+

Search Tips   |   Advanced Search

filter.policy

 

//
// Dynamic Policy - Filter Templates
//
// Permissions defined in this file is going to be filtered out in app.policy and was.policy.
//
// The security runtime will attempt to remove permissions defined in "filterMask" from
// application Java 2 Security policy during application start. However, this has some
// limitations, for example, if the application is grant permission to read and write
// to all Java system properties, if the following is defined in "filterMask":
//
//   java.util.PropertyPermission "someproperty", "write";
//
// The security runtime would not remove the permission to read and write to all Java
// system properties, instead it will log warning during application deployment and
// application start.
//
// The security runtime will deny application the permissions defined in "runtimeFilterMask",
// no matter what permissions are granted to the application. Basically, all application threads
// (non-system threads) will be denied permissions defined in "runtimeFilterMask". Be extreme
// careful of what permissions that defined in "runtimeFilterMask", any other permissions could
// cause applications fail to run.
//
// NOTE: Please do not specify permission java.lang.RuntimePermission "getClassLoader" in
//       the "runtimeFilterMask", it is not supported at this time.
//

filterMask {
  permission java.lang.RuntimePermission "exitVM";
  permission java.lang.RuntimePermission "setSecurityManager";
  permission java.security.SecurityPermission "setPolicy";
  permission javax.security.auth.AuthPermission "setLoginConfiguration";
};

runtimeFilterMask {
  permission java.lang.RuntimePermission "exitVM";
  permission java.lang.RuntimePermission "setSecurityManager";
  permission java.security.SecurityPermission "setPolicy";
  permission javax.security.auth.AuthPermission "setLoginConfiguration";
};