Created
March 18, 2014 20:31
-
-
Save MyITGuy/9628895 to your computer and use it in GitHub Desktop.
Example deployment.properties file
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#deployment.properties | |
# Security Tab | |
# Enable Java content in the browser | |
deployment.webjava.enabled=true | |
deployment.webjava.enabled.locked | |
# Security Level | |
deployment.security.level=MEDIUM | |
deployment.security.level.locked | |
# Advanced Tab | |
# Debugging\Enable tracing | |
deployment.trace=false | |
deployment.trace.locked | |
# Debugging\Enable logging | |
deployment.log=false | |
deployment.log.locked | |
# Debugging\Show applet lifecycle exceptions | |
deployment.javapi.lifecycle.exception=false | |
deployment.javapi.lifecycle.exception.locked | |
# Java console | |
deployment.console.startup.mode.locked | |
deployment.console.startup.mode=HIDE | |
# Default Java for browsers\Microsoft Internet Explorer | |
deployment.browser.vm.iexplorer=true | |
deployment.browser.vm.iexplorer.locked | |
# Default Java for browsers\Mozilla family | |
deployment.browser.vm.mozilla.locked | |
deployment.browser.vm.mozilla=false | |
# Java Plug-in\Enable the next-generation Java Plug-in (requires browser restart) | |
# This must be done by executing one of the following commands as an administrator: | |
# [Disable] - {JREInstallPath}\bin\ssvagent.exe -high -jpisetup -old | |
# [Enable] - {JREInstallPath}\bin\ssvagent.exe -high -jpisetup -new | |
# Shortcut Creation | |
deployment.javaws.shortcut=ASK_IF_HINTED | |
deployment.javaws.shortcut.locked | |
# JNLP File/MIME Association | |
deployment.javaws.associations=ASK_USER | |
deployment.javaws.associations.locked | |
# Application Installation | |
deployment.javaws.install=IF_HINT | |
deployment.javaws.install.locked | |
#JRE Auto-Download | |
deployment.javaws.autodownload=NEVER | |
deployment.javaws.autodownload.locked | |
# Security Execution Environment\Enable granting elevated access to signed apps | |
# aka. Allow user to grant permissions to signed content | |
deployment.security.askgrantdialog.show=true | |
deployment.security.askgrantdialog.show.locked | |
# Security Execution Environment\Enable granting elevated access to self-signed apps | |
deployment.security.askgrantdialog.notinca=true | |
deployment.security.askgrantdialog.notinca.locked | |
# Security Execution Environment\Show sandbox warning banner | |
deployment.security.sandbox.awtwarningwindow=true | |
deployment.security.sandbox.awtwarningwindow.locked | |
# Security Execution Environment\Allow user to accept JNLP security requests | |
deployment.security.sandbox.jnlp.enhanced=true | |
deployment.security.sandbox.jnlp.enhanced.locked | |
# Security Execution Environment\Don't prompt for client certificate selection when no certificates or only one exists | |
deployment.security.clientauth.keystore.auto=true | |
deployment.security.clientauth.keystore.auto.locked | |
# Security Execution Environment\Warn if site certificate does not match hostname | |
deployment.security.jsse.hostmismatch.warning=true | |
deployment.security.jsse.hostmismatch.warning.locked | |
# Security Execution Environment\Show site certificate from server even if it is valid | |
deployment.security.https.warning.show=false | |
deployment.security.https.warning.show.locked | |
# Mixed code (sandbox vs. trusted) security verification | |
deployment.security.mixcode=DISABLE | |
deployment.security.mixcode.locked | |
# Perform certificate revocation checks on | |
deployment.security.revocation.check=ALL_CERTIFICATES | |
deployment.security.revocation.check.locked | |
# Check for certificate revocation using | |
# Replaces Advanced Security Settings\Check certificates for revocation using Certificate Revocation List (CRLs) | |
# [Certificate Revocation List (CRLs)] - ocsp=false, crl=true | |
# [Online Certificate Status Protocol (OCSP)] - ocsp=true, crl=false | |
# [Bot CRLs and OCSP] - ocsp=true, crl=true | |
deployment.security.validation.ocsp=true | |
deployment.security.validation.ocsp.locked | |
deployment.security.validation.crl=true | |
deployment.security.validation.crl.locked | |
# Advanced Security Settings\Use certificates and keys in browser keystore | |
deployment.security.browser.keystore.use=true | |
deployment.security.browser.keystore.use.locked | |
# Advanced Security Settings\Check certificates for revocation using Certificate Revocation List (CRLs) | |
# See Check for certificate revocation using | |
# Advanced Security Settings\Enable list of trusted publishers | |
deployment.security.pretrust.list=true | |
deployment.security.pretrust.list.locked | |
# Advanced Security Settings\Enable blacklist revocation check | |
deployment.security.blacklist.check=true | |
deployment.security.blacklist.check.locked | |
# Advanced Security Settings\Enable caching password for authentication | |
deployment.security.password.cache=true | |
deployment.security.password.cache.locked | |
# Advanced Security Settings\Enable online certifcate validation | |
deployment.security.revocation.check=NO_CHECK | |
deployment.security.revocation.check.locked | |
# Advanced Security Settings\Use SSL 2.0 compatible ClientHello format | |
deployment.security.SSLv2Hello=false | |
deployment.security.SSLv2Hello.locked | |
# Advanced Security Settings\Use SSL 3.0 | |
deployment.security.SSLv3=true | |
deployment.security.SSLv3.locked | |
# Advanced Security Settings\Use TLS 1.0 | |
deployment.security.TLSv1=true | |
deployment.security.TLSv1.locked | |
# Advanced Security Settings\Use TLS 1.1 | |
deployment.security.TLSv1.1=false | |
deployment.security.TLSv1.1.locked | |
# Advanced Security Settings\Use TLS 1.2 | |
deployment.security.TLSv1.2=false | |
deployment.security.TLSv1.2.locked | |
# Miscellaneous\Place Java icon in system tray | |
# Miscellaneous\Java Quick Starter | |
deployment.system.tray.icon=false | |
deployment.system.tray.icon.locked | |
# Screen: Your Java version is insecure. or Your Java version is out of date. | |
deployment.expiration.check.enabled=false | |
deployment.expiration.check.enabled.locked | |
# | |
deployment.capture.mime.types=true | |
deployment.capture.mime.types.locked | |
deployment.security.expired.warning=false | |
deployment.security.expired.warning.locked | |
deployment.user.security.exception.sites=C:\\WINDOWS\\Sun\\Java\\Deployment\\exception.sites | |
deployment.user.security.exception.sites.locked | |
# Java 7 Update 10 | |
deployment.expiration.decision.10.10.2.locked | |
deployment.expiration.decision.10.10.2=later | |
deployment.expiration.decision.suppression.10.10.2.locked | |
deployment.expiration.decision.suppression.10.10.2=true | |
deployment.expiration.decision.timestamp.10.10.2.locked | |
deployment.expiration.decision.timestamp.10.10.2=2/28/2014 12\:1\:31 |
- rename the file from deployment.properties.txt to deployment.properties
- place in the required location for your OS. For Java 7:
Windows \LocalLow\Sun\Java\Deployment\deployment.properties
UNIX ${user.home}/.java/deployment/deployment.properties
Mac OS X ~/Library/Application Support/Oracle/Java/Deployment/deployment.properties
The best way of doing this depends on your corporate set up (ie local or roaming user profiles?)
is in roaming user profiles.
Can you help?
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Hello all, Please how do I enable the settings on remote computers