Package wt.security

The wt.security package gets jarred into wt/security/security.jar, which is signed so that this package may be used within a security manager, namely the Applet sandbox, to perform operations which are not typically allowed to non-signed code.  Each of the Access subclasses wrap a java.XXX api to give applets access to these operations.  Use the getXXXAccess factory method to retrieve an Access instance to perform these calls.  For example, FileAccess.getFileInputStream() wraps java.io.FileInputStream to give applets the ability to read files on the local system.  Additional prompts are displayed to the user for each of these types of operations (the grant/deny dialog you see when trying to upload/download content) per codebase, so that a "rogue" system can not get a copy of the security.jar and perform out-of-the-sandbox operations silently.

See:
          Description

Class Summary
Access  
AWTAccess  
AWTAccess_plugin  
ClassQuery12  
FileAccess Class that provides wrappers to priviledged file methods using the wt.security package.
FileAccess_plugin  
GetHWndWorker  
NetAccess Class that provides wrappers to priviledged network methods using the wt.security package.
NetAccess_plugin  
PrivilegeEditorApplet  
Privileges List of capabilities that a user has allowed access Persisted locally
PrivilegesDialog  
PrivilegesEditor  
PrivilegeSet  
PrivilegeSet_plugin  
PropAccess Class that provides wrappers to priviledged property methods using the wt.security package.
PropAccess_plugin  
RuntimeAccess Class that provides wrappers to priviledged runtime methods using the wt.security package.
RuntimeAccess_plugin  
ThreadAccess  
ThreadAccess_plugin  
WTFileSystemView  
WTJFileChooser  
 

Exception Summary
WTSecurityException Exception wrapper for security exception thrown while using wt.security access classes.
 

Package wt.security Description

The wt.security package gets jarred into wt/security/security.jar, which is signed so that this package may be used within a security manager, namely the Applet sandbox, to perform operations which are not typically allowed to non-signed code.  Each of the Access subclasses wrap a java.XXX api to give applets access to these operations.  Use the getXXXAccess factory method to retrieve an Access instance to perform these calls.  For example, FileAccess.getFileInputStream() wraps java.io.FileInputStream to give applets the ability to read files on the local system.  Additional prompts are displayed to the user for each of these types of operations (the grant/deny dialog you see when trying to upload/download content) per codebase, so that a "rogue" system can not get a copy of the security.jar and perform out-of-the-sandbox operations silently.