Deployment Rule Set (original) (raw)

Home Page

Java Platform, Standard Edition Deployment Guide
Contents Previous Next


As of JDK 8u451, JavaFX is no longer included as part of Java SE 8. Please visit https://www.oracle.com/javase/javafx for more information.

The Deployment Rule Set feature is for enterprises that manage their Java desktop environment directly, and provides a way for enterprises to continue using legacy business applications in an environment of ever-tightening Java applet and Java Web Start application security policies. This feature also provides the ability to control the version of the JRE that is used for specific applications.

Java applets, Java Web Start Applications, and JavaFX applications embedded in a browser, known collectively as Rich Internet Applications (RIAs), are accessed from a web server through a browser. To protect the user and minimize the possibility that a RIA was compromised, security checks are performed when a RIA is started, and the user is prompted for permission to run the RIA. The Deployment Rule Set feature enables an enterprise to establish a whitelist of known applications. Applications on the whitelist can be run without most security prompts, however, the following prompts are not suppressed:

Rules for deployment are defined in an XML file and packaged in a signed JAR file. The rules are tested sequentially until one matches the RIA. Depending on the action assigned to the rule, the RIA is then run without security prompts, blocked from running, or run with default processing that shows any security prompts that are applicable. If no rules are matched, then default processing is used. The rules also provide the ability to specify the version of the JRE that is used to run the RIA and suppress the notification of out-of-date JREs.

An active rule set that is installed on the system can be viewed from the Security tab of the Java Control Panel. See Section 20.4, "Security" in Chapter 20, "Java Control Panel" for more information.

The Deployment Rule Set feature requires the Java Plug-in from Java SE 6 Update 10 or later. If a deployment rule set is installed, usage of the plug-in from earlier releases is blocked for all RIAs.

Note:

The Deployment Rule Set feature is optional and shall only be used internally in an organization with a controlled environment. If a JAR file that contains a rule set is distributed or made available publicly, then the certificate used to sign the rule set will be blacklisted and blocked in Java.

This topic contains the following sections:

28.1 Create the Rule Set

The rule set is an XML file that must be named ruleset.xml. Use any text editor to create this file.

28.1.1 Define the Rules

Define the rules that you need to run or block RIAs for your organization. See Section 28.5, "Java Deployment Rule Set DTD" for the syntax of the rule set. If unknown elements or attributes are included in the rule set, warnings are written to the Java Console.

The following elements are valid:

If the rule set is invalid, then an error that describes the problem is shown and all RIAs are blocked. Either the ruleset.xml file must be corrected, or the DeploymentRuleSet.jar file must be removed from the deployment directory (see Section 28.2, "Package and Install the Rule Set" for the location of this directory) before RIAs can be run. If a rule set is reported as invalid, then check for the following problems based on the error you received:

If the DeploymentRuleSet.jar file is removed, RIAs are handled by the default deployment process. See Chapter 24, "Rich Internet Application Deployment Process" for a description of this process.

See Section 28.4, "Examples" for some sample rule sets.

28.1.1.3

The <id> element identifies the RIA or set of RIAs to which the rule applies. To be considered a match, the RIA must match all attributes and child elements present. If no attributes or child elements are present, then the rule matches all RIAs.

Note:

If the action for a rule is run, then at least one attribute or child element must be present.

The valid parent element is . The valid child element is .

The following table describes the valid attributes.

Table 28-2 Attributes for

Attribute Description Required
location URL of the source of the RIA. For RIAs that use JNLP, this value is matched to the href attribute in the main JNLP file, or the jnlp_href parameter for the applet tag. If there is no href attribute or jnlp_href parameter provided, the RIA cannot be matched by location. For a JNLP extension, this value is matched to the location of the extension element in the resource element of the main artifact. For RIAs that do not use JNLP, this value is matched to the URL for the HTML file. The path is case sensitive and UTF-8 encoding is assumed. Use of the HTTPS protocol is strongly recommended to avoid potential man-in-the middle attacks. A location is matched based on the following guidelines: If provided, then the protocols must match exactly. The host name can start with an asterisk followed by a dot (*.), which then matches any host that ends with the string provided after the dot. For example, *.example.com matches host.example.com and host.test.example.com. The host name cannot be just an asterisk. If provided, then the port numbers must match exactly. If provided, then the beginning of the paths must match exactly. If the location attribute does not contain a path, then all paths from the host are considered a match. For example, host.example.com/samples matches host.example.com/samples and host.example.com/samples/test, but does not match host.example.com/test. However, host.example.com matches host.example.com/samples, host.example.com/samples/test, and host.example.com/test. If the location attribute is not present, or the value is null, then the location matches all RIAs. No
title String used in the title element of the JNLP file, or as used by the Java Plug-in. If the title attribute is present and the value is not null, then the value must match the title of the RIA exactly. If the title attribute is not present, or the value is null, then the title matches all RIAs. If the action for a rule is run or default and the title attribute is present, another id attribute or child element must be specified with the title attribute, otherwise the rule is invalid. No

28.1.1.5

Attributes for

Attribute Description Required
algorithm String that defines the hashing algorithm used to generate the value for the hash attribute. Currently, only security hash algorithm SHA-256 is supported. If the value is null, then SHA-256 is used. If a non-null value other than SHA-256 is used, a warning is issued and SHA-256 is used. No
hash String of hexadecimal digits that represent the hash value of the checksum for the uncompressed form of the JAR file (compression level 0). The value is based on the hashing algorithm specified for the algorithm attribute. Yes

2.8.1.1.6

Attributes for

Attribute Description Required
hash String of hexadecimal digits that represent the hash value of the checksum. The value is based on the hashing algorithm specified for the algorithm attribute. Yes

28.1.1.7

The <action> element defines the action taken for any RIA that matches the rule.

The valid parent element is . The valid child element is .

The following table describes the valid attributes:

Table 28-4 Attributes for

Attribute Description Required
permission Action taken. The valid values are block, default, and run. block - RIA is not run. A message is shown to the user. To provide a custom message, include the

element.

default - RIA is run with default processing and any applicable security prompts are shown. See Chapter 24, "Rich Internet Application Deployment Process" for a description of this process.

run - The following types of RIAs are allowed to run without prompts:

Yes

version

String that identifies the version of the JRE to use to run the RIA. This attribute applies only when the value for the permission attribute is run. Use the version attribute when an older JRE is needed for compatibility with specific RIAs. If the version attribute is not present, the RIA is run with the latest JRE available.

The following values are valid:

The version of the JRE that is used is determined by the following order of precedence:

If no version is available that meets the criteria, then the RIA is blocked, and a message is shown to the user. To provide a custom message, include the message element.

No

force

Boolean that indicates if the JRE specified for the version attribute must be used to run the RIA. If this attribute is set to true, the JRE specified in the rule overrides any JRE requested by the RIA. If the JRE specified in the rule is not available, the RIA is blocked. The default is false.

For example, if the RIA requests a JRE in the 1.7 family or later (1.7+) and you know that it does not run with JRE 8, you can create a rule that specifies SECURE-1.7 for the version attribute and set the force attribute to true. This rule forces the RIA to run only with a secure version from the 1.7 family.

This attribute is available in 1.1 and later versions of the Deployment Rule Set.

No

28.1.1.9

28.1.2 Set Up Rules for Calls From JavaScript Code (LiveConnect)

If you need to make calls to your RIA from JavaScript code, then apply the following guidelines to prevent the calls from being blocked:

If the JavaScript code is calling privileged code and you want to suppress mixed code warnings, see Set Up Rules for Mixed Code.

28.1.3 Set Up Rules for Mixed Code

When you create your rule set, ensure that you have rules for all of the artifacts that are associated with the RIAs. Additional rules might be needed to suppress mixed code security warnings that are generated when calls are made between code with different permission levels, or from JavaScript code to privileged Java code. To suppress the mixed code security warnings, include rules in your rule set based on the following requirements of your RIA:

Be aware that the rules shown in this section for suppressing the mixed code prompt also suppress the other security prompts for any RIA that matches the rule. Make sure that your rules are defined in the order needed to provide the control that you want.

28.1.4 Get the Certificate Hash

If you want to define a rule that uses the certificate hash to match RIAs, you need to obtain the correct string of hexadecimal digits. Follow these steps:

  1. Use the following command to print out the certificate information for your JAR file, replacing myjar.jar with the name of your JAR file:
    keytool -printcert -jarfile myjar.jar | more
  2. At the beginning of the output, find Signer #1
  3. In the Certificate fingerprints section under Signer #1, find the line that begins with SHA256.
    The text that follows the SHA256 identifier contains 32 pairs of hexadecimal numbers separated by colons. Use this string for the hash attribute of the certificate element. The string can be used with or without the colons.

28.3 Security Considerations

The Deployment Rule Set feature enables RIAs to run without notifying users of potential security risks. Review the following security considerations to be aware of the risks of using a rule set, and follow any recommendations provided:

28.4 Examples

Example 28-1 allows all RIAs from https://host.example.com/ to run without security prompts. RIAs from other locations do not match the rule so default processing is used and security prompts are shown as applicable.

To ensure that all RIAs are handled by the rule set, you can provide a final rule that matches any RIA that was not matched by a previous rule. The action for this rule must be either block or default. Example 28-2 allows all RIAs from https://host.example.com:8080 to run without security prompts and blocks all other RIAs. The default message is shown when a RIA is blocked because no custom message is provided.

Rules are processed in the order in which they appear in the rule set. Complex patterns can be defined for matching rules by placing the rules in the correct order. Example 28-3 allows RIAs from https://host.example.com to run without security prompts using a secure version of the Java 1.7 platform, but uses default processing for RIAs from https://host.example.com/games, which shows applicable security prompts. RIAs from other locations do not match either rule, so default processing is used.

Example 28-4 modifies the previous rule set and requires only the RIA named Solitaire from https://host.example.com/games to run with default processing. Other RIAs from https://host.example.com are allowed to run without security prompts using a secure version of the Java 1.7 platform. All other RIAs are blocked, and a custom message is shown.

To allow multiple RIAs from multiple locations to run, and all RIAs are signed with the same certificate, you can use the certificate element to identify the RIAs with one rule instead of creating rules for each location and title. Example 28-5 allows all RIAs that are signed with the certificate used by Oracle to run without security prompts using a secure version of the Java platform. RIAs from any host ending with example.com are allowed to run with default processing. All other RIAs are blocked, and a custom message is shown.

To force the use of a specific JRE, use the force attribute of the action element. This attribute is introduced in the 1.1 version of the Deployment Rule Set. Example 28-6 allows RIAs from https://host.example.com/apps to run without security prompts using version 1.8_20 of the JRE. Any version requested by the RIA is ignored. If version 1.8_20 is not available, the RIA is blocked. All other RIAs are blocked, and a custom message is shown.

28.5 Java Deployment Rule Set DTD

The following example shows the DTD for the version 1.1 of the Deployment Rule Set. Version 1.1 is supported by JRE 8u20 and higher. Version 1.0 is supported by JRE 7u40 and higher. Items introduced after version 1.0 are noted.

   <!-- introduced in 1.1 -->

Contents Previous Next