Creating Applet and ActiveX Security Policies

Applet and ActiveX Security lets you create and enforce security policy for all users of the LAN, rather than relying on each user to correctly configure the security settings in his or her Web browser.

To create an applet and ActiveX security policy:

  1. From the IWSVA menu, click HTTP > Applets and ActiveX > Policies and then click the Add button.

  2. In the Add Policy screen that appears, type a name for the policy, and then define to whom the policy will apply and click Next. (The User ID method—LDAP, IP address, host name—is defined in the Administration > IWSVA Configuration > User Identification | User Identification page).

  3. In the Applets and ActiveX Policy: Add Policy page, under Java Applet Security, choose either:

Conditions:

      • Valid signature, trusted certificate—Means the CA appears in the IWSVA Digital Certificates list, and has not been blacklisted or deactivated.

      • Valid signature, blacklisted certificate—Means the CA appears in the IWSVA Digital Certificates list, but has been blacklisted, for example because it was found to be counterfeit.

      • No signature—Means the Java applet was not signed. Whatever action you specify for this condition will also apply to applets whose signature has been stripped via Settings page rule.

      • Invalid signature—Means the Java applet signature is problematic; for example, the applet has been tampered with.

      • Note: IWSVA will invalidate applet signatures during the process of instrumentation. You can have IWSVA re-sign applets using a new signature, strip the signature, or send it on as invalid. In any case, the applet will be processed as specified here.

Actions:

      • Pass—Although scanned and possibly instrumented, no action against any Java applets will be taken.

      • Instrument and re-sign—Java applets will be opened (signature broken), and, depending on the Applet Instrumentation Settings configuration, preemptory code inserted before re-signing the applet with the signature specified in the Settings page.

      • Instrument and strip signature—Java applets will be opened (signature broken), and depending on the Applet Instrumentation Settings configuration, preemptory code inserted, after which the (now invalid) signature will be stripped—the applet will be unsigned.

      • Block—Java applets that meet the condition specified above will be blocked.

  1. Choose which actions you want IWSVA to allow or to preempt, as explained below.

Allow applets to perform the following file operations:
Allow applets to perform following network operations:  
Allow applets to perform following thread and windows operations:  

 

  1. In the Note: field, for example, type the justification, intent, or authorization for the policy, or just to keep a record of changes.

  2. Click Next to open the ActiveX Security page, and then choose whether to  block Windows CAB and/or Portable Executable files.

  1. Click Next to open the Exceptions to Applet and ActiveX Restrictions page, and then choose the approved URL list.

  2. Click Save to add the policy to the list.

  3. Finally, in the Applets and ActiveX Policies list page, click Deploy Policies to upload the policy to the IWSVA database.

See also