|
|
Implementing Your Own Permission |
The steps a user, such as Kim, would take, are:
Import the Certificates as Trusted Certificates
keytool -import -alias chris -file Chris.cer -keystore kim.keystore keytool -import -alias terry -file Terry.cer -keystore kim.keystoreSet Up a Policy File With the Required Permissions
Here's the complete kim.policy policy file, as described in A Sample Policy File.Run TerrysGame
To set the high score:To get the high score:java -Djava.security.manager -Djava.security.policy=kim.policy -classpath hs.jar;terry.jar TerrysGame set 456Notes:java -Djava.security.manager -Djava.security.policy=kim.policy -classpath hs.jar;terry.jar TerrysGame get
- If you don't specify
-Djava.security.manager, the application will run unrestricted (policy files and permissions won't be checked).
- The
-Djava.security.policy=kim.policytells where the policy file is. Note: There are other ways of specifying the policy file. For example, you can add an entry in the security properties file that specifies the inclusion ofkim.policy, as discussed at the end of the Quick Tourlesson.
-classpath hs.jar;terry.jarspecifies the JAR files that contain the class files needed.
- the policy file
kim.policyspecifies the keystorekim.keystore. Since it does not provide an absolute URL location for the keystore, the keystore is assumed to be in the same directory as the policy file.
|
|
Implementing Your Own Permission |