Solved

Automatically Trusting Content from a publisher that is using Java

Posted on 2008-10-23
5
6,479 Views
Last Modified: 2013-12-08
For our gradebook application, we use a web interface program that relies on java. The first time that a user visits the website, a Security box opens and prompts the user to run the application or cancel. The Always trust content from this publisher box is checked by default. Is there anyway to suppress this security box and have the application trusted by default?

0
Comment
Question by:Joseph Moody
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 10

Expert Comment

by:anupnellip
ID: 22785702
Add the website to your trusted site on the IE , you can also do this using group policy
0
 
LVL 8

Accepted Solution

by:
mkosbie earned 500 total points
ID: 22785770
This is the default security configuration for Java on IE.  AFAIK, there is no way around it without editing the local computer's security policy.  Sorry.
0
 

Expert Comment

by:nanakai
ID: 23961327
The best way I have found to automatically accept a cert is to import the cert in Control Panel -> Java -> Security -> Certificates.
Once Imported, the file trusted.certs in C:\Documents and Settings\%userprofile%\Application Data\Sun\Java\Deployment\security is updated as trusted.
I have copied this file to target machines with success. The question is if you have multiple certs or unique groups of people that have their own certs it could get sticky unless there is a way to append to the existing trusted.certs file. In my case, I didn't have any so it worked out.
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
Always backup Domain, SYSVOL etc.using processes according to Microsoft Best Practices. This is meant as a disaster recovery process for small environments that did not implement backup processes and did not run a secondary domain controller that ne…
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
How to create a custom search shortcut to site-search Experts Exchange using Google in the Firefox browser. This eliminates the need to type out site:experts-exchange.com whenever you want to search the site. Launch your Bookmark Menu: Press 'Ctrl +…

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question