java.security-windows revision 5696
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen# This is the "master security properties file".
8001ba81cb851b38d86650a2fef5817facffb763johanengelen# In this file, various security properties are set for use by
8001ba81cb851b38d86650a2fef5817facffb763johanengelen# java.security classes. This is where users can statically register
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen# Cryptography Package Providers ("providers" for short). The term
6bc0b25077dcb0cce5dea357de5bab735babe891johanengelen# "provider" refers to a package or set of packages that supply a
6bc0b25077dcb0cce5dea357de5bab735babe891johanengelen# concrete implementation of a subset of the cryptography aspects of
6bc0b25077dcb0cce5dea357de5bab735babe891johanengelen# the Java Security API. A provider may, for example, implement one or
6bc0b25077dcb0cce5dea357de5bab735babe891johanengelen# more digital signature algorithms or message digest algorithms.
6bc0b25077dcb0cce5dea357de5bab735babe891johanengelen# Each provider must implement a subclass of the Provider class.
6bc0b25077dcb0cce5dea357de5bab735babe891johanengelen# To register a provider in this master security properties file,
6bc0b25077dcb0cce5dea357de5bab735babe891johanengelen# specify the Provider subclass name and priority in the format
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen# This declares a provider, and specifies its preference
ed0798e33e14e86b60f8cd254d7131f9d83ba8c0johanengelen# order n. The preference order is the order in which providers are
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen# searched for requested algorithms (when no specific provider is
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen# requested). The order is 1-based; 1 is the most preferred, followed
e6bdf746e2d9e775704a475a29cc1bb167ec271cjohanengelen# by 2, and so on.
e6bdf746e2d9e775704a475a29cc1bb167ec271cjohanengelen# <className> must specify the subclass of the Provider class whose
e6bdf746e2d9e775704a475a29cc1bb167ec271cjohanengelen# constructor sets the values of various properties that are required
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen# for the Java Security API to look up the algorithms or other
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen# facilities implemented by the provider.
6bc0b25077dcb0cce5dea357de5bab735babe891johanengelen# There must be at least one provider specification in java.security.
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen# There is a default provider that comes standard with the JDK. It
adcdea28c696d67996a7dda19cf9863aee48e022johanengelen# is called the "SUN" provider, and its Provider subclass
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen# named Sun appears in the sun.security.provider package. Thus, the
adcdea28c696d67996a7dda19cf9863aee48e022johanengelen# "SUN" provider is registered via the following:
6bc0b25077dcb0cce5dea357de5bab735babe891johanengelen# (The number 1 is used for the default provider.)
6bc0b25077dcb0cce5dea357de5bab735babe891johanengelen# Note: Providers can be dynamically registered instead by calls to
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen# either the addProvider or insertProviderAt method in the Security
63267518b4ce196caab66ef8cbdcfc0921206b3djohanengelen# List of providers and their preference orders (see above):
63267518b4ce196caab66ef8cbdcfc0921206b3djohanengelensecurity.provider.4=com.sun.net.ssl.internal.ssl.Provider
63267518b4ce196caab66ef8cbdcfc0921206b3djohanengelensecurity.provider.5=com.sun.crypto.provider.SunJCE
63267518b4ce196caab66ef8cbdcfc0921206b3djohanengelensecurity.provider.6=sun.security.jgss.SunProvider
63267518b4ce196caab66ef8cbdcfc0921206b3djohanengelensecurity.provider.7=com.sun.security.sasl.Provider
# the securerandom.source property. If an exception occurs when
# accessing the URL then the traditional system/thread activity
# On Solaris and Linux systems, if file:/dev/urandom is specified and it
# This "NativePRNG" reads random bytes directly from /dev/urandom.
# be specified with the system property "java.security.egd". For example,
# Specifying this system property will override the securerandom.source
# Class to instantiate as the javax.security.auth.login.Configuration
# with -Djava.security.policy=somefile. Comment out this line to disable
keystore.type=jks
package.access=sun.,\
package.definition=sun.,\
# or overridden on the command line via -Djava.security.properties
# the javax.net.ssl package.
ssl.KeyManagerFactory.algorithm=SunX509
# ocsp.enable=true
# then both the "ocsp.responderCertIssuerName" and
# "ocsp.responderCertSerialNumber" properties must be used instead. When this
# ocsp.responderCertSubjectName="CN=OCSP Responder, O=XYZ Corp"
# property is set then the "ocsp.responderCertSerialNumber" property must also
# be set. When the "ocsp.responderCertSubjectName" property is set then this
# ocsp.responderCertIssuerName="CN=Enterprise CA, O=XYZ Corp"
# validation. When this property is set then the "ocsp.responderCertIssuerName"
# property must also be set. When the "ocsp.responderCertSubjectName" property
# ocsp.responderCertSerialNumber=2A:FF:00
# more than what is defined in krb5.conf, it will be ignored.
# The blacklist is reset when krb5.conf is reloaded. You can add
# refreshKrb5Config=true to a JAAS configuration file so that krb5.conf is
# krb5.kdc.bad.policy = tryLast
# krb5.kdc.bad.policy = tryLess:2,2000
krb5.kdc.bad.policy = tryLast
# and/or key length. This includes algorithms used in certificates, as well
# jdk.certpath.disabledAlgorithms=MD2, DSA, RSA keySize < 2048
# Algorithm restrictions for Secure Socket Layer/Transport Layer Security
# (SSL/TLS) processing
# when using SSL/TLS. This section describes the mechanism for disabling
# algorithms during SSL/TLS security parameters negotiation, including cipher
# This is in addition to the jdk.certpath.disabledAlgorithms property above.
# See the specification of "jdk.certpath.disabledAlgorithms" for the
# jdk.tls.disabledAlgorithms=MD5, SHA1, DSA, RSA keySize < 2048