarchy of settings in a tree-view and also displays additional information about each setting, including the description, type and default value. The gsettings utility can be used to display and set dconf values. gsettings utility supports Bash completion for commands and settings. This tools also allows you to automate configuration in shell scripts. Figure 6.1. dconf-editor showing org.gnome.desktop.background GSettings keys Prerequisites
Procedure
$ gsettings get org.gnome.desktop.background picture-uri Additional resources
6.4. Using dconf profilesThe dconf system stores configuration in several different databases. You can configure dconf profiles, which specify the databases that dconf uses. 6.4.1. Introduction to dconf profilesA dconf profile is a list of system’s hardware and software configuration databases, which the dconf system collects. The dconf profiles allow you to compare identical systems to troubleshoot hardware or software problems. The dconf system stores its profiles in the text files which can be located either within the Note that key pairs which are set in a dconf profile override the default settings. 6.4.2. Selecting a dconf profile On startup, dconf consults the
Each line in a dconf profile specifies one dconf database. The first line indicates the database used to write changes. The remaining lines show read-only databases. The following is a sample profile stored in user-db:user system-db:local system-db:site In this example, the dconf profile specifies three databases. To apply a new dconf user profile to the user’s session, you need to log out and log in, because the dconf profile for a session is determined at login. As a user or application developer, do not manipulate dconf directly. To manipulate dconf, always use the dconf-editor or the gsettings utility. The only exception to use dconf directly is when setting system-wide default configurations, because the aforementioned tools do not allow to manipulate such configurations. 6.5. Configuring custom default valuesMachine-wide default settings can be set by providing a default for a key in a dconf profile. These defaults can be overridden by the user. Prerequisites
Procedure For example, to set the default background:
When the user profile is created or changed, the user needs to log out and log in again before the changes will be applied. Additional resources
6.6. Locking down specific settingsBy using the lockdown mode in dconf, you can prevent users from changing specific settings. Without enforcing the system settings using a lockdown, any settings that users make take precedence over the system settings. User can thus override the system settings with their own. Procedure To lock down a GSettings key:
Example 6.1. Locking the settings for the default wallpaper
6.7. Storing user settings over NFSFor dconf to work correctly when using Network File System (NFS) home directories, the dconf keyfile back end must be used. Note that dconf keyfile back end only works properly if the With Red Hat Enterprise Linux 8, To set the dconf keyfile back end:
The dconf keyfile back end takes effect the next time that the user logs in. It polls the keyfile to determine whether updates have been made, so settings may not be updated immediately. 6.8. Setting GSettings keys propertiesThis section describes how to set GSettings keys properties for a single-logged user. Each GSettings key can have only one value in a dconf database. Setting the same key to a different value at a different place of the dconf database overrides the previous value. Values of some keys are of array type. For array type, you can specify the value of the key as a list of multiple elements separated by a comma. To set a GSettings key of array type, follow this syntax: key=['option1', 'option2'] The following example shows setting of the Example settings of the org.gnome.desktop.input-sources.xkb-options GSettings Key [org/gnome/desktop/input-sources] # Enable Ctrl-Alt-Backspace for all users # Set the Right Alt key as the Compose key and enable it xkb-options=['terminate:ctrl_alt_bksp', 'compose:ralt'] 6.9. Working with GSettings keys on command line This section focuses on using of the 6.9.1. Setting key valueTo set a value of a key: gsettings set SCHEMA [:PATH] KEY Note that the value is specified as a serialised GVariant. Example 6.2. Adding selected applications into the favorite applications key To add selected applications among your favorite applications: $ gsettings set org.gnome.shell favorite-apps "['firefox.desktop', 'evolution.desktop', 'rhythmbox.desktop', 'shotwell.desktop', 'org.gnome.Nautilus.desktop', 'org.gnome.Software.desktop', 'yelp.desktop', 'org.gnome.Terminal.desktop', 'org.gnome.clocks.desktop']" If the operation succeeds, no return code is shown. As a result, all listed applications are added to favorite applications. The change is valid immediately. 6.9.2. Monitoring key changesTo monitor a key for changes and print values that changed: gsettings monitor SCHEMA [:PATH] [KEY] Note that if the KEY argument is not specified, all keys in the schema are monitored. Monitoring continues until the process is terminated. Example 6.3. Monitoring changes of the favorite applications key To monitor the changes of the In the first terminal: $ gsettings monitor org.gnome.shell favorite-apps In the second terminal: $ gsettings set org.gnome.shell favorite-apps "['firefox.desktop', 'evolution.desktop', 'rhythmbox.desktop', 'shotwell.desktop', 'org.gnome.Nautilus.desktop', 'org.gnome.Software.desktop', 'yelp.desktop', 'org.gnome.Terminal.desktop']" As a result, a notification whether and how favorite-apps: ['firefox.desktop', 'evolution.desktop', 'rhythmbox.desktop', 'shotwell.desktop', 'org.gnome.Nautilus.desktop', 'org.gnome.Software.desktop', 'yelp.desktop', 'org.gnome.Terminal.desktop'] 6.9.3. Checking whether key is writableTo check whether a key is writable: gsettings writable SCHEMA [:PATH] KEY Example 6.4. Checking whether the favorite applications key is writable To check whether the $ gsettings writable org.gnome.shell favorite-apps As a result, the return code shows 6.9.4. Checking key valid valuesTo check the range of valid values for a key: gsettings range SCHEMA [:PATH] KEY Example 6.5. Checking the range of valid values for the remember-mount-password key To check valid values for the $ gsettings range org.gnome.shell remember-mount-password As a result, the return code displays type of the key value, which is 6.9.5. Checking description of valid key valuesTo check the description of valid values for a key: gsettings describe SCHEMA [:PATH] KEY Example 6.6. Checking the description of valid values for the picture-uri key To check the description of valid values for the $ gsettings describe org.gnome.desktop.screensaver picture-uri As a result, the following output is displayed: URI to use for the background image. Note that the backend only supports local 6.9.6. Querying key valueTo get the value of a key: gsettings get SCHEMA [:PATH] KEY VALUE Note that the value is displayed as a serialised GVariant. Example 6.7. Querying value of the remember-mount-password key To get value of the $ gsettings get org.gnome.shell remember-mount-password As a result, the return code displays 6.9.7. Resetting key valueTo reset the value of a key: gsettings reset SCHEMA [:PATH] KEY If resetting succeeds, no return code is displayed. Default values are in stored dconf and gsettings-desktop-schemas files. Example 6.8. Resetting the lock-delay key to its default value The default value of the Users can set the value of For example, to set the $ gsettings set org.gnome.desktop.screensaver lock-delay 200 To reset the $ gsettings reset org.gnome.desktop.screensaver lock-delay As a result, the value of 6.9.8. Resetting schemaTo reset a schema: gsettings reset-recursively SCHEMA [:PATH] Example 6.9. Resetting the org.gnome.desktop.screensaver schema to its defaults To reset the $ gsettings reset-recursively org.gnome.desktop.screensaver As a result, the 6.9.9. Listing installed non-relocatable schemasTo list installed schemas that are non-relocatable: gsettings list-schemas [--print-paths] If the Example 6.10. Listing installed non-relocatable schemas To list all schemas installed on your system that are non-relocatable: $ gsettings list-schemas As a result, a full list of schemas is returned. The following list is truncated. org.gnome.rhythmbox.library org.gnome.shell.overrides org.gnome.system.proxy.https org.gnome.clocks org.gnome.eog.fullscreen org.gnome.login-screen org.gnome.eog.view 6.9.10. Listing schema keysTo list the keys that are in the selected schema: gsettings list-keys SCHEMA [:PATH] Example 6.11. Listing keys in the org.gnome.shell schema To list keys in the $ gsettings list-keys org.gnome.shell As a result, a list of keys is returned. The following list is truncated. enabled-extensions command-history remember-mount-password always-show-log-out had-bluetooth-devices-setup looking-glass-history disable-user-extensions app-picker-view disable-extension-version-validation development-tools favorite-apps 6.9.11. Listing schema childrenTo list children of a selected schema: gsettings list-children SCHEMA [:PATH] Note that the list is empty if there are no children. Example 6.12. Listing children of the org.gnome.shell schema To list children of the $ gsettings list-children org.gnome.shell As a result, the following output is returned: keyboard org.gnome.shell.keyboard keybindings org.gnome.shell.keybindings 6.9.12. Listing schema’s keys and valuesTo list keys and values of a selected schema recursively: gsettings list-recursively [SCHEMA [:PATH]] Note that if the schema whose keys you want to list is not specified, all keys within all schemas are listed. Example 6.13. Listing keys and values recursively To list keys and values in all schemas recursively: $ gsettings list-recursively As a result, all key and values in all schemas on system are listed, as shown below. Note that the following list is truncated. org.gnome.nautilus.desktop network-icon-visible false org.gnome.nautilus.desktop font '' org.gnome.nautilus.desktop network-icon-name 'Network Servers' org.gnome.nautilus.desktop home-icon-name 'Home' org.gnome.nautilus.desktop volumes-visible true org.gnome.Vinagre always-enable-listening false org.gnome.Vinagre always-show-tabs false org.gnome.Vinagre show-accels false org.gnome.Vinagre history-size 15 org.gnome.Vinagre shared-flag true 6.10. AcknowledgementsCertain portions of this text first appeared in the GNOME Desktop System Administration Guide. Copyright © 2014 The GNOME Project, Michael Hill, Jim Campbell, Jeremy Bicha, Ekaterina Gerasimova, minnie_eg, Aruna Sankaranarayanan, Sindhu S, Shobha Tyagi, Shaun McCance, David King, and others. Licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. The editors of this Red Hat Enterprise Linux 8 documentation would like to thank the GNOME community members for their valuable contributions to the GNOME Desktop System Administration Guide. Chapter 7. Configuring file associationsThis section provides information on configuring RHEL to open or access files with different formats. In GNOME, MIME (Multipurpose Internet Mail Extension) types help to identify the format of a file and applications to use to open these files. 7.1. Multipurpose Internet Mail Extension typesThe GNOME desktop uses MIME types to:
MIME type names follow a given format: media-type/subtype-identifier For example, Here GNOME follows Multipurpose Internet Mail Extension (MIME) info specification from the Freedesktop.org to determine:
MIME databaseThe MIME database is a collection of all the MIME type specification files that GNOME uses to store information about known MIME types. The most important part of the MIME database from the system administrator’s point of view is the Additional resources
7.2. Adding a custom MIME type for all users You must create a new MIME type specification file in the Procedure
Verification steps
7.3. Adding a custom MIME type for individual users You must create a new MIME type specification file in the Procedure
Verification steps
7.4. Options to override default MIME types By default, the package-installed System administrators can create the Local users can create the Configurations are applied in the following order:
Within a particular location, the configurations are applied in the following order:
7.5. Overriding default registered application for all the usersAs a system administer, you can update the configuration based on the requirements. System administrator’s configuration takes precedence over default package configuration. Within each, the desktop-specific configuration takes precedence over the configuration that does not specify the desktop environment. Procedure
Verification steps
7.6. Overriding default registered application for individual usersIndividual users can also update the configuration based on the requirements. This configuration takes precedence over the system administrator’s configuration and the system administrator’s configuration takes precedence over the package configuration. Within each, the desktop-specific configuration takes precedence over the configuration that does not specify the desktop environment. Procedure
Verification steps
Chapter 8. Customizing desktop appearanceThis section explains how system administrators can customize appearance of the desktop environment for different users of the system. 8.1. Customizing desktop backgroundsAs a system administrator, you can configure the default desktop background, add extra backgrounds, or add multiple backgrounds using the dconf utility.
If the users of the system are not permitted to change background from the defaults, system administrator needs to lock the settings using the 8.1.1. Customizing the default desktop background You can configure the default desktop background and its appearance by setting the
relevant GSettings keys in the For more information about GSettings, see Section 6.1, “Introduction to configuring GNOME”. Use the following procedure to set the default background: Procedure
8.1.3. Setting the screen shield Screen shield is the screen that quickly slides down when the system is locked. It is controlled by the For more information on GSettings and dconf, see Section 6.1, “Introduction to configuring GNOME”. Procedure
If the screen shield does not update, you can:
8.2. Using GNOME Shell extensions to customize desktop environmentGNOME Shell extensions allow for the customization of the default GNOME Shell interface and its parts, such as window management and application launching. 8.2.1. Overview of GNOME Shell extensionsThis section provides an overview of GNOME Shell extensions available on RHEL 8, including the name of the package providing a particular extension, and the description of what each extension does. Table 8.2. Overview of available GNOME Shell extensions
8.2.2. Enabling machine-wide extensionsPrerequisites To make extensions available to all users on the system, install them in the Procedure
8.2.3. Locking down enabled extensions You can prevent the user from enabling or disabling extensions by locking down the Procedure
After locking down the 8.2.4. Setting up mandatory extensionsIn GNOME Shell, you can provide a set of extensions that the user has to use. Prerequisites The extensions must be installed under the Procedure
Chapter 9. Customizing GNOME desktop features9.1. Changing the language using desktop GUIThis section describes how to change the system language using the desktop GUI. Prerequisites
Procedure
Some applications do not support certain languages. The text of an application that cannot be translated into the selected language remains in US English. 9.2. Enabling the CTRL+ALT+BACKSPACE shortcut The You might want to terminate X.Org especially when:
To enable the Procedure
If the 9.3. Disabling command-line accessTo disable command-line access for a desktop user, you need to make configuration changes in a number of different contexts:
The following steps do not remove the desktop user’s permissions to access a command line, but rather remove the ways that the desktop user could access command line. 9.3.1. Setting the org.gnome.desktop.lockdown.disable-command-line KeyThis approach prevents the user from:
Procedure
9.3.2. Disabling virtual terminal switching on X.Org With the X.Org display server, users can normally use the You cannot apply the procedure if GNOME Shell on Wayland is used as the display server. Procedure
9.4. Preventing the computer from suspending when closing the lidWhen closing the lid of your laptop, the computer by default suspends in order to save power. You can prevent the computer from suspending when closing the lid by changing the setting for that behavior. Some laptops can overheat if they are left running with the lid closed, especially if they are in a confined place. Therefore, consider whether changing the default setting from suspend to an other option is beneficial in your case. Procedure
For more information on
the 9.5. Changing behavior when pressing the power button in graphical target mode When the machine is booted to a graphical login screen or user session, hitting the For example, if you want the system to shutdown after pressing the Procedure
This configuration initiates a system shutdown after pressing the Options for particular buttons:
Chapter 10. Displaying the system security classificationAs an administrator of deployments where the user must be aware of the security classification of the system, you can set up a notification of the security classification. This can be either a permanent banner or a temporary notification, and it can appear on login screen, in the GNOME session, and on the lock screen. 10.2. Notifying of the system security classificationYou can set up a notification that contains a predefined message in an overlay banner. This is useful for deployments where the user is required to read the security classification of the system before logging in. Depending on your configuration, the notification can appear at the login screen, after logging in, on the lock screen, or after a longer time with no user activity. You can always dismiss the notification when it appears. Procedure
Troubleshooting
Chapter 11. Enabling Chinese, Japanese, or Korean text inputIf you write with Chinese, Japanese, or Korean characters, you can configure RHEL to input text in your language. 11.1. Input methodsCertain scripts, such as Chinese, Japanese, or Korean, require keyboard input to go through an Input Method Engine (IME) to enter native text. An input method is a set of conversion rules between the text input and the selected script. An IME is a software that performs the input conversion specified by the input method. To input text in these scripts, you must set up an IME. If you installed the system in your native language and selected your language at the GNOME Initial Setup screen, the input method for your language is enabled by default. 11.2. Available input method enginesThe following input method engines (IMEs) are available on RHEL from the listed packages: Table 11.1. Available input method engines
11.3. Installing input method enginesThis procedure installs input method engines (IMEs) that you can use to input Chinese, Japanese, and Korean text. Procedure
11.4. Switching the input method in GNOMEThis procedure sets up the input method for your script, such as for Chinese, Japanese, or Korean scripts. Prerequisites
Procedure
Verification
Chapter 12. Inputting uncommon characters using the Compose keyThe Compose key is a feature that enables you to type special symbols or characters which are missing on your keyboard. In GNOME Desktop, you can define one of the existing keys on your keyboard as the Compose key. You can use the Compose key in combination with other keys, known as Compose key sequences, to enter special characters you type frequently. 12.1. Enabling the Compose keyYou can enable the Compose key either for an individual user or for all users. 12.1.1. Enabling the Compose key for an individual user with the Tweaks applicationTo enable the Compose key for an individual user by Tweaks application follow these steps. Prerequisites
Procedure
12.1.2. Enabling the Compose key for an individual user using GSettings To enable the Compose key for
an individual user using the Procedure
Additional resources
12.1.3. Enabling the Compose key for all usersTo enable the Compose key for all users, follow these steps. Procedure
Additional resources
12.2. Using the Compose key to input charactersThis procedure shows how to use the Compose key. Prerequisites
Procedure
12.3. The Compose key sequencesThis section lists some of the Compose key sequences and their resulting characters. Table 12.1. Common sequences
Additional resources
Chapter 13. Typing emoji charactersYou can type emoji characters using several different methods in GNOME, depending on the type of the application. 13.1. Typing emoji characters in GTK applicationsThis procedure inserts an emoji character in an application that uses the GTK graphical toolkit, such as in native GNOME applications. Prerequisites
Procedure
Verification
13.2. Typing emoji characters in any applicationsThis procedure inserts an emoji character in any application, regardless of the graphical toolkit that the application uses. Procedure
Verification
Chapter 14. Managing storage volumes in GNOMEThis section describes how you can manage storage volumes in GNOME with a virtual file system. GNOME Virtual File System (GVFS) is an extension of the virtual file system interface provided by the libraries the GNOME desktop is built on. 14.1. The GVFS systemThis section introduces GVFS and explains how GVFS works. GVFS provides complete virtual file system infrastructure and handles storage in the GNOME desktop. It uses addresses for full identification based on the Uniform Resource Identifier (URI) standard, syntactically similar to URL addresses in web browsers. These addresses in the form of GVFS helps to mount the resources. These mounts are shared between multiple applications. Resources are tracked globally within the running desktop session, which means that even if you quit an application that triggered the mount, the mount continues to be available for any other application. Multiple applications can access the mount at the same time unless it is limited by a back end. Some protocols by design permit only a single channel. GVFS mounts removable media in the 14.2. The format of the GVFS URI stringThis section explains what the GVFS URI string is and demonstrates how to form one. You must form a URI string to use back end services. This string is a basic identifier used in GVFS, which carries all necessary information needed for unique identification, such as type of service, back end ID, absolute path, or user name if required. You can see this information in the Files address bar and GTK+ open or save file dialog. The following example is a very basic form of the URI string, which points to a root directory ( Example 14.1. A URI string pointing to the root FTP directory Example 14.2. A URI string pointing to a text file on FTP ssh:///home/joe/todo.txt 14.3. Mounting a storage volume in GNOMEIn virtual file systems, particular resources are set to be mounted automatically, but the most common way is to trigger mounts manually. Procedure
14.4. Unmounting a storage volume in GNOMEYou can unmount storage volumes or resources using the following procedure. Procedure
14.5. Access to GVFS mounts in the file systemThis section introduces FUSE, the main daemon for the GVFS virtual file system. Applications built with the GIO library can access GVFS mounts. In addition, GVFS provides a FUSE daemon which exposes active GVFS mounts. Any application can access active GVFS mounts using the standard POSIX APIs as though mounts were regular file systems. In certain applications, additional library dependency and new virtual file system (VFS) subsystem specifics might be unsuitable or too complicated. For such reasons and to boost compatibility, GVFS provides a File System in Userspace (FUSE) daemon, which exposes active mounts through its mount for standard Portable Operating System Interface (POSIX) access. This daemon transparently translates incoming requests to imitate a local file system for applications. You might experience difficulties with certain combinations of applications and GVFS back ends. The FUSE daemon starts automatically with the main Manual browsing shows individual directories for each GVFS mount. The system passes the transformed path as an argument when you are opening documents from GVFS locations with non-native applications. Note that native GIO applications automatically translate this path back to a native URI. 14.6. Available GIO commandsGIO provides several commands that might be useful for scripting or testing. Here is a set of POSIX commands counterparts as follows:
Following additional commands provide more control of GIO specifics:
For user convenience, All these commands are native GIO clients, there is no need for the fallback FUSE daemon to be running. Their purpose is not to be drop-in replacements for POSIX commands, in fact, a very little range of switches is supported. In their basic form, these commands take an URI string as an argument instead of a local path. Additional resources
14.7. Sample GIO commandsThe following section provides a few examples of the GIO commands usage. Example 14.3. List all files in the local Example 14.4. List the content of a text file from a remote system $ gio cat ssh:///home/joe/todo.txt Example 14.5. Copy the previous text file to a local $ gio copy ssh:///home/joe/todo.txt /tmp/ Additional resources
14.8. Overview of GVFS metadataThis section provides information on the GVFS metadata and provides instruction on how to view and manipulate them. The GVFS metadata storage is implemented as a set of key-and-value pairs that bind information to a particular file. Thus, there is a tool for a user or application to save small data designed for runtime information such as icon position, last-played location, position in a document, emblems, notes, and so on. Whenever you move a file or directory, GVFS moves the metadata accordingly so that metadata stays connected to the respective file. The GVFS stores all metadata privately, so metadata is available only on the machine. However, GVFS tracks mounts and removable media as well. GVFS mounts removable media in the To view and manipulate with metadata, you can use:
Additional resources
14.9. Setting custom GIO metadata attributeThis procedure describes how to set a custom metadata attribute. Notice the differences between particular Procedure
The metadata persists when you move the file using the GIO API. Additional resources
14.10. Password management of GVFS mountsThis section focuses on the GVFS mount authentication. A typical GVFS mount authenticates on its activation unless the resource allows anonymous authentication or does not require any authentication at all. In a standard GTK+ dialog, you can choose whether to store the password. When you select the persistent storage, the password is stored in the user keyring. GNOME Keyring is a central place for secrets storage. The password is encrypted and automatically unlocked on desktop session start using the password provided on login. For protecting it by a different password, you can set the password at the first use. The Passwords and Keys application helps to manage the stored password and GNOME Keyring. It allows removing individual records or changing passwords. 14.11. GVFS back endsBack ends in GVFS provide access to a specific type of resource. This section provides a list of available GVFS back ends and their specifications. Some back ends are packaged separately
and not installed by default. For installing additional back ends, use the Table 14.1. Available back ends
Chapter 15. Troubleshooting volume management in GNOMEFollowing are some common errors of volume management in GNOME and ways to resolve them. 15.1. Troubleshooting access to GVFS locations from non-GIO clients If you have problems accessing GVFS locations from your application, it might mean that it is not native GIO client. Native GIO clients are typically all GNOME applications using GNOME libraries ( Prerequisite
Procedure
15.2. Troubleshooting an invisible connected USB diskUnder certain circumstances, when you connect a flash drive, the GNOME Desktop might not display it. If your flash drive is not visible in Files, but you can see it in the Disks application, you can attempt to set the Show in user interface option in Disks. Procedure
15.3. Troubleshooting unknown or unwanted partitions listed in FilesSometimes, you might see unknown or unwanted partitions when you plug a disk in. For example, when you plug in a flash disk, it is automatically mounted and its volumes are shown in the Files side bar. Some devices have a special partition with backups or help files, which you might not want to see each time you plug in the device. Procedure
15.4. Troubleshooting if a connection to the remote GVFS file system is unavailableThere are number of situations in which the client is unexpectedly and unwillingly disconnected from a virtual file system or a remote disk mount and is not reconnected automatically. You might see the error messages in such situations. Several causes trigger such situations:
Procedure
15.5. Troubleshooting a busy disk in GNOMEIf you receive a notification about your disk being busy, determine the programs that are accessing the disk. Then, you can end the programs that are running. You can also use the System Monitor application to kill the programs forcefully. Prerequisites
Procedure
Additional resources
Chapter 16. Managing bookmarks in GNOMEIn GNOME, you can edit the bookmarks that are displayed in applications and dialogs that manage files. 16.1. Bookmarks in GNOME Bookmarks integrate into GTK+ and in the GNOME desktop. Every application that presents a standard GTK+ Open and Save dialog ( Besides bookmarks, While activating a bookmark for the first time, the GVFS subsystem looks for existing mounts and tries to mount the location if the mount does not exist yet. This way, you can authenticate even within the Open or Save dialog. Bookmarks are located in the file:///home/username/Music file:///home/username/Pictures file:///home/username/Videos file:///home/username/Downloads file:///home/username/bin Replace username with the user name you are logged in. You can use this file to edit bookmarks based on your requirements. 16.2. Adding a bookmark in FilesYou can save a reference to a location by bookmarking it. Procedure
16.3. Bookmarks for all GNOME users System administrators can set a group of bookmarks for all users at once by allowing access to file shares for the users. GNOME stores a list of file-sharing servers in the In GNOME, XBEL is used to share desktop bookmarks in applications like Files. Here is an example of creating a bookmark titled GNOME FTP with the URI <?xml version="1.0" encoding="UTF-8"?> <xbel version="1.0" xmlns:bookmark="http://www.freedesktop.org/standards/desktop-bookmarks" xmlns:mime="http://www.freedesktop.org/standards/shared-mime-info"> <bookmark href="ftp://ftp.gnome.org/"> <title>GNOME FTP</title> </bookmark> </xbel>
Chapter 17. Customizing default favorite applications You can customize frequently used applications as your favorite applications. You can see these favorite applications on the GNOME Shell dash in the Activities overview. You can use 17.1. Setting different favorite applications for individual usersYou can set the default favorite applications for individual users. Procedure
17.2. Setting the same favorite applications for all users You can modify system database files using Procedure
Chapter 18. Authenticating the user in the desktop environmentYou can perform the following operations:
18.1. Using enterprise credentials to authenticate in GNOMEYou can use your enterprise domain credentials to access your system. This section explains how to log in using enterprise credentials in GNOME, configure enterprise credentials at the GNOME welcome screen, and add an authenticated user with enterprise credentials in GNOME. 18.1.1. Logging in with Enterprise Credentials in GNOMEYou can use your domain credentials to login to GNOME if your network has an Active Directory or Identity Management domain available, and you have a domain account. Prerequisites
Procedure
18.1.2. Configuring enterprise credentials at the GNOME welcome screenPerform the following steps to configure workstation for enterprise credentials using the welcome screen that belongs to the GNOME Initial Setup program. The initial setup runs only when you create a new user and log into that account for the first time. Procedure
18.1.3. Adding an authenticated user with enterprise credentials in GNOMEThis procedure helps to create a new user through the GNOME Settings application. The user is authenticated using enterprise credentials. Prerequisites
Procedure
18.1.4. Troubleshooting enterprise login in GNOMEYou can use the realm utility and its various sub-commands to troubleshoot the enterprise login configuration. Procedure
Network administrators can configure and pre-join workstations to the relevant domains using the
kickstart Additional resources
18.2. Enabling smart card authenticationYou can enable workstations to authenticate using smart cards. In order to do so, you must configure GDM to allow prompting for smart cards and configure operating system to log in using a smart card. You can use two ways to configure the GDM to allow prompting for smart card authentication with GUI or using the command line. 18.2.1. Configuring smart card authentication in GDM using the GUI You can enable
smart card authentication using Prerequisites
Procedure
Additional resources
18.2.2. Configuring smart card authentication in GDM using the command line You can use the Procedure
Additional resources
18.2.3. Enabling the smart card authentication method in the system For smart card authentication you can use the Prerequisites
18.3. Fingerprint authentication You can use the Chapter 19. Locking down selected tasksThis section describes how to lock down for users the following tasks:
19.1. Locking down printingYou can disable the print dialog from being shown to users. This can be useful if you are giving temporary access to a user or you do not want the user to print to network printers. The feature only works in applications which support it. Not all GNOME and third party applications have this feature enabled. The changes do not have effect on applications which do not support this feature. To prevent applications from printing, lock down the Procedure
Having followed these steps, applications supporting this lockdown key, such as Evolution, Evince, or Gedit, will disable printing. 19.2. Locking file saving on diskYou can disable the Save and Save As dialogs. This can be useful if you are giving temporary access to a user or you do not want the user to save files to the computer. The feature only works in applications which support it. Not all GNOME and third party applications have this feature enabled. The changes will have no effect on applications which do not support this feature. To prevent applications from file saving, lock down
the Procedure
Having followed these steps, applications supporting this lockdown key, for example Videos, Image Viewer, Evolution, Document Viewer, or GNOME Shell, will disable their Save As dialogs. 19.3. Locking repartitioning Procedure
When the user tries to change the disks settings, the following message is returned: Authentication is required to modify the disks settings. 19.4. Locking down user logout and user switchingTo prevent the user from logging out, use the following procedure. Procedure
Users can evade the logout lockdown by switching to a different user. To prevent such scenario, lock down user switching as well. To lock down user switching, use the following procedure: Procedure
Chapter 20. Restricting the session to a single applicationYou can start the GNOME session in single-application mode, also known as kiosk mode. In this session, GNOME displays only a full-screen window of the application that you have selected. 20.1. Single-application modeSingle-application mode is a modified GNOME session that reconfigures the Mutter window manager into an interactive kiosk. This session locks down certain behavior to make the standard desktop more restrictive. The user can interact only with a single application selected by the administrator. You can set up single-application mode in a number of fields, from communication to entertainment or education, and use it as a self-serve machine, an event manager, a registration point, and so on. The single-application mode configuration is available from the 20.2. Enabling single-application modeThis procedure installs and enables single-application mode, which restricts the GNOME session to a single application. Procedure
Chapter 21. Managing user sessions21.1. What GDM isThe GNOME Display Manager (GDM) is a graphical login program running in the background that runs and manages the X.Org display servers for both local and remote logins. GDM is a replacement for XDM, the X Display Manager. However, GDM is not derived from XDM and does not contain any original XDM code. In addition, there
is no support for a graphical configuration tool in GDM, so editing the 21.2. Restarting GDMWhen you make changes to the system configuration such as setting up the login screen banner message, login screen logo, or login screen background, restart GDM for your changes to take effect. Restarting the service forcibly interrupts any currently running GNOME session of any desktop user who is logged in. This can result in users losing unsaved data. Procedure
Procedure
21.3. Adding an autostart application for all usersYou can set application to start automatically when any user logs into the GNOME environment. Procedure
Additional resources
21.4. Configuring automatic loginAs an administrator, you can enable automatic login from the Users panel in GNOME Settings, or you can set up automatic login manually in the GDM custom configuration file, as follows. Run the following procedure to set up automatic login for a user Procedure
21.5. Configuring automatic logoutUser sessions that have been idle for a specific period of time can be ended automatically. You can set different behavior based on whether the machine is running from a battery or from mains power by setting the corresponding GSettings key, then locking it. Users can potentially lose unsaved data if an idle session is automatically ended. To set automatic logout for a mains powered machine: Procedure
The following GSettings keys are of interest:
If you want to list available values for a key, use the following procedure: Procedure
$ gsettings range org.gnome.settings-daemon.plugins.power sleep-inactive-ac-type enum 'blank' 'suspend' 'shutdown' 'hibernate' 'interactive' 'nothing' 'logout' 21.6. Setting a default desktop session for all usersYou can configure a default desktop session that is preselected for all users that have not logged in yet. If a user logs in using a different session than the default, their selection persists to their next login. Procedure
21.7. Setting screen brightness and idle timeThis section describes how to:
Configuring the drop in the brightness levelTo set the drop in the brightness level when the device has been idle for some time: Procedure
Setting brightness levelTo set brightness level: Procedure
Setting idle timeTo set idle time after which the screen is blanked and the default screensaver is displayed: Procedure
21.8. Locking the screen when the user is idleTo enable the screensaver and make the screen lock automatically when the user is idle, follow this procedure: Procedure
21.9. Screencast recording GNOME Shell features a built-in screencast recorder. The recorder allows users to record desktop or application activity during their session and distribute the recordings as high-resolution video files
in the To make a screencast: Procedure
The built-in recorder always captures the entire screen, including all monitors in multi-monitor setups. Chapter 22. Configuring the screen rotation22.1. Configuring the screen rotation for a single userThis procedure sets screen rotation for the current user. Procedure
The setting persists to your next login. 22.2. Configuring the screen rotation for all usersThis procedure sets a default screen rotation for all users on a system and is suitable for mass deployment of homogenized display configuration. Procedure
The new setup takes effect for all the users the next time they log in in the system. Chapter 23. Configuring the desktop environment for accessibilityAs a system administrator, you can configure the desktop environment to support users with a visual impairment. To enable accessibility, perform the following procedures. 23.1. Components that provide accessibility featuresAccessibility for users with a visual impairment is ensured by the Orca screen reader on the Red Hat Enterprise Linux 8 desktop. Orca is included in the default RHEL installation. Orca reads information from the screen and communicates it to you using the following components: Speech synthesizer Provides a speech output. The default speech synthesizer on RHEL 8 is eSpeak-NG. Braille display Provides a tactile output. The BRLTTY service enables this functionality. 23.2. Configuring the brltty service The Braille display is a device that uses the In order for the Braille display to work correctly, perform the following procedures. 23.2.1. Enabling the brltty service To enable the Braille display, enable the Prerequisites
Procedure
Verification steps
23.2.2. Authorizing users of a Braille display deviceTo set the users who are authorized to use a Braille display device, you can choose one of the following methods, which have an equal effect:
Authorization using the Authorization using the 23.2.2.1. Authorizing users of a Braille display device with brltty.confProcedure
23.2.2.2. Authorizing users of a Braille display device with brlapi.key Authorization using the Prerequisites
Procedure
23.2.3. Setting the driver for a Braille display device The Procedure
23.2.4. Configuring a Braille display device The 23.2.4.1. Supported types of Braille display deviceThis section describes which types of Braille display devices are supported. Table 23.1. Braille display device types and the corresponding syntax
Example 23.1. Settings for particular Braille display devices # First serial device braille-device serial:ttyS0 # First USB device matching braille driver braille-device usb: # Specific USB device by serial number braille-device usb:nnnnn # Specific Bluetooth device by address braille-device bluetooth:xx:xx:xx:xx:xx:xx You can also set multiple devices, separated by commas, and each of them will be probed in turn. If the device is connected by a serial-to-USB adapter, setting serial:ttyUSB0 You can find the actual device name in the kernel messages on the device plug with the following command: # dmesg | fgrep ttyUSB0 23.2.4.2. Setting specific parameters for Braille display devices To set specific parameters for particular Braille display devices, use the 23.2.4.2.1. Setting the text table The Procedure
23.2.4.2.2. Setting the contraction table The Procedure
If not specified, no contraction table is used. Chapter 24. TabletsTo manage Wacom tablets connected to your system, use the following tools:
Both these tools, as well as the If you want to add support for a new tablet into the 24.1. Preparing a tablet definition file The To ensure that the tablet definition file exists, follow this procedure. Prerequisites
Procedure
24.2. Adding support for a new tablet To add support for a new tablet into the Prerequisites
Procedure
24.3. Where is the Wacom tablet configuration stored Configuration for your Wacom tablet is stored in GSettings in the The configuration schema for the tablet is Stylus configuration is stored in the The configuration schema for the stylus is 24.4. Listing available Wacom tablet configuration paths To get the full list of tablet configuration paths used on a particular machine, use the Prerequisites
Procedure
Using This is because the Chapter 25. Installing applications using FlatpakYou can install certain applications using the Flatpak package manager. The following sections describe how to search for, install, launch, and update Flatpak applications on the command line and in the graphical interface. Red Hat provides Flatpak applications only as a Technology Preview feature. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process. For more information about the support scope of Red Hat Technology Preview features, see https://access.redhat.com/support/offerings/techpreview. The Flatpak package manager itself is fully supported. 25.1. The Flatpak technologyFlatpak provides a sandbox environment for application building, deployment, distribution, and installation. Applications that you launch using Flatpak have minimum access to the host system, which protects the system installation against third-party applications. Flatpak provides application stability regardless of the versions of libraries installed on the host system. Flatpak applications are distributed from repositories called remotes. Red Hat provides a remote with RHEL applications. Additionally, third-party remotes are available as well. Red Hat does not support applications from third-party remotes. 25.2. Setting up FlatpakThis procedure installs the Flatpak package manager. Procedure
25.3. Enabling the Red Hat Flatpak remoteThis procedure configures the Red Hat Container Catalog as a Flatpak remote on your system. Prerequisites
Procedure
Verification
25.4. Searching for Flatpak applicationsThis procedure searches for an application in the enabled Flatpak remotes on the command line. The search uses the application name and description. Prerequisites
Procedure
25.5. Installing Flatpak applicationsThis procedure installs a selected application from the enabled Flatpak remotes on the command line. Prerequisites
Procedure
25.6. Launching Flatpak applicationsThis procedure launches an installed Flatpak application from the command line. Prerequisites
Procedure
25.7. Updating Flatpak applicationsThis procedure updates one or more installed Flatpak applications to the most recent version in the corresponding Flatpak remote. Prerequisites
Procedure
25.8. Installing Flatpak applications in the graphical interfaceThis procedure searches for Flatpak applications using the Software application. Prerequisites
Procedure
25.9. Updating Flatpak applications in the graphical interfaceThis procedure updates one or more installed Flatpak applications using the Software application. Prerequisites
Procedure
Legal NoticeCopyright © 2022 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js® is an official trademark of Joyent. Red Hat is not formally related to or endorsed by the official Joyent Node.js open source or commercial project. The OpenStack® Word Mark and OpenStack logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community. All other trademarks are the property of their respective owners. Which category of system software provides a platform or application software to run on?An operating system is system software that provides a platform between computer hardware, application software, and end-users.
What is a running application called?In most operating systems, what is a running application called? Process.
What is the name of the large background area of the Windows environment that holds icons?If you don't use it, you can remove it (see #2 below). The main Taskbar--displays icons for all open applications and files. The System Tray--contains the clock and icons for some of the programs running in the background.
What is the name of the menu in the bottom left corner of the Windows enviroment?The Microsoft Windows Start menu is the primary location in Windows to locate your installed programs and find any files or folders. By default, the Start menu is accessed by clicking Start in the bottom-left corner of the Windows desktop screen.
|