Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Applets rarely require elevated privileges and . Sign only those applets that require elevated privileges; other applets should not be signed to restrict privileges. (See guideline ENV00-J. Do not sign code that performs only unprivileged operations.) For applications, the security policy that defines the set of permissions should be as restrictive as possible. The default security policy file grants permissions sparingly, however, the flexible security model allows the user to grant additional permissions to applications by defining a custom security policy. Several guidelines deal with granting or limiting permissions:

...