Red Hat Enterprise Linux-8-Managing RHEL Systems From Your desktop-en-US
Red Hat Enterprise Linux-8-Managing RHEL Systems From Your desktop-en-US
The text of and illustrations in this document are licensed by Red Hat under a Creative Commons
Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is
available at
http://creativecommons.org/licenses/by-sa/3.0/
. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must
provide the URL for the original version.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert,
Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, OpenShift, Fedora, the Infinity
logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other
countries.
Linux ® is the registered trademark of Linus Torvalds in the United States and other countries.
XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States
and/or other countries.
MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and
other countries.
Node.js ® is an official trademark of Joyent. Red Hat Software Collections is not formally related to
or endorsed by the official Joyent Node.js open source or commercial project.
The OpenStack ® Word Mark and OpenStack logo are either registered trademarks/service marks
or trademarks/service marks of the OpenStack Foundation, in the United States and other
countries and are used with the OpenStack Foundation's permission. We are not affiliated with,
endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
Abstract
This documentation collection describes how to manage Red Hat Enterprise Linux 8 from the
desktop. Basics of using GNOME Shell and displaying the graphics are given, as well as the
instructions for system administrators on how to configure GNOME on a low level, or how to
customize desktop environment for multiple users.
Table of Contents
Table of Contents
. . . . . . . . . . . . . FEEDBACK
PROVIDING . . . . . . . . . . . . ON
. . . .RED
. . . . .HAT
. . . . .DOCUMENTATION
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5. . . . . . . . . . . . .
.CHAPTER
. . . . . . . . . . 1.. .STARTING
. . . . . . . . . . . USING
. . . . . . . .GNOME
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6. . . . . . . . . . . . .
1.1. WHAT GNOME 3 IS 6
1.2. GNOME ENVIRONMENTS 6
1.2.1. GNOME Standard 6
1.2.2. GNOME Classic 8
1.3. SELECTING GNOME ENVIRONMENT AND DISPLAY PROTOCOL 9
Procedure 9
1.4. LAUNCHING APPLICATIONS 10
Procedure 10
Procedure 11
Procedure 12
Procedure 12
1.5. INSTALLING APPLICATIONS 12
Procedure 12
Procedure 14
Procedure 14
Procedure 14
Procedure 15
1.6. DESKTOP ICONS 15
Desktop icons in GNOME Classic 16
Desktop icons in GNOME Standard 16
1.7. HANDLING SOUND 16
1.8. HANDLING GRAPHICS AND PHOTOS 19
1.9. HANDLING PRINTING 20
1.9.1. Starting GNOME control center for setting up printing 20
Procedure 21
1.9.2. Adding a new printer in GNOME Control center 21
Prerequisites 22
Procedure 22
1.9.3. Configuring a printer in GNOME Control center 24
Displaying printer’s settings menu 24
Procedure 24
Displaying and modifying printer’s details 24
Procedure 24
Setting the default printer 25
Procedure 25
Removing a printer 26
Procedure 26
1.9.4. Printing a test page in GNOME Control Center 26
Prerequisites 26
Procedure 26
1.9.5. Setting print options using GNOME Control center 27
Procedure 27
1.10. SHARING MEDIA BETWEEN APPLICATIONS 27
1.11. CUSTOMIZING GNOME SHELL ENVIRONMENT WITH THE TWEAKS TOOL 28
.CHAPTER
. . . . . . . . . . 2.
. . DISPLAYING
. . . . . . . . . . . . . .GRAPHICS
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30
..............
2.1. KEY DIFFERENCES BETWEEN THE WAYLAND AND X11 PROTOCOL 30
2.1.1. X11 Applications 30
1
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
2.1.2. libinput 31
2.1.2.1. Mice, touchscreens, trackballs, pointing sticks 31
2.1.2.2. Touchpads 31
2.1.2.3. Graphics tablets 31
2.1.2.4. Other input devices 31
2.1.3. Gestures 31
2.2. CURRENT WAYLAND LIMITATIONS 32
2.2.1. Nvidia drivers 32
2.2.2. Remote desktop 32
2.2.3. X Display Manager 32
2.2.4. Additional Limitations 32
.CHAPTER
. . . . . . . . . . 3.
. . CONFIGURING
. . . . . . . . . . . . . . . . GNOME
. . . . . . . . . AT
. . . .LOW
. . . . . LEVEL
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
..............
3.1. INTRODUCTION TO CONFIGURING GNOME 33
3.2. MANAGING USER AND SYSTEM GNOME SETTINGS 33
3.3. DISPLAYING GSETTINGS VALUES FOR DESKTOP APPLICATIONS 33
3.3.1. Using dconf-editor and gsettings utility 33
3.3.2. Additional information 34
3.4. USING DCONF PROFILES 34
3.4.1. Introduction to dconf profiles 34
3.4.2. Selecting a dconf profile 35
3.5. CONFIGURING CUSTOM DEFAULT VALUES 35
3.5.1. Locking down specific settings 37
3.6. STORING USER SETTINGS OVER NFS 37
3.7. SETTING GSETTINGS KEYS PROPERTIES 38
3.8. WORKING WITH GSETTINGS KEYS ON COMMAND LINE 38
3.8.1. Setting key value 38
3.8.2. Monitoring key changes 39
3.8.3. Checking whether key is writable 39
3.8.4. Checking key valid values 40
3.8.5. Checking description of valid key values 40
3.8.6. Querying key value 40
3.8.7. Resetting key value 41
3.8.8. Resetting schema 41
3.8.9. Listing installed non-relocatable schemas 42
3.8.10. Listing schema keys 42
3.8.11. Listing schema children 43
3.8.12. Listing schema’s keys and values 43
3.9. ACKNOWLEDGEMENTS 44
. . . . . . . . . . . 4.
CHAPTER . . .CUSTOMIZING
. . . . . . . . . . . . . . . DESKTOP
. . . . . . . . . . .APPEARANCE
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .45
..............
4.1. CUSTOMIZING DESKTOP BACKGROUNDS 45
4.1.1. Customizing the default desktop background 45
Procedure 45
4.1.2. Adding extra backgrounds 46
Procedure 46
Example implementation of org.gnome.desktop.background GSettings keys 46
4.1.3. Setting the screen shield 47
Procedure 47
Troubleshhoting 47
4.2. USING GNOME SHELL EXTENSIONS TO CUSTOMIZE DESKTOP ENVIRONMENT 48
4.2.1. Enabling machine-wide extensions 48
Prerequisite: 48
2
Table of Contents
Procedure 48
4.2.2. Locking down enabled extensions 48
Procedure 48
4.2.3. Setting up mandatory extensions 49
Prerequisites 49
Procedure 49
.CHAPTER
. . . . . . . . . . 5.
. . CUSTOMIZING
. . . . . . . . . . . . . . . . GNOME
. . . . . . . . .DESKTOP
. . . . . . . . . . .FEATURES
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
..............
5.1. ENABLING THE CTRL+ALT+BACKSPACE SHORTCUT 51
Procedure 51
5.2. DISABLING COMMAND-LINE ACCESS 51
5.2.1. Setting the org.gnome.desktop.lockdown.disable-command-line Key 52
Procedure 52
5.2.2. Disabling virtual terminal switching on X.Org 52
Procedure 52
5.3. PREVENTING THE COMPUTER FROM SUSPENDING WHEN CLOSING THE LID 53
Procedure 53
5.4. CHANGING BEHAVIOR WHEN PRESSING THE POWER BUTTON IN GRAPHICAL TARGET MODE 54
Procedure 54
. . . . . . . . . . . 6.
CHAPTER . . .LOCKING
. . . . . . . . . .DOWN
. . . . . . . SELECTED
. . . . . . . . . . . . TASKS
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56
..............
6.1. LOCKING DOWN PRINTING 56
Procedure 56
6.2. LOCKING FILE SAVING ON DISK 57
Procedure 57
6.3. LOCKING REPARTITIONING 57
Procedure 58
6.4. LOCKING DOWN USER LOGOUT AND USER SWITCHING 58
Procedure 58
Procedure 59
.CHAPTER
. . . . . . . . . . 7.
. . MANAGING
. . . . . . . . . . . . .USER
. . . . . . SESSIONS
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60
..............
7.1. WHAT GDM IS 60
7.2. RESTARTING GDM 60
Procedure 60
Procedure 60
7.3. ADDING AN AUTOSTART APPLICATION FOR ALL USERS 60
Procedure 60
7.4. CONFIGURING AUTOMATIC LOGIN 61
Procedure 61
7.5. CONFIGURING AUTOMATIC LOGOUT 61
Procedure 61
Procedure 62
7.6. SETTING SCREEN BRIGHTNESS AND IDLE TIME 62
Configuring the drop in the brightness level 63
Procedure 63
Setting brightness level 63
Procedure 63
Setting idle time 63
Procedure 63
7.7. LOCKING THE SCREEN WHEN THE USER IS IDLE 64
Procedure 64
7.8. SCREENCAST RECORDING 64
Procedure 64
3
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
4
PROVIDING FEEDBACK ON RED HAT DOCUMENTATION
For simple comments on specific passages, make sure you are viewing the documentation in the
Multi-page HTML format. Highlight the part of text that you want to comment on. Then, click
the Add Feedback pop-up that appears below the highlighted text, and follow the displayed
instructions.
3. Fill in the Description field with your suggestion for improvement. Include a link to the
relevant part(s) of documentation.
5
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
GNOME 3 represents a presentation layer that provides a graphical user interface as well as the focused
working environment, which enables you to access all your work from one place.
GNOME Standard
GNOME Classic
Both environments can use two different protocols to build a graphical user interface:
The Wayland protocol, which uses GNOME Shell as the Wayland compositor and display
server.
This solution of display server is further referred as GNOME Shell on Wayland.
NOTE
Note that the graphics based on the Wayland protocol are not available for virtual
machines that use the qxl driver.
You can find the current list of environments for which Wayland-based graphics are
unavailable in the /usr/lib/udev/rules.d/61-gdm.rules file.
The default combination in Red Hat Enterprise Linux 8 is GNOME Standard environment using GNOME
Shell on Wayland as the display server.
However, due to Section 2.2, “Current Wayland limitations” , you may want to switch the graphics
protocol stack.
You may also want to swich from GNOME Standard to GNOME Classic.
For more information about graphics based on the Wayland protocol, see Section 2.1, “Key differences
between the Wayland and X11 protocol”.
For information on how to switch the environments, see Selecting GNOME environment.
Top bar
The horizontal bar at the top of the screen provides access to some of the basic functions of
GNOME Standard, such as the Activities Overview, clock and calendar, system status icons,
and the system menu.
6
CHAPTER 1. STARTING USING GNOME
System menu
The system menu is located in the top right corner, and enables you:
Updating settings
Switching user
Logging out
Activities Overview
The Activities Overview features windows and applications views that let the user run
applications and windows and switch between them.
The search entry at the top allows for searching various items available on the desktop,
including applications, documents, files, and configuration tools.
The vertical bar on the left side contains a list of favorite and running applications. You can add
or remove applications from the default list of favorites according to your needs.
The workspace list displayed on the right side allows the user to switch between multiple
workspaces, or move applications and windows from one workspace to another.
Message tray
The message tray provides access to pending notifications. The message tray shows when the
user presses Super+M.
7
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
The Places menu is displayed next to the Applications menu on the top bar. It gives the user
quick access to important folders, for example Downloads or Pictures.
Taskbar
The taskbar is displayed at the bottom of the screen, and features:
A window list
A short identifier for the current workspace and total number of available workspaces
displayed next to the notification icon
System menu
The system menu is located in the top right corner, and enables you:
Updating settings
Switching user
Logging out
The GNOME 3 Classic Desktop with the Rhythmbox application and the Favorites submenu
of the Applications menu
8
CHAPTER 1. STARTING USING GNOME
However, due to Section 2.2, “Current Wayland limitations” , you may want to switch the graphics
protocol stack.
You may also want to swich from GNOME Standard to GNOME Classic. See Section 1.2, “GNOME
environments” for differences between these two environments.
For switching between various combinations of GNOME environment and graphics protocol stacks, use
the following procedure.
Procedure
1. From the login screen (GDM), click the cogwheel next to the Sign In button.
NOTE
You cannot access this option from the lock screen. The login screen appears
when you first start Red Hat Enterprise Linux 8 or when you log out of your
current session.
9
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
2. From the drop-down menu that appears, select the option that you prefer.
NOTE
Note that in the menu that appears on the login screen, the X.Org display server
is marked as X11 display server.
IMPORTANT
The change of GNOME environment and graphics protocol stack resulting from the
above procedure is persistent across user logouts, and also when powering off or
rebooting the computer.
Procedure
2. Write the name of the executable into the Enter a Command screen:
10
CHAPTER 1. STARTING USING GNOME
This approach works both in GNOME Standard and GNOME Classic environment.
Procedure
In GNOME Standard, go to Activities Overview and click on the Show Applications icon in the
vertical bar on the left side.
Note that you can choose between displaying all or just the frequent applications by using the
Frequent/All switch at the bottom of the screen.
Alternatively, you can also start typing the name of the required application in the search entry.
11
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
Procedure
Favorites
Accessories
Internet
Office
Sundry
System Tools
Utilities
Procedure
1. Open a terminal.
This approach works both in GNOME Standard and GNOME Classic environment.
Procedure
1. Use one of the approaches described in Launching applications to launch GNOME Software.
NOTE
GNOME Software is a utility, which enables you to install and update applications
and gnome-shell extensions through a graphical environment. This utility is based
on the PackageKit technology, which serves as its back end. GNOME Software
offers mainly the desktop applications, which are the applications that include the
*.desktop file. The available applications are grouped into multiple categories
according to their purpose.
Productivity
12
CHAPTER 1. STARTING USING GNOME
Add-ons
Developer Tools
Utilities
3. Click the selected application, and then click the Install button.
13
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
NOTE
Procedure
1. Start opening a file that is associated with an application or applications that are currently not
installed on your system.
2. GNOME will automatically identify suitable application in which the file can be opened, and will
offer to download the application.
Procedure
2. Open the directory that includes the downloaded rpm in the Nautilus file manager.
NOTE
Procedure
1. Start typing the name of the required application in the search entry.
14
CHAPTER 1. STARTING USING GNOME
GNOME will automatically find the application in a respective repository, and will display the
application’s icon.
1. Click the application’s icon that automatically appears to open GNOME Software.
2. Click again the icon of the application and finish the installation in GNOME Software as
described above.
Procedure
1. Open a terminal.
2. Run the yum install command with the name of the required application:
15
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
In RHEL 8, the Desktop icons functionality is no longer provided by the Nautilus file manager, but by the
desktop icons gnome-shell extension available in the gnome-shell-extension-desktop-icons
package.
After the package has been installed, you can switch the desktop icons on or off by using the Tweaks
application:
2. Put the required file into the /Desktop directory, and the icon appears automatically on your
desktop.
To handle sound, you can use one of these two graphical applications in GNOME:
System menu
16
CHAPTER 1. STARTING USING GNOME
Tweaks tool
System menu is located in the top right corner, and it only enables you to set the intensity of the sound
output or sound input through the sound bar. The sound bar for input sound is available only if you are
running an application that is supposed to use an iternal microphone (built-in audio), such as some
teleconference tools.
17
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
GNOME Control Center provides more options to configure sound. You can launch this tool by using
one of the approaches described in Launching applications. Moreover, you can also launch it from the
System menu by clicking on its icon.
When GNOME Control Center opens, choose Sound from the left vertical bar.
18
CHAPTER 1. STARTING USING GNOME
Through GNOME Control Center - Sound, you can configure the following:
Output sound
Input sound
Sound effects
Applications
The Output and Input menus show only the built-in audio devices unless you connect any external
device that can handle sound.
The Output menu enables you to select the required profile from available analog or digital profiles that
are displayed depending on available output devices.
The Applications menu shows all currently running applications that can process sound, and allows you
to amplify or lower the sound of a particular application.
You can check the available tools under the Graphics & Photography menu in GNOME Software:
19
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
Photos
For accessing, organizisng and sharing your photos.
Inkspace
For creating and editing scalable vector graphics images.
XSane
For scanning images with a scanner.
LibreOffice Draw
For create and editing drawings, flow charts, and logos.
20
CHAPTER 1. STARTING USING GNOME
Procedure
1. Use one of the approaches described in Section 1.4, “Launching applications” to start the
GNOME Control center GUI.
Moreover, you can also start the GNOME Control center from the system menu in the top right
corner by clicking on the "Settings" icon.
Devices → Printers
21
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
This section describes how to add a new printer using the GNOME Control center GUI.
Prerequisites
To be able to add a new printer using the GNOME Control center GUI, you must click on Unlock, which
appears on the right side of the top bar, and authenticate as one of the following users:
Superuser
Any user with the administrative access provided by sudo (users listed within /etc/sudoers)
Procedure
22
CHAPTER 1. STARTING USING GNOME
2. Select one of the available printers (including also network printers), or enter printer IP address
or the hostname of a printer server.
23
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
Click the "settings" button on the right to display a settings menu for the selected printer:
24
CHAPTER 1. STARTING USING GNOME
Click Use Printer by Default to set the selected printer as the default printer:
25
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
Click Use Printer by Default to set the selected printer as the default printer:
Removing a printer
Procedure
You might want to print a test page if one of the below prerequisites is met.
Prerequisites
Procedure
1. Click the "settings" button on the right to display a settings menu for the selected printer:
26
CHAPTER 1. STARTING USING GNOME
Procedure
1. Click the "settings" button on the right to display a settings menu for the selected printer:
When running a remote desktop session on GNOME Shell on Wayland, PipeWire and the VNC server is
used. The functionality of remote desktop session is provided by the gnome-remote-desktop and
pipewire packages.
On X.Org, just VNC is needed to run a remote desktop session. This functionality on X.Org is provided
by the vino package.
PipeWire is used also with teleconference tools such as BlueJeans when running on GNOME Shell on
27
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
PipeWire is used also with teleconference tools such as BlueJeans when running on GNOME Shell on
Wayland. In such case, the pipewire service is activated automatically when you start sharing your
screen within the teleconference tool.
To open Tweaks, use one of the approaches described in Section 1.4, “Launching applications”.
To choose the required item that you want to customize, use the vertical menu on the left. For example
you can choose the applications to start automatically when you log in by using the Statup Applications
menu, or you can customize your top bar appearance by using the Top Bar menu.
28
CHAPTER 1. STARTING USING GNOME
29
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
X11
Wayland
The X11 protocol uses X.Org as the display server. Displaying graphics based on this protocol works the
same way as in Red Hat Enterprise Linux 7, where this was the only option.
The Wayland protocol on Red Hat Enterprise Linux 8 uses GNOME Shell as its compositor and display
server, which is further referred as GNOME Shell on Wayland. Displaying graphics based on the
Wayland protocol has some differences and limitation compared to X11. For more information, see Key
differences between the Wayland and X11 protocol and Current Wayland limitations .
New installations of Red Hat Enterprise Linux 8 automatically select GNOME Shell on Wayland.
However, you can switch to X.Org, or select the required combination of GNOME environment and
display server as described in Section 1.3, “Selecting GNOME environment and display protocol” .
Note that there are also a few environments where X.Org is preferred over GNOME Shell on Wayland,
such as:
Matrox graphics
Aspeed graphics
IMPORTANT
The Nvidia graphics by default use Nouveau, which is an open source driver. Nouveau is
supported on Wayland, hence you can use Nvidia graphics with Nouveau on GNOME
Shell on Wayland without any limitations. However, using Nvidia graphics with proprietary
Nvidia binary drivers is not supported on GNOME Shell on Wayland. In this case, you
need to switch to X.Org as described in Section 1.3, “Selecting GNOME environment and
display protocol”.
NOTE
You can find the current list of environments for which Wayland is not available in the
/usr/lib/udev/rules.d/61-gdm.rules file.
Client applications need to be ported to the Wayland protocol or use a graphical toolkit that has a
30
CHAPTER 2. DISPLAYING GRAPHICS
Client applications need to be ported to the Wayland protocol or use a graphical toolkit that has a
Wayland backend, such as GTK, to be able to work natively with the compositor and display server based
on Wayland.
Legacy X11 applications that cannot be ported to Wayland automatically use Xwayland as a proxy
between the X11 legacy clients and the Wayland compositor. Xwayland functions both as an X11 server
and a Wayland client. The role of Xwayland is to translate the X11 protocol into the Wayland protocol
and reversely, so that X11 legacy applications can work with the display server based on Wayland.
On GNOME Shell on Wayland, Xwayland is started automatically at startup, which ensures that most
X11 legacy applications work as expected when using GNOME Shell on Wayland. However, the X11 and
Wayland protocols are different, and hence some clients relying on X11-specific features may behave
differently under Xwayland. For such specific clients, you can switch to the X.Org display server as
described in Section 1.3, “Selecting GNOME environment and display protocol” .
2.1.2. libinput
Red Hat Enterprise Linux 8 uses a new unified input stack, libinput, which manages all common device
types, such as mice, touchpads, touchscreens, tablets, trackballs and pointing sticks. This unified stack is
used both by the X.Org and by the GNOME Shell on Wayland compositor.
GNOME Shell on Wayland uses libinput directly for all devices, and no switchable driver support is
available. Under X.Org, libinput is implemented as the X.Org libinput driver, and driver support is
outlined below.
Red Hat Enterprise Linux 8 uses the X.Org libinput driver for these devices. The X.Org evdev driver,
which was used in Red Hat Enterprise Linux 7, is available as fallback where required.
2.1.2.2. Touchpads
Red Hat Enterprise Linux 8 uses the X.Org libinput driver for touchpads. The X.Org synaptics driver,
which was used for touchpads in Red Hat Enterprise Linux 7, is no longer available.
Red Hat Enterprise Linux 8 continues using the X.Org wacom driver, which was used for tablet devices
in Red Hat Enterprise Linux 7. However, the X.Org libinput driver is available where required.
Red Hat Enterprise Linux 7 used the X.Org evdev driver for other input devices that are not included
not in the above categories. Red Hat Enterprise Linux 8 uses the X.Org libinput driver by default but
can fall back to the X.Org evdev driver if a device is incompatible with libinput.
2.1.3. Gestures
GNOME Shell on Wayland supports new touchpad and touchscreen gestures. These gestures include:
31
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
NOTE
The Nouveau driver is still supported and is the default driver for Nvidia graphics.
For more advanced VNC usage, you need to switch to X.org, where traditional VNC tools are available.
Hence, it is not possible to use the X display manager to start a session on the X.Org display server from
the same or another computer.
The xrandr utility is not supported because Wayland handles layout, rotations, and resolutions
differently.
Due to stability issues, using X11 instead of Wayland is recommended in virtual environments.
Wayland does not support the custom or niche devices that cannot be handled by the libinput
driver.
32
CHAPTER 3. CONFIGURING GNOME AT LOW LEVEL
dconf
GSettings
gsettings
Firstly, dconf is a key-based Binary Large Object (BLOB) database for storing GNOME configurations.
dconf manages user settings such as GDM, application, and proxy settings, and serves as the back end
for GSettings.
Secondly, dconf is a command-line utility which is used for reading and writing individual values or entire
directories from and to a dconf database.
GSettings is a high-level API for application settings which serves as the front end for dconf.
gsettings is a command-line tool which is used to view and change user settings.
Administrators can also lock settings to prevent users from overriding them.
NOTE
The dconf-editor is not installed on the system by default. To install it, run the following
command as the root user:
33
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
allow browsing and changing options for system and application preferences
can be run by regular users, because both tools are intended to browse and modify the current
user’s GSettings database
The dconf-editor provides a GUI for browsing the settings and their editing. It presents the hierarchy of
settings in a tree-view and also displays additional information about each setting, including the
description, type and default value.
The gsettings utility can be used to display and set dconf values. gsettings utility supports Bash
completion for commands and settings. This tools also allows you to automate configuration in shell
scripts.
For more information on the gsettings utility, see the gsettings(1) man page.
A dconf profile is a list of system’s hardware and software configuration databases, which the dconf
34
CHAPTER 3. CONFIGURING GNOME AT LOW LEVEL
A dconf profile is a list of system’s hardware and software configuration databases, which the dconf
system collects.
The dconf profiles allow you to compare identical systems to troubleshoot hardware or software
problems.
The dconf system stores its profiles in the text files which can be located either within the
/etc/dconf/profile/ directory or elsewhere. The $DCONF_PROFILE environment variable can specify a
relative path to the file from /etc/dconf/profile/, or an absolute path, such as in a user’s home directory.
Note that key pairs which are set in a dconf profile override the default settings.
If set, dconf attempts to open the profile named in the variable and aborts if this step fails.
If not set, dconf attempts to open the profile named user and uses an internal hard-wired
configuration if this step fails.
The first line indicates the database used to write changes. The remaining lines show read-only
databases.
user-db:user
system-db:local
system-db:site
In this example, the dconf profile specifies three databases. user is the name of the user database which
can be found in ~/.config/dconf, and local and site are system databases, located in /etc/dconf/db/.
NOTE
To apply a new dconf user profile to the user’s session, you need to log out and log in,
because the dconf profile for a session is determined at login.
WARNING
35
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
Machine-wide default settings can be set by providing a default for a key in a dconf profile. These
defaults can be overridden by the user.
user-db:user
system-db:local
[org/gnome/desktop/background]
In the default setting of the keyfile, the following GSettings keys are used:
picture-uri filename with the path URI to use for the background
image. Note that the backend
only supports local file:// URIs.
36
CHAPTER 3. CONFIGURING GNOME AT LOW LEVEL
For more information, see Section 3.3, “Displaying GSettings values for desktop applications” .
When the user profile is created or changed, the user needs to log out and log in again before the
changes will be applied.
If you want to avoid creating a user profile, you can use the dconf command-line utility to read and
write individual values or entire directories from and to a dconf database. For more information, see the
dconf(1) man page.
2. Add any number of files with keys that you want to lock into this directory.
Without enforcing the system settings using a lockdown, any settings that users make take precedence
over the system settings. User can thus override the system settings with their own.
Note that dconf keyfile back endonly works properly if the glib2-fam package is installed. Without this
package, notifications on configuration changes made on remote machines are not displayed properly.
With Red Hat Enterprise Linux 8, glib2-fam is available in the BaseOs repository.
37
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
service-db:keyfile/user
The dconf keyfile back endtakes effect the next time that the user logs in. It polls the keyfile to
determine whether updates have been made, so settings may not be updated immediately.
Each GSettings key can have only one value in a dconf database. Setting the same key to a different
value at a different place of the dconf database overrides the previous value.
Values of some keys are of array type. For array type, you can specify the value of the key as a list of
multiple elements separated by a comma.
key=['option1', 'option2']
[org/gnome/desktop/input-sources]
# Enable Ctrl-Alt-Backspace for all users
# Set the Right Alt key as the Compose key and enable it
xkb-options=['terminate:ctrl_alt_bksp', 'compose:ralt']
38
CHAPTER 3. CONFIGURING GNOME AT LOW LEVEL
Example 3.1. Adding selected applications into the favorite applications key
If the operation succeeds, no return code is shown. As a result, all listed applications are added to
favorite applications. The change is valid immediately.
Note that if the KEY argument is not specified, all keys in the schema are monitored. Monitoring
continues until the process is terminated.
To monitor the changes of the favorite applications key, open two terminals and run:
As a result, a notification whether and how favorite applications changed is displayed in the first
terminal:
39
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
Example 3.4. Checking the range of valid values for the remember-mount-password key
As a result, the return code displays type of the key value, which is type b in this particular case. For
more information, see GNOME developer.
Example 3.5. Checking the description of valid values for the picture-uri key
URI to use for the background image. Note that the backend only supports local file:// URIs.
40
CHAPTER 3. CONFIGURING GNOME AT LOW LEVEL
If resetting succeeds, no return code is displayed. Default values are in stored dconf and gsettings-
desktop-schemas files.
The default value of the lock-delay key is 0, and it is stored in the /usr/share/glib-
2.0/schemas/org.gnome.desktop.screensaver.gschema.xml file.
As a result, the lock-delay value is reset to 0, and other keys within the
41
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
As a result, the lock-delay value is reset to 0, and other keys within the
org.gnome.desktop.screensaver schema that were changed by user are reset to their defaults as
well.
If the [--print-paths] argument is specified , the path where each schema is mapped is printed as well.
$ gsettings list-schemas
org.gnome.rhythmbox.library
org.gnome.shell.overrides
org.gnome.system.proxy.https
org.gnome.clocks
org.gnome.eog.fullscreen
org.gnome.login-screen
org.gnome.eog.view
enabled-extensions
command-history
remember-mount-password
always-show-log-out
had-bluetooth-devices-setup
looking-glass-history
disable-user-extensions
app-picker-view
42
CHAPTER 3. CONFIGURING GNOME AT LOW LEVEL
disable-extension-version-validation
development-tools
favorite-apps
keyboard org.gnome.shell.keyboard
keybindings org.gnome.shell.keybindings
Note that if the schema whose keys you want to list is not specified, all keys within all schemas are listed.
$ gsettings list-recursively
As a result, all key and values in all schemas on system are listed, as shown below. Note that the
following list is truncated.
43
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
3.9. ACKNOWLEDGEMENTS
Certain portions of this text first appeared in the GNOME Desktop System Administration Guide .
Copyright © 2014 The GNOME Project, Michael Hill, Jim Campbell, Jeremy Bicha, Ekaterina
Gerasimova, minnie_eg, Aruna Sankaranarayanan, Sindhu S, Shobha Tyagi, Shaun McCance, David King,
and others. Licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License.
The editors of this Red Hat Enterprise Linux 8 documentation would like to thank the GNOME
community members for their valuable contributions to the GNOME Desktop System Administration
Guide.
44
CHAPTER 4. CUSTOMIZING DESKTOP APPEARANCE
If the users of the system are not permitted to change background from the defaults, system
administrator needs to lock the settings using the locks directory. Otherwise, each user can customize
the background according to their preferences.
For more information about GSettings, see Section 3.1, “Introduction to configuring GNOME” .
Procedure
2. Optionally, if you want an user to not be able to change the default background, override the
user’s setting in the /etc/dconf/db/local.d/locks/background file:
# dconf update
4. Users must log out and back in again before the system-wide settings take effect.
45
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
Procedure
1. Use the org.gnome.desktop.background schemas to create a file in the xml format specifying
your extra background’s appearance.
color- "horizontal", "vertical", and "solid" Determines shade the background color.
shading-
type
primary- default: #023c88 Left or Top color when drawing gradients, or the
color solid color.
idef::desktop-title[] The full range of options can be found in the dconf-editor GUI or the
gsettings command-line utility. For more information, see Section 3.3, “Displaying GSettings
values for desktop applications”. endif::
When an user clicks their name in the top right corner, chooses Settings, and in the Personal section of
the table selects Background, they will see the new background available.
46
CHAPTER 4. CUSTOMIZING DESKTOP APPEARANCE
In one configuration file, you can specify multiple <wallpaper> elements to add more backgrounds as
shown in the following example with two <wallpaper> elements, adding two different backgrounds.
For more information on GSettings and dconf, see Section 3.1, “Introduction to configuring GNOME” .
Procedure
[org/gnome/desktop/screensaver]
picture-uri='file:///opt/corp/background.jpg'
Replace /opt/corp/background.jpg with the path to the image file you want to use as the
screen shield. Supported formats are PNG, JPG, JPEG, and TGA. Note that the image will be
scaled if necessary to fit the screen.
# dconf update
3. Users must log out and back in again before the system-wide settings take effect.
Troubleshhoting
If the screen shield does not update, you can:
47
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
1. Make sure that you have updated the system databases by running the dconf update
command as the root user.
IMPORTANT
Before deploying third-party GNOME Shell extensions on Red Hat Enterprise Linux,
make sure to read the following document to learn about the Red Hat support policy for
third-party software:How does Red Hat Global Support Services handle third-party
software, drivers, and/or uncertified hardware/hypervisors?
Procedure
[org/gnome/shell]
# List all extensions that you want to have enabled for all users
enabled-extensions=['[email protected]',
'[email protected]']
The enabled-extensions key specifies the enabled extensions using the extensions' uuid
([email protected] and [email protected]).
# dconf update
3. Users must log out and back in again before the system-wide settings take effect.
NOTE
There is currently no way to enable additional extensions for users who have
already logged in. This does not apply for existing users who have installed and
enabled their own GNOME extensions.
Procedure
48
CHAPTER 4. CUSTOMIZING DESKTOP APPEARANCE
[org/gnome/shell]
# List all extensions that you want to have enabled for all users
enabled-extensions=['[email protected]',
'[email protected]']
The enabled-extensions key specifies the enabled extensions using the extensions' uuid
([email protected] and [email protected]).
2. Override the user’s setting and prevent the user from changing it in
/etc/dconf/db/local.d/locks/extensions:
# dconf update
4. Users must log out and back in again before the system-wide settings take effect.
Prerequisites
The extensions must be installed under the /usr/share/gnome-shell/extensions directory.
Procedure
[org/gnome/shell]
# List all mandatory extensions
enabled-extensions=['[email protected]',
'[email protected]']
The enabled-extensions key specifies the enabled extensions using the extensions' uuid
([email protected] and [email protected]).
2. Override the user’s setting and prevent the user from changing it in
/etc/dconf/db/local.d/locks/extensions-mandatory:
49
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
# dconf update
4. Users must log out and back in again before the system-wide settings take effect.
50
CHAPTER 5. CUSTOMIZING GNOME DESKTOP FEATURES
To enable the Ctrl+Alt+Backspace shortcut to forcibly terminate X.Org by default for all users, you
need to set the org.gnome.desktop.input-sources.xkb-options GSettings key.
Procedure
[org/gnome/desktop/input-sources]
# Enable Ctrl-Alt-Backspace for all users
xkb-options=['terminate:ctrl_alt_bksp']
2. Override the user’s setting, and prevent the user from changing it in
/etc/dconf/db/local.d/locks/input-sources:
# dconf update
4. Users must log out and back in again before the system-wide settings take effect.
If the Ctrl+Alt+Backspace key combination is enabled, all users can terminate X.Org , which brings
them back to the login prompt.
Remove Terminal and any other application that provides access to the terminal from the
51
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
Remove Terminal and any other application that provides access to the terminal from the
Applications menu and Activities Overview in GNOME Shell. This is done by removing menu
items for those applications.
NOTE
The following steps do not remove the desktop user’s permissions to access a command
line, but rather remove the ways that the desktop user could access command line.
Procedure
[org/gnome/desktop/lockdown]
# Disable command-line access
disable-command-line=true
2. Override the user’s setting and prevent the user from changing it in
/etc/dconf/db/local.d/locks/lockdown:
# dconf update
4. Users must log out and back in again before the system-wide settings take effect.
IMPORTANT
You cannot apply the procedure if GNOME Shell on Wayland is used as the display
server.
Procedure
NOTE
52
CHAPTER 5. CUSTOMIZING GNOME DESKTOP FEATURES
NOTE
By convention, these host-specific configuration file names start with two digits
and a hyphen and always have the .conf extension. Thus, the following file name
can be /etc/X11/xorg.conf.d/10-xorg.conf.
Section "Serverflags"
EndSection
2. Restart the X.Org display server for the changes to take effect.
WARNING
Some laptops can overheat if they are left running with the lid closed, especially if
they are in a confined place. Therefore, consider whether changing the default
setting from suspend to an other option is beneficial in your case.
Procedure
[Login]
HandleLidSwitch=lock
53
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
5. Run the following command so that your changes preserve the next restart of the system:
WARNING
Restarting the service forcibly interrupts any currently running GNOME session of
any desktop user who is logged in. This can result in users losing unsaved data.
For more information on the /etc/systemd/logind.conf file, see the logind.conf man page.
For example, if you want the system to shutdown after pressing the power button, use the following
procedure:
Procedure
[org/gnome/settings-daemon/plugins/power]
power-button-action='interactive'
2. Override the user’s setting, and prevent the user from changing it in the
/etc/dconf/db/local.d/locks/01-power file:
/org/gnome/settings-daemon/plugins/power/power-button-action
# dconf update
4. Log out and back in again before the system-wide settings take effect.
This configuration initiates a system shutdown after pressing the power button. To configure the
system differently, you can set the behavior of particular buttons.
nothing
does nothing
suspend
54
CHAPTER 5. CUSTOMIZING GNOME DESKTOP FEATURES
hibernate
hibernates the system
interactive
shows a pop-up query asking the user what to do
With interactive mode, the system powers off automatically after 60 seconds when hitting the
power button. However, you can choose a different behavior from the pop-up query as shown in
the figure below.
55
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
Printing
Repartitioning
IMPORTANT
The feature only works in applications which support it. Not all GNOME and third party
applications have this feature enabled. The changes do not have effect on applications
which do not support this feature.
Procedure
user-db:user
system-db:local
[org/gnome/desktop/lockdown]
3. Override the user’s setting and prevent the user from changing it in the
/etc/dconf/db/local.d/locks/lockdown file:
# dconf update
Having followed these steps, applications supporting this lockdown key, such as Evolution, Evince, or
Gedit, will disable printing.
56
CHAPTER 6. LOCKING DOWN SELECTED TASKS
IMPORTANT
The feature only works in applications which support it. Not all GNOME and third party
applications have this feature enabled. The changes will have no effect on applications
which do not support this feature.
Procedure
user-db:user
system-db:local
[org/gnome/desktop/lockdown]
3. Override the user’s setting and prevent the user from changing it in the
/etc/dconf/db/local.d/locks/lockdown file:
# dconf update
Having followed these steps, applications supporting this lockdown key, for example Videos, Image
Viewer, Evolution, Document Viewer, or GNOME Shell, will disable their Save As dialogs.
IMPORTANT
57
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
Procedure
cp /usr/share/polkit-1/actions/org.freedesktop.udisks2.policy /etc/share/polkit-
1/actions/org.freedesktop.udisks2.policy
2. Delete the action you do not need, and add the following lines to the /etc/polkit-
1/actions/org.freedesktop.udisks2.policy file:
<action id="org.freedesktop.udisks2.modify-device">
<message>Authentication is required to modify the disks settings</message>
<defaults>
<allow_any>no</allow_any>
<allow_inactive>no</allow_inactive>
<allow_active>yes</allow_active>
</defaults>
</action>
Replace no by auth_admin if you want to ensure only the root user is able to perform the
action.
When the user tries to change the disks settings, the following message is returned:
Procedure
user-db:user
system-db:local
3. Create the /etc/dconf/db/local.d/00-logout key file to provide information for the local
database:
[org/gnome/desktop/lockdown]
# Prevent the user from user switching
disable-log-out=true
4. Override the user’s setting, and prevent the user from changing it in the
58
CHAPTER 6. LOCKING DOWN SELECTED TASKS
4. Override the user’s setting, and prevent the user from changing it in the
/etc/dconf/db/local.d/locks/lockdown file:
# dconf update
6. Users must log out and back in again before the system-wide settings take effect.
IMPORTANT
Users can evade the logout lockdown by switching to a different user. To prevent such
scenario, lock down user swithcing as well.
Procedure
user-db:user
system-db:local
[org/gnome/desktop/lockdown]
# Prevent the user from user switching
disable-user-switching=true
4. Override the user’s setting, and prevent the user from changing it in the
/etc/dconf/db/local.d/locks/lockdown file:
# dconf update
6. Users must log out and back in again before the system-wide settings take effect.
59
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
GDM is a replacement for XDM, the X Display Manager. However, GDM is not derived from XDM and
does not contain any original XDM code. In addition, there is no support for a graphical configuration tool
in GDM, so editing the /etc/gdm/custom.conf configuration file is necessary to change the GDM
settings.
WARNING
Restarting the service forcibly interrupts any currently running GNOME session of
any desktop user who is logged in. This can result in users losing unsaved data.
Procedure
Procedure
Procedure
[Desktop Entry]
Type=Application
Name=Files
60
CHAPTER 7. MANAGING USER SESSIONS
Exec=nautilus -n
OnlyShowIn=GNOME;
AutostartCondition=GSettings org.gnome.desktop.background show-desktop-icons
Replace nautilus -n with the command you want to use to run the application.
Run the follwoing procedure to set up automatic login for a user john.
Procedure
Edit the /etc/gdm/custom.conf file, and make sure that the [daemon] section in the file
specifies the following:
[daemon]
AutomaticLoginEnable=True
AutomaticLogin=john
Replace john with the user that you want to be automatically logged in.
WARNING
Users can potentially lose unsaved data if an idle session is automatically ended.
Procedure
[org/gnome/settings-daemon/plugins/power]
# Set the timeout to 900 seconds when on mains power
61
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
sleep-inactive-ac-timeout=900
# Set action after timeout to be logout when on mains power
sleep-inactive-ac-type='logout'
2. Override the user’s setting, and prevent the user from changing it in the
/etc/dconf/db/local.d/locks/autologout file:
# dconf update
4. Users must log out and back in again before the system-wide settings take effect.
org.gnome.settings-daemon.plugins.power.sleep-inactive-ac-timeout
The number of seconds that the computer needs to be inactive before it goes to sleep if it is
running from AC power.
org.gnome.settings-daemon.plugins.power.sleep-inactive-ac-type
What should happen when the timeout has passed if the computer is running from AC power.
org.gnome.settings-daemon.plugins.power.sleep-inactive-battery-timeout
The number of seconds that the computer needs to be inactive before it goes to sleep if it is
running from power.
org.gnome.settings-daemon.plugins.power.sleep-inactive-battery-type
What should happen when the timeout has passed if the computer is running from battery
power.
If you want to list available values for a key, use the following procedure:
Procedure
Run the gsettings range command on the required key. For example:
62
CHAPTER 7. MANAGING USER SESSIONS
Procedure
[org/gnome/settings-daemon/plugins/power]
idle-dim=true
# dconf update
3. Users must log out and back in again before the system-wide settings take effect.
Procedure
[org/gnome/settings-daemon/plugins/power]
idle-brightness=30
# dconf update
3. Users must log out and back in again before the system-wide settings take effect.
Procedure
[org/gnome/desktop/session]
idle-delay=uint32 900
63
Red Hat Enterprise Linux 8 Managing RHEL systems from your desktop
You must include the uint32 along with the integer value as shown.
# dconf update
3. Users must log out and back in again before the system-wide settings take effect.
Procedure
[org/gnome/desktop/session]
# Set the lock time out to 180 seconds before the session is considered idle
idle-delay=uint32 180
[org/gnome/desktop/screensaver]
# Set this to true to lock the screen when the screensaver activates
lock-enabled=true
# Set the lock timeout to 180 seconds after the screensaver has been activated
lock-delay=uint32 180
You must include the uint32 along with the integer key values as shown.
2. Override the user’s setting, and prevent the user from changing it in the
/etc/dconf/db/local.d/locks/screensaver file:
# dconf update
4. Users must log out and back in again before the system-wide settings take effect.
To make a screencast:
Procedure
When the recorder is capturing the screen activity, it displays a red circle in the bottom-right
64
CHAPTER 7. MANAGING USER SESSIONS
When the recorder is capturing the screen activity, it displays a red circle in the bottom-right
corner of the screen.
3. Navigate to the ~/Videos directory where you can find the recorded video with a file name that
starts with Screencast and includes the date and time of the recording.
NOTE
The built-in recorder always captures the entire screen, including all monitors in multi-
monitor setups.
65