Trail: Security Features in Java SE
Lesson: Implementing Your Own Permission
Section: Putting It All Together
Steps for a User Running ExampleGame (Kim)
Home Page > Security Features in Java SE > Implementing Your Own Permission

Steps for a User Running ExampleGame (Kim)

The steps a user, such as Kim, would take, are:

Import the Certificates as Trusted Certificates

keytool -import -alias chris -file Chris.cer -keystore kim.keystore
keytool -import -alias terry -file Terry.cer -keystore kim.keystore

Set Up a Policy File With the Required Permissions

Here's the complete kim.policy policy file, as described in A Sample Policy File.

Run ExampleGame

To set the high score:

java -Djava.security.manager 
    -Djava.security.policy=kim.policy
    -classpath hs.jar;terry.jar
    com.gamedev.games.ExampleGame set 456

To get the high score:

java -Djava.security.manager
    -Djava.security.policy=kim.policy
    -classpath hs.jar;terry.jar
    com.gamedev.games.ExampleGame get

Notes:


Problems with the examples? Try Compiling and Running the Examples: FAQs.
Complaints? Compliments? Suggestions? Give us your feedback.

Previous page: Steps for the ExampleGame Developer (Terry)
Next page: End of Trail