Skip to main content
IBM  
Shop Support Downloads
IBM Home Products Consulting Industries News About IBM
IBM developerWorks : Java : Education - Tutorials
Java security, Part 2: Authentication and authorization
ZIPPDF (letter)PDF (A4)e-mail
Main menuSection menuFeedbackPreviousNext
4. Authorization in JAAS
  


Permissions page 4 of 9


The Java platform has a number of built-in permissions that are used to control access to system resources. For example:


grant signedBy "Brad", codeBase "http://www.bradrubin.com" {
       permission java.io.FilePermission "/tmp/abc", "read";
};

allows code signed by "Brad" and loaded from "http://www.bradrubin.com" to read the /tmp/abc directory. See Resources for a complete listing of Java permissions.


Main menuSection menuFeedbackPreviousNext
Privacy Legal Contact