<!-- /etc/dbus-1/system.d/wicd.conf --> <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> <busconfig> <policy user="root"> <allow own="org.wicd.daemon"/> <allow send_destination="org.wicd.daemon"/> <allow send_interface="org.wicd.daemon"/> <allow send_destination="org.wicd.daemon.wireless"/> <allow send_interface="org.wicd.daemon.wireless"/> <allow send_destination="org.wicd.daemon.wired"/> <allow send_interface="org.wicd.daemon.wired"/> </policy> <policy context="default"> <deny own="org.wicd.daemon"/> </policy> <!-- This Unix group will have permission to use Wicd's gui --> <policy group="users"> <allow send_destination="org.wicd.daemon"/> <allow send_interface="org.wicd.daemon"/> <allow send_interface="org.freedesktop.DBus.Introspectable"/> <!-- The Introspectable allow shouldn't be needed here, but it seems that a few distributions aren't yet allowing it in their hal configs, and we need it here, so... --> </policy> <!-- Comment the block below if you do not want all users logged in locally to have permission to use wicd-client. This ignores the group based permission model defined above for the "users" group. Note that this only applies if you are using ConsoleKit - if you do not have ConsoleKit installed and in use, then this block makes no difference either way. --> <policy at_console="true"> <allow send_destination="org.wicd.daemon"/> <allow send_interface="org.wicd.daemon"/> <allow send_destination="org.wicd.daemon.wireless"/> <allow send_interface="org.wicd.daemon.wireless"/> <allow send_destination="org.wicd.daemon.wired"/> <allow send_interface="org.wicd.daemon.wired"/> <allow send_interface="org.freedesktop.DBus.Introspectable"/> </policy> </busconfig>