03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

►<br />

►<br />

►<br />

►<br />

►<br />

java.net.NetPermission<br />

It controls the Net related targets, no actions associated. For details on the<br />

targets, refer to Sun’s Java 2 Platform <strong>Security</strong> Architecture document.<br />

java.lang.reflect.ReflectPermission<br />

This is a Permission class for reflective operations. It has no actions; it works<br />

like the RuntimePermission. For details on the targets, refer to Sun’s Java 2<br />

Platform <strong>Security</strong> Architecture document.<br />

java.io.SerlializablePermission<br />

This controls the serialization related targets, no actions associated. For<br />

details on the targets, refer to Sun’s Java 2 Platform <strong>Security</strong> Architecture<br />

document.<br />

java.security.<strong>Security</strong>Permission<br />

This controls access to security related objects; no actions associated. For<br />

details on the targets, refer to Sun’s Java 2 Platform <strong>Security</strong> Architecture<br />

document.<br />

java.security.AllPermission<br />

This permission implies all permissions.<br />

Important: No one except Sun Microsystems should extend the permissions<br />

that are built into the Java 2 SDK.<br />

(From the Java 2 Platform <strong>Security</strong> Architecture V1.0 paper by Sun<br />

Microsystems)<br />

Policy files<br />

The policy can be specified within one or more policy configuration files, where<br />

the files indicate what permissions are allowed for codes from specified code<br />

sources.<br />

Definition: a policy configuration file essentially contains a list of entries. It<br />

may contain a keystore entry, and contains zero or more grant entries.<br />

The keystore can be defined according to the following grammar:<br />

keystore “keystore_URL”, “keystore_type”;<br />

200 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!