< prev index next >

src/java.base/share/conf/security/java.security

Print this page
rev 55964 : 8162628: Migrate cacerts keystore from JKS


 280 
 281 # whether or not we allow an extra policy to be passed on the command line
 282 # with -Djava.security.policy=somefile. Comment out this line to disable
 283 # this feature.
 284 #
 285 policy.allowSystemProperty=true
 286 
 287 # whether or not we look into the IdentityScope for trusted Identities
 288 # when encountering a 1.1 signed JAR file. If the identity is found
 289 # and is trusted, we grant it AllPermission. Note: the default policy
 290 # provider (sun.security.provider.PolicyFile) does not support this property.
 291 #
 292 policy.ignoreIdentityScope=false
 293 
 294 #
 295 # Default keystore type.
 296 #
 297 keystore.type=pkcs12
 298 
 299 #
 300 # Controls compatibility mode for JKS and PKCS12 keystore types.
 301 #
 302 # When set to 'true', both JKS and PKCS12 keystore types support loading
 303 # keystore files in either JKS or PKCS12 format. When set to 'false' the
 304 # JKS keystore type supports loading only JKS keystore files and the PKCS12
 305 # keystore type supports loading only PKCS12 keystore files.
 306 #
 307 keystore.type.compat=true
 308 
 309 #
 310 # List of comma-separated packages that start with or equal this string
 311 # will cause a security exception to be thrown when passed to the
 312 # SecurityManager::checkPackageAccess method unless the corresponding
 313 # RuntimePermission("accessClassInPackage."+package) has been granted.
 314 #
 315 package.access=sun.misc.,\
 316                sun.reflect.,\
 317 
 318 #
 319 # List of comma-separated packages that start with or equal this string
 320 # will cause a security exception to be thrown when passed to the
 321 # SecurityManager::checkPackageDefinition method unless the corresponding
 322 # RuntimePermission("defineClassInPackage."+package) has been granted.
 323 #
 324 # By default, none of the class loaders supplied with the JDK call
 325 # checkPackageDefinition.




 280 
 281 # whether or not we allow an extra policy to be passed on the command line
 282 # with -Djava.security.policy=somefile. Comment out this line to disable
 283 # this feature.
 284 #
 285 policy.allowSystemProperty=true
 286 
 287 # whether or not we look into the IdentityScope for trusted Identities
 288 # when encountering a 1.1 signed JAR file. If the identity is found
 289 # and is trusted, we grant it AllPermission. Note: the default policy
 290 # provider (sun.security.provider.PolicyFile) does not support this property.
 291 #
 292 policy.ignoreIdentityScope=false
 293 
 294 #
 295 # Default keystore type.
 296 #
 297 keystore.type=pkcs12
 298 
 299 #
 300 # Controls compatibility mode for PEM, JKS and PKCS12 keystore types.
 301 #
 302 # When set to 'true', all PEM, JKS and PKCS12 keystore types support loading
 303 # keystore files in either PEM, JKS or PKCS12 format. When set to 'false' the
 304 # each keystore type supports loading only keystore files of its own.

 305 #
 306 keystore.type.compat=true
 307 
 308 #
 309 # List of comma-separated packages that start with or equal this string
 310 # will cause a security exception to be thrown when passed to the
 311 # SecurityManager::checkPackageAccess method unless the corresponding
 312 # RuntimePermission("accessClassInPackage."+package) has been granted.
 313 #
 314 package.access=sun.misc.,\
 315                sun.reflect.,\
 316 
 317 #
 318 # List of comma-separated packages that start with or equal this string
 319 # will cause a security exception to be thrown when passed to the
 320 # SecurityManager::checkPackageDefinition method unless the corresponding
 321 # RuntimePermission("defineClassInPackage."+package) has been granted.
 322 #
 323 # By default, none of the class loaders supplied with the JDK call
 324 # checkPackageDefinition.


< prev index next >