Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
The text of and illustrations in this document are licensed by Red Hat under a Creative Commons
Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is
available at
http://creativecommons.org/licenses/by-sa/3.0/
. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must
provide the URL for the original version.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert,
Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift,
Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States
and other countries.
Linux ® is the registered trademark of Linus Torvalds in the United States and other countries.
XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States
and/or other countries.
MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and
other countries.
Node.js ® is an official trademark of Joyent. Red Hat is not formally related to or endorsed by the
official Joyent Node.js open source or commercial project.
The OpenStack ® Word Mark and OpenStack logo are either registered trademarks/service marks
or trademarks/service marks of the OpenStack Foundation, in the United States and other
countries and are used with the OpenStack Foundation's permission. We are not affiliated with,
endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
Abstract
This document describes how to customize GNOME, which is the only desktop environment
available in RHEL 9. It covers the instructions for users and system administrators for configuring
GNOME to meet various use cases.
Table of Contents
Table of Contents
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4. . . . . . . . . . . . .
PREFACE
. . . . . . . . . .OPEN
MAKING . . . . . . SOURCE
. . . . . . . . . .MORE
. . . . . . .INCLUSIVE
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5. . . . . . . . . . . . .
. . . . . . . . . . . . . FEEDBACK
PROVIDING . . . . . . . . . . . . ON
. . . .RED
. . . . .HAT
. . . . .DOCUMENTATION
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6. . . . . . . . . . . . .
.CHAPTER
. . . . . . . . . . 1.. .ENABLING
. . . . . . . . . . . .DESKTOP
. . . . . . . . . . ICONS
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7. . . . . . . . . . . . .
1.1. DESKTOP ICONS IN RHEL 9 7
1.2. ENABLING DESKTOP ICONS IN GNOME STANDARD 7
1.3. CREATING A DESKTOP ICON FOR A FILE 8
.CHAPTER
. . . . . . . . . . 2.
. . SETTING
. . . . . . . . . . UP
. . . .STARTUP
. . . . . . . . . . APPLICATIONS
. . . . . . . . . . . . . . . . .IN
. . GNOME
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
..............
2.1. LAUNCHING AN APPLICATION AUTOMATICALLY ON LOGIN 10
2.2. ENABLING STARTUP APPLICATIONS FOR ANOTHER USER IN GNOME 12
2.3. ENABLING SYSTEM-WIDE STARTUP APPLICATIONS FOR ALL USERS IN GNOME 13
. . . . . . . . . . . 3.
CHAPTER . . ENABLING
. . . . . . . . . . . . AUTOMATIC
. . . . . . . . . . . . . .LOGIN
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
..............
. . . . . . . . . . . 4.
CHAPTER . . .ENABLING
. . . . . . . . . . . AUTOMATIC
. . . . . . . . . . . . . .SUSPENSION
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
..............
. . . . . . . . . . . 5.
CHAPTER . . ENABLING
. . . . . . . . . . . . AUTOMATIC
. . . . . . . . . . . . . .SCREEN
. . . . . . . . .LOCK
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
..............
. . . . . . . . . . . 6.
CHAPTER . . .CHANGING
. . . . . . . . . . . .HOW
. . . . . .YOUR
. . . . . . SYSTEM
. . . . . . . . . .BEHAVES
. . . . . . . . . . WHEN
. . . . . . . YOU
. . . . . .CLOSE
. . . . . . . THE
. . . . . LAPTOP
. . . . . . . . . LID
. . . . . . . . . . . . . . . . 17
..............
.CHAPTER
. . . . . . . . . . 7.
. . CUSTOMIZING
. . . . . . . . . . . . . . . . DESKTOP
. . . . . . . . . . .APPEARANCE
. . . . . . . . . . . . . . . AND
. . . . . BRANDING
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
..............
7.1. CUSTOMIZING DESKTOP BACKGROUNDS 18
7.1.1. Customizing the default desktop background 18
7.1.2. Adding extra backgrounds 19
7.1.3. Frequently used background schema keys 19
7.1.4. Setting the screen shield 21
7.2. CUSTOMIZING THE BRANDING OF THE LOGIN SCREEN 22
. . . . . . . . . . . 8.
CHAPTER . . .LAUNCHING
. . . . . . . . . . . . .AN
. . . .APPLICATION
. . . . . . . . . . . . . . .AUTOMATICALLY
. . . . . . . . . . . . . . . . . . .ON
. . . .LOGIN
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24
..............
.CHAPTER
. . . . . . . . . . 9.
. . .RESTRICTING
. . . . . . . . . . . . . . THE
. . . . . DESKTOP
. . . . . . . . . . .SESSION
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
..............
9.1. DISABLING USER LOGOUT AND USER SWITCHING 27
9.2. DISABLING PRINTING 27
9.3. DISABLING FILESAVING 28
9.4. DISABLING THE COMMAND PROMPT 28
9.5. DISABLING REPARTITIONING 29
.CHAPTER
. . . . . . . . . . 10.
. . . RESTRICTING
. . . . . . . . . . . . . . . THE
. . . . .SESSION
. . . . . . . . . .TO
...A
. . SINGLE
. . . . . . . . .APPLICATION
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
..............
10.1. SINGLE-APPLICATION MODE 31
10.2. ENABLING SEARCH APPLIANCE MODE 31
10.3. ENABLING SINGLE-APPLICATION MODE 32
.CHAPTER
. . . . . . . . . . 11.
. . .CONFIGURING
. . . . . . . . . . . . . . . .SOUND
. . . . . . . .IN
. . .GNOME
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
..............
11.1. SOUND CONFIGURATION TOOLS IN GNOME 33
11.2. ACCESSING SOUND CONFIGURATION IN SETTINGS 34
11.3. SOUND OPTIONS IN SETTINGS 35
.CHAPTER
. . . . . . . . . . 12.
. . . DISPLAYING
. . . . . . . . . . . . . .THE
. . . . .SYSTEM
. . . . . . . . .SECURITY
. . . . . . . . . . .CLASSIFICATION
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36
..............
12.1. ENABLING SYSTEM SECURITY CLASSIFICATION BANNERS 36
12.2. NOTIFYING OF THE SYSTEM SECURITY CLASSIFICATION 37
. . . . . . . . . . . 13.
CHAPTER . . . ENABLING
. . . . . . . . . . . .ACCESSIBILITY
. . . . . . . . . . . . . . . . FOR
. . . . . VISUALLY
. . . . . . . . . . . .IMPAIRED
. . . . . . . . . . USERS
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39
..............
1
Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
.CHAPTER
. . . . . . . . . . 14.
. . . USING
. . . . . . . .SPECIAL
. . . . . . . . . CHARACTERS
. . . . . . . . . . . . . . . IN
. . .GNOME
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .45
..............
14.1. ENABLING THE COMPOSE KEY FOR AN INDIVIDUAL USER 45
14.2. ENABLING THE COMPOSE KEY FOR ANOTHER USER 45
14.3. ENABLING THE COMPOSE KEY FOR ALL USERS 46
14.4. COMPOSE KEY SEQUENCES FOR SPECIAL CHARACTERS 47
. . . . . . . . . . . 15.
CHAPTER . . . MANAGING
. . . . . . . . . . . . .GNOME
. . . . . . . . .SHELL
. . . . . . .EXTENSIONS
. . . . . . . . . . . . . . VIA
. . . . COMMAND
. . . . . . . . . . . . .LINE
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48
..............
. . . . . . . . . . . 16.
CHAPTER . . . ENABLING
. . . . . . . . . . . .AND
. . . . . ENFORCING
. . . . . . . . . . . . . .GNOME
. . . . . . . . SHELL
. . . . . . . .EXTENSIONS
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49
..............
16.1. ENABLING SYSTEM-WIDE GNOME SHELL EXTENSIONS 49
16.2. RESTRICTING GNOME SHELL EXTENSIONS 49
2
Table of Contents
3
Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
PREFACE
IMPORTANT
If GNOME does not start or performs poorly on your VMWare virtual machine (VM), see
the following solution: Why does the GUI fail to start on my VMware virtual machine?
4
MAKING OPEN SOURCE MORE INCLUSIVE
5
Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
4. Enter your suggestion for improvement in the Description field. Include links to the relevant
parts of the documentation.
6
CHAPTER 1. ENABLING DESKTOP ICONS
To enable desktop icons in the GNOME Standard environment, you must install the gnome-shell-
extension-desktop-icons package.
Prerequisites
Procedure
7
Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
Prerequisites
Procedure
Verification steps
Check that the icon for the file appears on the desktop.
8
CHAPTER 1. ENABLING DESKTOP ICONS
9
Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
Prerequisites
You have installed gnome-tweaks on your system. For more details, see Installing software in
GNOME
You have installed the application that you want to launch at login.
Procedure
10
CHAPTER 2. SETTING UP STARTUP APPLICATIONS IN GNOME
4. Select an application from the list of available applications and click Add.
Verification
1. Open Tweaks.
11
Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
Additional resources
For more information about lauching applications, see Launching applications in GNOME
Prerequisites
Administrative access.
Procedure
1. Locate the .desktop file in the /usr/share/applications/ directory that corresponds to the
application you want to start automatically.
# cp /usr/share/applications/<yourapp>.desktop /home/<targetuser>/.config/autostart/
Replace <yourapp> with the name of your application. Replace <targetuser> with the
username.
3. Ensure that the .desktop file is owned by the target user and has the correct permissions:
Replace <targetuser> with the username. Replace <yourapp>.desktop with the .desktop file
you copied.
12
CHAPTER 2. SETTING UP STARTUP APPLICATIONS IN GNOME
Verification
The target user should log out of their GNOME session and log back in. The application
specified in the .desktop file should start automatically.
Prerequisites
Administrative access.
Procedure
1. Locate the .desktop file in the /usr/share/applications/ directory that corresponds to the
application you want to start automatically.
2. As the root user, copy the .desktop file to the /etc/xdg/autostart/ directory:
# cp /usr/share/applications/<yourapp>.desktop /etc/xdg/autostart/
3. Ensure that the .desktop file has the correct permissions to be read by all users:
Verification
Users on the system should log out of their sessions and log back in. The application specified in
the system-wide .desktop file should start automatically.
13
Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
WARNING
Enabling automatic login poses security risks. It allows direct access to the user
account without requiring a password. This might lead to unauthorized use of the
system or sensitive data. This risk is significant when the computer is shared, in
public spaces, or physically accessible.
Procedure
1. Open Settings.
2. Click Users.
Once you have enabled automatic login, your computer will automatically log in to the specified user
account the next time you start it up.
14
CHAPTER 4. ENABLING AUTOMATIC SUSPENSION
Procedure
1. Open Settings.
2. Click Power.
5. Set the desired time interval for automatic logout after inactivity.
This interval defines how long your system remains idle before automatically logging you out.
15
Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
Procedure
1. Open Settings.
2. Click Privacy.
5. Set the desired time interval for automatic screen lock delay.
This interval defines how long your screen stays active after itthe screen is automatically locked.
16
CHAPTER 6. CHANGING HOW YOUR SYSTEM BEHAVES WHEN YOU CLOSE THE LAPTOP LID
WARNING
Some laptops can overheat if they are left running with the lid closed, especially in confined spaces.
Consider whether changing this setting is safe for your laptop, especially if you intend to keep the
laptop running with the lid closed for extended periods of time.
Prerequisites
Administrative access.
Procedure
3. If the line starts with the # symbol, remove it to enable the setting.
ignore to do nothing.
For example, to lock the screen upon closing the lid, use this setting:
HandleLidSwitch=lock
17
Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
If the users are not permitted to change background from the defaults, you must lock the settings using
the locks directory. Otherwise, each user can customize the background according to their preferences.
Procedure
[org/gnome/desktop/background]
picture-uri='file:///usr/local/share/backgrounds/wallpaper.jpg' 1
picture-options='scaled' 2
primary-color='000000' 3
secondary-color='FFFFFF' 4
none
wallpaper
centered
scaled
stretched
zoom
spanned
3 Specify the left or top color when drawing gradients or the solid color.
2. Optional: If you want to prevent a user from changing the default background, override the
18
CHAPTER 7. CUSTOMIZING DESKTOP APPEARANCE AND BRANDING
2. Optional: If you want to prevent a user from changing the default background, override the
user’s setting in the /etc/dconf/db/local.d/locks/background file:
# dconf update
4. Users must log out and back in again before the system-wide settings take effect.
Procedure
2. In the new file, specify the extra background files and their appearance in the following format:
3. The new backgrounds are now available to all users in the Background section of the Settings
application.
19
Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
centered
scaled
stretched
zoom
spanned
solid
In one configuration file, you can specify multiple <wallpaper> elements to add more backgrounds
as shown in the following example with two <wallpaper> elements, adding two different
backgrounds.
20
CHAPTER 7. CUSTOMIZING DESKTOP APPEARANCE AND BRANDING
Procedure
[org/gnome/desktop/screensaver]
picture-uri='file:///opt/corp/background.jpg'
Replace /opt/corp/background.jpg with the absolute path to the image file that you want to
use as the default screen shield. Supported formats are PNG, JPG, JPEG, and TGA. Note that
the screen shield scales your image if necessary to fit the screen.
# dconf update
3. Users must log out and back in again before the system-wide settings take effect.
Troubleshooting
# dconf update
21
Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
WARNING
Prerequisites
Prepare an image file in any of the supported formats: ANI, BPM, GIF, GTIFF, ICNS, ICO, JPEG,
JPEG 2000, PCX, PNM, PBM, PGM, PPM, RAS, SVG, TGA, TIFF, WBMP, XBM, or XPM.
The image must be around 48 pixels in height. If it is significantly larger, it will exceed the logo
area.
Store the image file in a location that the gdm user can access. For example, select a universally
readable system directory such as /opt/ or /usr/local/.
Procedure
[org/gnome/login-screen]
logo='/path/to/logo.png'
Replace /path/to/logo.png with the full path to the image file that you want to use as the login
screen logo.
# dconf update
Verification
22
CHAPTER 7. CUSTOMIZING DESKTOP APPEARANCE AND BRANDING
WARNING
23
Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
Prerequisites
You have installed gnome-tweaks on your system. For more details, see Installing software in
GNOME
You have installed the application that you want to launch at login.
Procedure
24
CHAPTER 8. LAUNCHING AN APPLICATION AUTOMATICALLY ON LOGIN
4. Select an application from the list of available applications and click Add.
Verification
1. Open Tweaks.
25
Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
Additional resources
For more information about lauching applications, see Launching applications in GNOME
26
CHAPTER 9. RESTRICTING THE DESKTOP SESSION
Prerequisites
Administrative access.
Procedure
[org/gnome/desktop/lockdown]
# Disable user logut
disable-log-out=true
2. Create a new file under the /etc/dconf/db/local.d/locks/ directory and list the keys or subpaths
you want to lock down:
# dconf update
Prerequisites
Administrative access.
Procedure
[org/gnome/desktop/lockdown]
# Disable printing
disable-printing=true
2. Create a new file under the /etc/dconf/db/local.d/locks/ directory and list the keys or subpaths
you want to lock down:
# Lock printing
/org/gnome/desktop/lockdown/disable-printing
# dconf update
Prerequisites
Administrative access.
Procedure
[org/gnome/desktop/lockdown]
# Disable saving files on disk
disable-save-to-disk=true
2. Create a new file under the /etc/dconf/db/local.d/locks/ directory and list the keys or subpaths
you want to lock down:
# dconf update
Prerequisites
28
CHAPTER 9. RESTRICTING THE DESKTOP SESSION
Administrative access.
Procedure
[org/gnome/desktop/lockdown]
2. Create a new file under the /etc/dconf/db/local.d/locks/ directory and list the keys or subpaths
you want to lock down:
# dconf update
4. For this settings to take effect, users needs to log out and log back in.
IMPORTANT
Prerequisites
Administrative access.
Procedure
# cp /usr/share/polkit-1/actions/org.freedesktop.udisks2.policy /etc/share/polkit-
1/actions/org.freedesktop.udisks2.policy
<action id="org.freedesktop.udisks2.modify-device">
<message>Authentication is required to modify the disks settings</message>
<defaults>
<allow_any>no</allow_any>
<allow_inactive>no</allow_inactive>
29
Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
<allow_active>yes</allow_active>
</defaults>
</action>
If you want to restrict access only to the root user, replace <allow_any>no</allow_any> with
<allow_any>auth_admin</allow_any>.
30
CHAPTER 10. RESTRICTING THE SESSION TO A SINGLE APPLICATION
You can set up single-application mode for several use cases, such as:
As a self-serve machine
As an event manager
As a registration point
The GNOME Kiosk utility provides the single-application mode configuration and sessions.
Procedure
2. At the GNOME login screen, select Search Appliance Session from the gear button menu and
log in as the single-application user.
3. The Mozilla Firefox browser opens as a full-screen window in its kiosk mode. It shows the
Google search page.
Additional resources
31
Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
Procedure
2. At the GNOME login screen, select Kiosk Script Session from the gear button menu and log in
as the single-application user.
3. The gedit text editor opens as a full-screen window. It shows the shell script that configures
which application runs in your single-application session.
Edit the shell script and enter the application that you want to start in the single-application
session.
For example, to start the Mozilla Firefox browser, enter the following content:
#!/usr/bin/sh
6. The next time you log into the single-application session, your selected application runs.
Additional resources
32
CHAPTER 11. CONFIGURING SOUND IN GNOME
To configure sound, you can use one of the following graphical applications in GNOME:
System menu
The system menu is located in the top-right screen corner. It enables you only to set the intensity of the
sound output or sound input through the sound bar. The sound bar for input sound is available only if
you are running an application that is using an internal microphone (built-in audio), such as some
teleconference tools.
Settings
Settings provides other general options to configure sound.
Tweaks
The Tweaks application enables you to configure only volume over-amplification.
33
Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
Additional resources
For more information about PipeWire, see the pipewire man page.
1. Launch Settings.
You can use one of the approaches described in Launching applications in GNOME .
Alternatively, you can also launch it from the system menu by clicking on its icon.
34
CHAPTER 11. CONFIGURING SOUND IN GNOME
Volume Levels
The Volume levels section shows all currently running applications that can process sound, and
allows you to amplify or lower the sound of a particular application.
Output and Input
The Output and Input sections show all built-in audio devices and external audio devices that are
currently connected.
Alert sound
The Alert sound section shows different themes of system audio alerts.
35
Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
The permanent classification banner can appear within the running session, the lock screen, and login
screen, and customize its background color, its font, and its position within the screen.
This procedure creates a red banner with a white text placed on both the top and bottom of the login
screen.
Procedure
[org/gnome/shell]
enabled-extensions=['[email protected]']
[org/gnome/shell/extensions/classification-banner]
background-color='rgba(200,16,46,0.75)'
message='TOP SECRET'
top-banner=true
bottom-banner=true
system-info=true
color='rgb(255,255,255)'
36
CHAPTER 12. DISPLAYING THE SYSTEM SECURITY CLASSIFICATION
WARNING
enabled-extensions=['heads-up-display@gnome-shell-
extensions.gcampax.github.com', 'classification-banner@gnome-shell-
extensions.gcampax.github.com']
# dconf update
Troubleshooting
If the classification banners are not displayed for an existing user, log in as the user and enable
the Classification banner extension using the Extensions application.
Depending on your configuration, the notification can appear at the login screen, after logging in, on the
lock screen, or after a longer time with no user activity. You can always dismiss the notification when it
appears.
Procedure
37
Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
[org/gnome/shell]
enabled-extensions=['[email protected]']
[org/gnome/shell/extensions/heads-up-display]
message-heading="Security classification title"
message-body="Security classification description"
# The following options control when the notification appears:
show-when-locked=true
show-when-unlocking=true
show-when-unlocked=true
Replace the following values with text that describes the security classification of your system:
WARNING
enabled-extensions=['heads-up-display@gnome-shell-
extensions.gcampax.github.com', 'classification-banner@gnome-shell-
extensions.gcampax.github.com']
# dconf update
Troubleshooting
If the notifications are not displayed for an existing user, log in as the user and enable the
Heads-up display message extension using the Extensions application.
38
CHAPTER 13. ENABLING ACCESSIBILITY FOR VISUALLY IMPAIRED USERS
Orca reads information from the screen and communicates it to you using the following components:
Speech Dispatcher
Orca uses Speech Dispatcher to communicate with the speech synthesizer. Speech Dispatcher
supports various speech synthesis backends, ensures that messages from other applications do not
to interrupt the messages from Orca, and provides other functionality.
Speech synthesizer
Provides a speech output. The default speech synthesizer is eSpeak-NG.
Braille display
Provides a tactile output. The BRLTTY service enables this functionality.
Additional resources
Procedure
2. Select Accessibility.
39
Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
Verification
Check that the Accessibility menu icon is displayed on the top bar even when all options from
this menu are switched off.
Procedure
If the top panel shows the Universal Access menu, select Screen Reader in the menu.
Verification
2. Check that the screen reader reads the text in the application.
40
CHAPTER 13. ENABLING ACCESSIBILITY FOR VISUALLY IMPAIRED USERS
In order for the Braille display to work correctly, perform the following procedures.
Table 13.1. Braille display device types and the corresponding syntax
Prerequisites
Procedure
Verification steps
41
Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
Procedure
api-parameters Auth=keyfile:/etc/brlapi.key
This is the default value. Your organization might have overridden it.
Additional resources
Prerequisites
Procedure
2. Find the braille-driver directive, which specifies the driver for your Braille display device.
3. Specify the identification code of the required driver in the braille-driver directive.
Choose the identification code of required driver from the list provided in /etc/brltty.conf. For
example, to use the XWindow driver:
# XWindow
braille-driver xw
To set multiple drivers, list them separated by commas. Automatic detection then chooses from
42
CHAPTER 13. ENABLING ACCESSIBILITY FOR VISUALLY IMPAIRED USERS
To set multiple drivers, list them separated by commas. Automatic detection then chooses from
the listed drivers.
Prerequisites
Procedure
1. If the device is connected by a serial-to-USB adapter, find the actual device name in the kernel
messages on the device plug:
For example:
braille-device serial:ttyS0
Example 13.2. Settings for the first USB device matching Braille driver
braille-device usb:
braille-device usb:nnnnn
Use the device name that you found earlier in the kernel messages:
braille-device serial:ttyUSB0
NOTE
43
Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
NOTE
braille-device bluetooth:xx:xx:xx:xx:xx:xx
Procedure
3. Specify the code of the selected text table in the text-table directive.
For example, to use the text table for American English:
WARNING
If no table is specified, the brltty service does not use a contraction table.
Procedure
44
CHAPTER 14. USING SPECIAL CHARACTERS IN GNOME
To input these special characters, you can define one of the existing keys on your keyboard as a
Compose Key. Once enabled, the Compose Key allows you to type special characters and symbols by
pressing multiple keys in a specific sequence.
Procedure
2. Type Settings and click on the Settings icon to open the Settings application.
7. Once you have selected the Compose Key, close the Settings window.
Now the Compose Key is enabled, and you can use it to input special characters and symbols by pressing
the Compose Key, followed by the corresponding sequence of keys.
Verification
Press the Compose Key, then type the sequence of keys for the special character you want to
input. For example, to type ©, press the Compose Key, then press o and c.
Prerequisites
Administrative access.
Procedure
45
Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
# xhost +
Replace <username> with the username of the user for whom you want to enable the
Compose Key. Replace <compose_key> with the key you want to use as the Compose Key.
You can use the ralt option to designate the right Alt key as the Compose Key.
To see other Compose Key options that you can use to set up a Compose Key on your
keyboard, use:
# xhost -
Verification
Replace <username> with the username of the user for whom you want to check the Compose
Key setting.
Prerequisites
Administrative access.
Procedure
[org/gnome/desktop/input-sources]
xkb-options=['compose:<compose_key>']
Replace <compose_key> with the key you want to use as the Compose Key. You can use the
ralt option to designate the right Alt key as the Compose Key.
To see other Compose Key options that you can use to set up a Compose Key on your
keyboard, use:
46
CHAPTER 14. USING SPECIAL CHARACTERS IN GNOME
# dconf update
3. Restart your system or log out and log back in to your GNOME session for the changes to take
effect.
Now the Compose Key is enabled for all users on the system and they can use it to input special
characters and symbols by pressing the Compose Key, followed by the corresponding sequence of keys.
Verification
Press the Compose Key, then type the sequence of keys for the special character you want to
input. For example, to type ©, press the Compose Key, then press o and c.
47
Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
Each GNOME Shell extension has a UUID (Universally Unique Identifier). You can find the UUID of an
extension on its GNOME Shell Extensions website page.
Procedure
$ gnome-extensions list
Replace the <UUIDs> with the unique identifier assigned to the GNOME Shell extension you want to
install.
Additional resources
48
CHAPTER 16. ENABLING AND ENFORCING GNOME SHELL EXTENSIONS
Prerequisites
Administrative access
Procedure
3. Adjust the permissions to ensure that the extension files are readable and executable by
everyone:
[org/gnome/shell]
enabled-extensions=['[email protected]',
'[email protected]']
# dconf update
After completing these steps, the specified extensions are enabled by default for all new users on your
system.
49
Red Hat Enterprise Linux 9 Customizing the GNOME desktop environment
is consistently available to all users. You can configure a set of mandatory extensions and prevent users
from modifying them. The specified extensions are mandatory for all users, and the Looking Glass tool is
disabled to ensure compliance with the predefined configuration.
Prerequisites
Administrative access
Procedure
[org/gnome/shell]
enabled-extensions=['[email protected]',
'[email protected]']
development-tools=false
/org/gnome/shell/enabled-extensions
/org/gnome/shell/development-tools
# dconf update
Extensions that are not listed in the org.gnome.shell.enabled-extensions file are not loaded by the
GNOME Shell, preventing the user from using them.
50