123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673 |
- # ===========================================================================
- # Licensed Materials - Property of IBM
- # "Restricted Materials of IBM"
- #
- # IBM SDK, Java(tm) Technology Edition, v7
- # (C) Copyright IBM Corp. 2010, 2014. All Rights Reserved
- #
- # US Government Users Restricted Rights - Use, duplication or disclosure
- # restricted by GSA ADP Schedule Contract with IBM Corp.
- # ===========================================================================
- #
- # This is the "master security properties file".
- #
- # In this file, various security properties are set for use by
- # java.security classes. This is where users can statically register
- # Cryptography Package Providers ("providers" for short). The term
- # "provider" refers to a package or set of packages that supply a
- # concrete implementation of a subset of the cryptography aspects of
- # the Java Security API. A provider may, for example, implement one or
- # more digital signature algorithms or message digest algorithms.
- #
- # Each provider must implement a subclass of the Provider class.
- # To register a provider in this master security properties file,
- # specify the Provider subclass name and priority in the format
- #
- # security.provider.<n>=<className>
- #
- # This declares a provider, and specifies its preference
- # order n. The preference order is the order in which providers are
- # searched for requested algorithms (when no specific provider is
- # requested). The order is 1-based; 1 is the most preferred, followed
- # by 2, and so on.
- #
- # <className> must specify the subclass of the Provider class whose
- # constructor sets the values of various properties that are required
- # for the Java Security API to look up the algorithms or other
- # facilities implemented by the provider.
- #
- # There must be at least one provider specification in java.security.
- #
- # The number 1 is used for the default provider.
- #
- # Note: Providers can be dynamically registered instead by calls to
- # either the addProvider or insertProviderAt method in the Security
- # class.
- #
- # List of providers and their preference orders (see above):
- #
- security.provider.1=com.ibm.jsse2.IBMJSSEProvider2
- security.provider.2=com.ibm.crypto.provider.IBMJCE
- security.provider.3=com.ibm.security.jgss.IBMJGSSProvider
- security.provider.4=com.ibm.security.cert.IBMCertPath
- security.provider.5=com.ibm.security.sasl.IBMSASL
- security.provider.6=com.ibm.xml.crypto.IBMXMLCryptoProvider
- security.provider.7=com.ibm.xml.enc.IBMXMLEncProvider
- security.provider.8=com.ibm.security.jgss.mech.spnego.IBMSPNEGO
- security.provider.9=sun.security.provider.Sun
- #
- # Select the source of seed data for SecureRandom. By default an
- # attempt is made to use the entropy gathering device specified by
- # the securerandom.source property. If an exception occurs when
- # accessing the URL then the traditional system/thread activity
- # algorithm is used.
- #
- # On Solaris and Linux systems, if file:/dev/urandom is specified and it
- # exists, a special SecureRandom implementation is activated by default.
- # This "NativePRNG" reads random bytes directly from /dev/urandom.
- #
- # On Windows systems, the URLs file:/dev/random and file:/dev/urandom
- # enables use of the Microsoft CryptoAPI seed functionality.
- #
- securerandom.source=file:/dev/urandom
- #
- # The entropy gathering device is described as a URL and can also
- # be specified with the system property "java.security.egd". For example,
- # -Djava.security.egd=file:/dev/urandom
- # Specifying this system property will override the securerandom.source
- # setting.
- #
- # Class to instantiate as the javax.security.auth.login.Configuration
- # provider.
- #
- login.configuration.provider=com.ibm.security.auth.login.ConfigFile
- #
- # Default login configuration file
- #
- #login.config.url.1=file:${user.home}/.java.login.config
- #
- # Class to instantiate as the system Policy. This is the name of the class
- # that will be used as the Policy object.
- #
- policy.provider=sun.security.provider.PolicyFile
- # The default is to have a single system-wide policy file,
- # and a policy file in the user's home directory.
- policy.url.1=file:${java.home}/lib/security/java.policy
- policy.url.2=file:${java.home}/lib/security/java.pol
- policy.url.3=file:///${user.home}/.java.policy
- # whether or not we expand properties in the policy file
- # if this is set to false, properties (${...}) will not be expanded in policy
- # files.
- policy.expandProperties=true
- # whether or not we allow an extra policy to be passed on the command line
- # with -Djava.security.policy=somefile. Comment out this line to disable
- # this feature.
- policy.allowSystemProperty=true
- # whether or not we look into the IdentityScope for trusted Identities
- # when encountering a 1.1 signed JAR file. If the identity is found
- # and is trusted, we grant it AllPermission.
- policy.ignoreIdentityScope=false
- #
- # Default keystore type.
- #
- keystore.type=jks
- #
- # List of comma-separated packages that start with or equal this string
- # will cause a security exception to be thrown when
- # passed to checkPackageAccess unless the
- # corresponding RuntimePermission ("accessClassInPackage."+package) has
- # been granted.
- package.access=sun.,\
- com.ibm.tenant.internal.,\
- com.ibm.oti.,\
- com.intel.fortress.,\
- com.sun.xml.internal.,\
- com.sun.imageio.,\
- com.sun.istack.internal.,\
- com.sun.jmx.,\
- com.sun.naming.internal.,\
- com.sun.proxy.,\
- com.sun.corba.se.,\
- com.sun.script.,\
- com.sun.org.apache.bcel.internal.,\
- com.sun.org.apache.regexp.internal.,\
- com.sun.org.apache.xerces.internal.,\
- com.sun.org.apache.xpath.internal.,\
- com.sun.org.apache.xalan.internal.extensions.,\
- com.sun.org.apache.xalan.internal.lib.,\
- com.sun.org.apache.xalan.internal.res.,\
- com.sun.org.apache.xalan.internal.templates.,\
- com.sun.org.apache.xalan.internal.utils.,\
- com.sun.org.apache.xalan.internal.xslt.,\
- com.sun.org.apache.xalan.internal.xsltc.cmdline.,\
- com.sun.org.apache.xalan.internal.xsltc.compiler.,\
- com.sun.org.apache.xalan.internal.xsltc.trax.,\
- com.sun.org.apache.xalan.internal.xsltc.util.,\
- com.sun.org.apache.xml.internal.res.,\
- com.sun.org.apache.xml.internal.serializer.utils.,\
- com.sun.org.apache.xml.internal.utils.,\
- com.sun.org.apache.xml.internal.security.,\
- com.sun.org.glassfish.,\
- org.jcp.xml.dsig.internal.,\
- com.sun.java.accessibility.,\
- com.ibm.rmi.channel.,\
- com.ibm.rmi.iiop.,\
- com.ibm.rmi.io.,\
- com.ibm.rmi.pi.,\
- com.ibm.rmi.poa.,\
- com.ibm.rmi.ras.,\
- com.ibm.rmi.transport.,\
- com.ibm.rmi.util.,\
- com.ibm.stax.,\
- com.ibm.xml.jaxp.datatype.,\
- com.ibm.xml.resolver.,\
- com.ibm.xml.xlxp.api.event.,\
- com.ibm.xml.xlxp.api.jaxp.impl.,\
- com.ibm.xml.xlxp.api.sax.impl.,\
- com.ibm.xml.xlxp.api.stax.events.,\
- com.ibm.xml.xlxp.api.stax.msg.,\
- com.ibm.xml.xlxp.api.stax.serializer.,\
- com.ibm.xml.xlxp.api.util.,\
- com.ibm.xml.xlxp.scan.msg.,\
- com.ibm.xml.xlxp.scan.util.,\
- com.ibm.xtq.ast.parsers.xpath.,\
- com.ibm.xtq.ast.parsers.xslt.,\
- com.ibm.xtq.ast.res.,\
- com.ibm.xtq.ast.visit.,\
- com.ibm.xtq.bcel.,\
- com.ibm.xtq.common.utils.,\
- com.ibm.xtq.utils.,\
- com.ibm.xtq.xml.datamodel.,\
- com.ibm.xtq.xml.dtm.ref.sax2dtm.,\
- com.ibm.xtq.xml.dtm.utils.,\
- com.ibm.xtq.xml.experimental.,\
- com.ibm.xtq.xml.res.,\
- com.ibm.xtq.xml.types.,\
- com.ibm.xtq.xml.unicode.normalize.,\
- com.ibm.xtq.xml.utils.,\
- com.ibm.xtq.xml.xdm.dom.,\
- com.ibm.xtq.xml.xdm.ref.,\
- com.ibm.xtq.xml.xdm.res.,\
- com.ibm.xtq.xpath.jaxp.,\
- com.ibm.xtq.xslt.cmdline.,\
- com.ibm.xtq.xslt.jaxp.interpreter.,\
- com.ibm.xtq.xslt.res.,\
- com.ibm.xtq.xslt.runtime.debug.,\
- com.ibm.xtq.xslt.runtime.output.,\
- com.ibm.xtq.xslt.runtime.res.,\
- com.ibm.xtq.xslt.runtime.v2.,\
- com.ibm.xtq.xslt.translator.v1.,\
- com.ibm.xtq.xslt.translator.v2.,\
- com.ibm.xtq.xslt.typechecker.,\
- com.ibm.xtq.xslt.xylem.autof.,\
- com.ibm.xtq.xslt.xylem.codegen.,\
- com.ibm.xtq.xslt.xylem.interpreter.,\
- com.ibm.xtq.xslt.xylem.optimizers.,\
- com.ibm.xtq.xslt.xylem.parser.,\
- com.ibm.xtq.xslt.xylem.partialeval.,\
- com.ibm.xtq.xslt.xylem.types.,\
- com.ibm.xtq.xslt.xylem.xpath20.analysis.,\
- com.ibm.xtq.xslt.xylem.xpath20.parser.,\
- com.ibm.xtq.xslt.xylem.xpath20.typesystem.,\
- com.ibm.xylem.annot.meta.,\
- com.ibm.xylem.builders.,\
- com.ibm.xylem.codegen.,\
- com.ibm.xylem.commandline.,\
- com.ibm.xylem.config.,\
- com.ibm.xylem.drivers.,\
- com.ibm.xylem.interpreter.,\
- com.ibm.xylem.parser.,\
- com.ibm.xylem.res.,\
- com.ibm.xylem.types.,\
- com.ibm.xylem.utils.,\
- com.sun.org.apache.xalan.internal.xsltc.trax.,\
- com.sun.org.apache.xerces.internal.dom.,\
- com.sun.org.apache.xerces.internal.jaxp.,\
- com.sun.org.apache.xerces.internal.parsers.,\
- com.sun.org.apache.xpath.internal.jaxp.,\
- com.sun.xml.internal.stream.,\
- org.apache.html.dom.,\
- org.apache.wml.,\
- org.apache.xalan.client.,\
- org.apache.xalan.extensions.,\
- org.apache.xalan.lib.sql.,\
- org.apache.xalan.res.,\
- org.apache.xalan.serialize.,\
- org.apache.xalan.templates.,\
- org.apache.xalan.trace.,\
- org.apache.xalan.transformer.,\
- org.apache.xalan.xslt.,\
- org.apache.xalan.xsltc.cmdline.,\
- org.apache.xerces.dom.events.,\
- org.apache.xerces.dom3.as.,\
- org.apache.xerces.impl.dtd.,\
- org.apache.xerces.impl.dv.util.,\
- org.apache.xerces.impl.io.,\
- org.apache.xerces.impl.msg.,\
- org.apache.xerces.impl.validation.,\
- org.apache.xerces.impl.xpath.,\
- org.apache.xerces.impl.xs.,\
- org.apache.xerces.util.,\
- org.apache.xerces.xinclude.,\
- org.apache.xerces.xni.grammars.,\
- org.apache.xerces.xpointer.,\
- org.apache.xerces.xs.datatypes.,\
- org.apache.xml.dtm.ref.dom2dtm.,\
- org.apache.xml.dtm.ref.sax2dtm.,\
- org.apache.xml.res.,\
- org.apache.xml.serializer.charmap.,\
- org.apache.xml.serializer.dom3.,\
- org.apache.xml.serializer.unicode.,\
- org.apache.xml.serializer.utils.,\
- org.apache.xml.utils.,\
- org.apache.xmlcommons.,\
- org.apache.xpath.axes.,\
- org.apache.xpath.compiler.,\
- org.apache.xpath.functions.,\
- org.apache.xpath.objects.,\
- org.apache.xpath.operations.,\
- org.apache.xpath.patterns.,\
- org.apache.xpath.res.,\
- oracle.jrockit.jfr.
- #
- # List of comma-separated packages that start with or equal this string
- # will cause a security exception to be thrown when
- # passed to checkPackageDefinition unless the
- # corresponding RuntimePermission ("defineClassInPackage."+package) has
- # been granted.
- #
- # by default, none of the class loaders supplied with the JDK call
- # checkPackageDefinition.
- #
- package.definition=sun.,\
- com.sun.xml.internal.,\
- com.sun.imageio.,\
- com.sun.istack.internal.,\
- com.sun.jmx.,\
- com.sun.naming.internal.,\
- com.sun.proxy.,\
- com.sun.corba.se.,\
- com.sun.script.,\
- com.sun.org.apache.bcel.internal.,\
- com.sun.org.apache.regexp.internal.,\
- com.sun.org.apache.xerces.internal.,\
- com.sun.org.apache.xpath.internal.,\
- com.sun.org.apache.xalan.internal.extensions.,\
- com.sun.org.apache.xalan.internal.lib.,\
- com.sun.org.apache.xalan.internal.res.,\
- com.sun.org.apache.xalan.internal.templates.,\
- com.sun.org.apache.xalan.internal.utils.,\
- com.sun.org.apache.xalan.internal.xslt.,\
- com.sun.org.apache.xalan.internal.xsltc.cmdline.,\
- com.sun.org.apache.xalan.internal.xsltc.compiler.,\
- com.sun.org.apache.xalan.internal.xsltc.trax.,\
- com.sun.org.apache.xalan.internal.xsltc.util.,\
- com.sun.org.apache.xml.internal.res.,\
- com.sun.org.apache.xml.internal.serializer.utils.,\
- com.sun.org.apache.xml.internal.utils.,\
- com.sun.org.apache.xml.internal.security.,\
- com.sun.org.glassfish.,\
- org.jcp.xml.dsig.internal.,\
- com.sun.java.accessibility.,\
- com.ibm.stax.,\
- com.ibm.xml.jaxp.datatype.,\
- com.ibm.xml.resolver.,\
- com.ibm.xml.xlxp.api.event.,\
- com.ibm.xml.xlxp.api.jaxp.impl.,\
- com.ibm.xml.xlxp.api.sax.impl.,\
- com.ibm.xml.xlxp.api.stax.events.,\
- com.ibm.xml.xlxp.api.stax.msg.,\
- com.ibm.xml.xlxp.api.stax.serializer.,\
- com.ibm.xml.xlxp.api.util.,\
- com.ibm.xml.xlxp.scan.msg.,\
- com.ibm.xml.xlxp.scan.util.,\
- com.ibm.xtq.ast.parsers.xpath.,\
- com.ibm.xtq.ast.parsers.xslt.,\
- com.ibm.xtq.ast.res.,\
- com.ibm.xtq.ast.visit.,\
- com.ibm.xtq.bcel.,\
- com.ibm.xtq.common.utils.,\
- com.ibm.xtq.utils.,\
- com.ibm.xtq.xml.datamodel.,\
- com.ibm.xtq.xml.dtm.ref.sax2dtm.,\
- com.ibm.xtq.xml.dtm.utils.,\
- com.ibm.xtq.xml.experimental.,\
- com.ibm.xtq.xml.res.,\
- com.ibm.xtq.xml.types.,\
- com.ibm.xtq.xml.unicode.normalize.,\
- com.ibm.xtq.xml.utils.,\
- com.ibm.xtq.xml.xdm.dom.,\
- com.ibm.xtq.xml.xdm.ref.,\
- com.ibm.xtq.xml.xdm.res.,\
- com.ibm.xtq.xpath.jaxp.,\
- com.ibm.xtq.xslt.cmdline.,\
- com.ibm.xtq.xslt.jaxp.interpreter.,\
- com.ibm.xtq.xslt.res.,\
- com.ibm.xtq.xslt.runtime.debug.,\
- com.ibm.xtq.xslt.runtime.output.,\
- com.ibm.xtq.xslt.runtime.res.,\
- com.ibm.xtq.xslt.runtime.v2.,\
- com.ibm.xtq.xslt.translator.v1.,\
- com.ibm.xtq.xslt.translator.v2.,\
- com.ibm.xtq.xslt.typechecker.,\
- com.ibm.xtq.xslt.xylem.autof.,\
- com.ibm.xtq.xslt.xylem.codegen.,\
- com.ibm.xtq.xslt.xylem.interpreter.,\
- com.ibm.xtq.xslt.xylem.optimizers.,\
- com.ibm.xtq.xslt.xylem.parser.,\
- com.ibm.xtq.xslt.xylem.partialeval.,\
- com.ibm.xtq.xslt.xylem.types.,\
- com.ibm.xtq.xslt.xylem.xpath20.analysis.,\
- com.ibm.xtq.xslt.xylem.xpath20.parser.,\
- com.ibm.xtq.xslt.xylem.xpath20.typesystem.,\
- com.ibm.xylem.annot.meta.,\
- com.ibm.xylem.builders.,\
- com.ibm.xylem.codegen.,\
- com.ibm.xylem.commandline.,\
- com.ibm.xylem.config.,\
- com.ibm.xylem.drivers.,\
- com.ibm.xylem.interpreter.,\
- com.ibm.xylem.parser.,\
- com.ibm.xylem.res.,\
- com.ibm.xylem.types.,\
- com.ibm.xylem.utils.,\
- com.sun.org.apache.xalan.internal.xsltc.trax.,\
- com.sun.org.apache.xerces.internal.dom.,\
- com.sun.org.apache.xerces.internal.jaxp.,\
- com.sun.org.apache.xerces.internal.parsers.,\
- com.sun.org.apache.xpath.internal.jaxp.,\
- com.sun.xml.internal.stream.,\
- org.apache.html.dom.,\
- org.apache.wml.,\
- org.apache.xalan.client.,\
- org.apache.xalan.extensions.,\
- org.apache.xalan.lib.sql.,\
- org.apache.xalan.res.,\
- org.apache.xalan.serialize.,\
- org.apache.xalan.templates.,\
- org.apache.xalan.trace.,\
- org.apache.xalan.transformer.,\
- org.apache.xalan.xslt.,\
- org.apache.xalan.xsltc.cmdline.,\
- org.apache.xerces.dom.events.,\
- org.apache.xerces.dom3.as.,\
- org.apache.xerces.impl.dtd.,\
- org.apache.xerces.impl.dv.util.,\
- org.apache.xerces.impl.io.,\
- org.apache.xerces.impl.msg.,\
- org.apache.xerces.impl.validation.,\
- org.apache.xerces.impl.xpath.,\
- org.apache.xerces.impl.xs.,\
- org.apache.xerces.util.,\
- org.apache.xerces.xinclude.,\
- org.apache.xerces.xni.grammars.,\
- org.apache.xerces.xpointer.,\
- org.apache.xerces.xs.datatypes.,\
- org.apache.xml.dtm.ref.dom2dtm.,\
- org.apache.xml.dtm.ref.sax2dtm.,\
- org.apache.xml.res.,\
- org.apache.xml.serializer.charmap.,\
- org.apache.xml.serializer.dom3.,\
- org.apache.xml.serializer.unicode.,\
- org.apache.xml.serializer.utils.,\
- org.apache.xml.utils.,\
- org.apache.xmlcommons.,\
- org.apache.xpath.axes.,\
- org.apache.xpath.compiler.,\
- org.apache.xpath.functions.,\
- org.apache.xpath.objects.,\
- org.apache.xpath.operations.,\
- org.apache.xpath.patterns.,\
- org.apache.xpath.res.,\
- oracle.jrockit.jfr.
- #
- # Determines whether this properties file can be appended to
- # or overridden on the command line via -Djava.security.properties
- #
- security.overridePropertiesFile=true
- #
- # Determines the default key and trust manager factory algorithms for
- # the javax.net.ssl package.
- #
- ssl.KeyManagerFactory.algorithm=IbmX509
- ssl.TrustManagerFactory.algorithm=PKIX
- #
- # The Java-level namelookup cache policy for successful lookups:
- #
- # any negative value: caching forever
- # any positive value: the number of seconds to cache an address for
- # zero: do not cache
- #
- # default value is forever (FOREVER). For security reasons, this
- # caching is made forever when a security manager is set. When a security
- # manager is not set, the default behavior in this implementation
- # is to cache for 30 seconds.
- #
- # NOTE: setting this to anything other than the default value can have
- # serious security implications. Do not set it unless
- # you are sure you are not exposed to DNS spoofing attack.
- #
- #networkaddress.cache.ttl=-1
- # The Java-level namelookup cache policy for failed lookups:
- #
- # any negative value: cache forever
- # any positive value: the number of seconds to cache negative lookup results
- # zero: do not cache
- #
- # In some Microsoft Windows networking environments that employ
- # the WINS name service in addition to DNS, name service lookups
- # that fail may take a noticeably long time to return (approx. 5 seconds).
- # For this reason the default caching policy is to maintain these
- # results for 10 seconds.
- #
- #
- networkaddress.cache.negative.ttl=10
- #
- # Properties to configure OCSP for certificate revocation checking
- #
- # Enable OCSP
- #
- # By default, OCSP is not used for certificate revocation checking.
- # This property enables the use of OCSP when set to the value "true".
- #
- # NOTE: SocketPermission is required to connect to an OCSP responder.
- #
- # Example,
- # ocsp.enable=true
- #
- # Location of the OCSP responder
- #
- # By default, the location of the OCSP responder is determined implicitly
- # from the certificate being validated. This property explicitly specifies
- # the location of the OCSP responder. The property is used when the
- # Authority Information Access extension (defined in RFC 3280) is absent
- # from the certificate or when it requires overriding.
- #
- # Example,
- # ocsp.responderURL=http://ocsp.example.net:80
- #
- # Subject name of the OCSP responder's certificate
- #
- # By default, the certificate of the OCSP responder is that of the issuer
- # of the certificate being validated. This property identifies the certificate
- # of the OCSP responder when the default does not apply. Its value is a string
- # distinguished name (defined in RFC 2253) which identifies a certificate in
- # the set of certificates supplied during cert path validation. In cases where
- # the subject name alone is not sufficient to uniquely identify the certificate
- # then both the "ocsp.responderCertIssuerName" and
- # "ocsp.responderCertSerialNumber" properties must be used instead. When this
- # property is set then those two properties are ignored.
- #
- # Example,
- # ocsp.responderCertSubjectName="CN=OCSP Responder, O=XYZ Corp"
- #
- # Issuer name of the OCSP responder's certificate
- #
- # By default, the certificate of the OCSP responder is that of the issuer
- # of the certificate being validated. This property identifies the certificate
- # of the OCSP responder when the default does not apply. Its value is a string
- # distinguished name (defined in RFC 2253) which identifies a certificate in
- # the set of certificates supplied during cert path validation. When this
- # property is set then the "ocsp.responderCertSerialNumber" property must also
- # be set. When the "ocsp.responderCertSubjectName" property is set then this
- # property is ignored.
- #
- # Example,
- # ocsp.responderCertIssuerName="CN=Enterprise CA, O=XYZ Corp"
- #
- # Serial number of the OCSP responder's certificate
- #
- # By default, the certificate of the OCSP responder is that of the issuer
- # of the certificate being validated. This property identifies the certificate
- # of the OCSP responder when the default does not apply. Its value is a string
- # of hexadecimal digits (colon or space separators may be present) which
- # identifies a certificate in the set of certificates supplied during cert path
- # validation. When this property is set then the "ocsp.responderCertIssuerName"
- # property must also be set. When the "ocsp.responderCertSubjectName" property
- # is set then this property is ignored.
- #
- # Example,
- # ocsp.responderCertSerialNumber=2A:FF:00
- #
- # Policy for failed Kerberos KDC lookups:
- #
- # When a KDC is unavailable (network error, service failure, etc), it is
- # put inside a blacklist and accessed less often for future requests. The
- # value (case-insensitive) for this policy can be:
- #
- # tryLast
- # KDCs in the blacklist are always tried after those not on the list.
- #
- # tryLess[:max_retries,timeout]
- # KDCs in the blacklist are still tried by their order in the configuration,
- # but with smaller max_retries and timeout values. max_retries and timeout
- # are optional numerical parameters (default 1 and 5000, which means once
- # and 5 seconds). Please notes that if any of the values defined here is
- # more than what is defined in krb5.conf, it will be ignored.
- #
- # Whenever a KDC is detected as available, it is removed from the blacklist.
- # The blacklist is reset when krb5.conf is reloaded. You can add
- # refreshKrb5Config=true to a JAAS configuration file so that krb5.conf is
- # reloaded whenever a JAAS authentication is attempted.
- #
- # Example,
- # krb5.kdc.bad.policy = tryLast
- # krb5.kdc.bad.policy = tryLess:2,2000
- krb5.kdc.bad.policy = tryLast
- # Algorithm restrictions for certification path (CertPath) processing
- #
- # In some environments, certain algorithms or key lengths may be undesirable
- # for certification path building and validation. For example, "MD2" is
- # generally no longer considered to be a secure hash algorithm. This section
- # describes the mechanism for disabling algorithms based on algorithm name
- # and/or key length. This includes algorithms used in certificates, as well
- # as revocation information such as CRLs and signed OCSP Responses.
- #
- # The syntax of the disabled algorithm string is described as this Java
- # BNF-style:
- # DisabledAlgorithms:
- # " DisabledAlgorithm { , DisabledAlgorithm } "
- #
- # DisabledAlgorithm:
- # AlgorithmName [Constraint]
- #
- # AlgorithmName:
- # (see below)
- #
- # Constraint:
- # KeySizeConstraint
- #
- # KeySizeConstraint:
- # keySize Operator DecimalInteger
- #
- # Operator:
- # <= | < | == | != | >= | >
- #
- # DecimalInteger:
- # DecimalDigits
- #
- # DecimalDigits:
- # DecimalDigit {DecimalDigit}
- #
- # DecimalDigit: one of
- # 1 2 3 4 5 6 7 8 9 0
- #
- # The "AlgorithmName" is the standard algorithm name of the disabled
- # algorithm. See "Java Cryptography Architecture Standard Algorithm Name
- # Documentation" for information about Standard Algorithm Names. Matching
- # is performed using a case-insensitive sub-element matching rule. (For
- # example, in "SHA1withECDSA" the sub-elements are "SHA1" for hashing and
- # "ECDSA" for signatures.) If the assertion "AlgorithmName" is a
- # sub-element of the certificate algorithm name, the algorithm will be
- # rejected during certification path building and validation. For example,
- # the assertion algorithm name "DSA" will disable all certificate algorithms
- # that rely on DSA, such as NONEwithDSA, SHA1withDSA. However, the assertion
- # will not disable algorithms related to "ECDSA".
- #
- # A "Constraint" provides further guidance for the algorithm being specified.
- # The "KeySizeConstraint" requires a key of a valid size range if the
- # "AlgorithmName" is of a key algorithm. The "DecimalInteger" indicates the
- # key size specified in number of bits. For example, "RSA keySize <= 1024"
- # indicates that any RSA key with key size less than or equal to 1024 bits
- # should be disabled, and "RSA keySize < 1024, RSA keySize > 2048" indicates
- # that any RSA key with key size less than 1024 or greater than 2048 should
- # be disabled. Note that the "KeySizeConstraint" only makes sense to key
- # algorithms.
- #
- # Note: This property is currently used by Oracle's PKIX implementation. It
- # is not guaranteed to be examined and used by other implementations.
- #
- # Example:
- # jdk.certpath.disabledAlgorithms=MD2, DSA, RSA keySize < 2048
- #
- #
- jdk.certpath.disabledAlgorithms=MD2, RSA keySize < 1024
- # Algorithm restrictions for Secure Socket Layer/Transport Layer Security
- # (SSL/TLS) processing
- #
- # In some environments, certain algorithms or key lengths may be undesirable
- # when using SSL/TLS. This section describes the mechanism for disabling
- # algorithms during SSL/TLS security parameters negotiation, including cipher
- # suites selection, peer authentication and key exchange mechanisms.
- #
- # For PKI-based peer authentication and key exchange mechanisms, this list
- # of disabled algorithms will also be checked during certification path
- # building and validation, including algorithms used in certificates, as
- # well as revocation information such as CRLs and signed OCSP Responses.
- # This is in addition to the jdk.certpath.disabledAlgorithms property above.
- #
- # See the specification of "jdk.certpath.disabledAlgorithms" for the
- # syntax of the disabled algorithm string.
- #
- # Note: This property is currently used by Oracle's JSSE implementation.
- # It is not guaranteed to be examined and used by other implementations.
- #
- # Example:
- # jdk.tls.disabledAlgorithms=MD5, SHA1, DSA, RSA keySize < 2048
|