Summary
In this chapter, we examined the bounds and adaptability of the Java sandbox. The default sandbox is set up to be administered through a series of policy files, which contain sets of explicit permissions associated with code; this association depends on where the code was loaded from and/or who signed the code.
In the next few chapters, we’ll delve into the details of the sandbox and how it is implemented. We’ll learn how the sandbox is built up from the low-level components of the Java platform. If you’re a developer, we’ll learn how to interact with those components while preserving the sandbox model or how you can replace it altogether. And if you’re just interested in security, you’ll learn the details of how Java achieves its goal of platform security.
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access