OnDoc
| sign
in
up
~
pub
|
pdf
txt
html
toc
|
<<
>>
1
2
3
4
5
6
7
8
~
51
Table of Contents
Introduction
About this document
Other sources of information
Flash Player client runtime
The Flash Player security environment
Stakeholders
Administrative user (of a particular client computer) and the user institution
User (of a particular computer and programs)
Website owner
Author (of a Flash application)
Overview of permission controls
Sources for potential risk
Innocent bugs
Other stakeholders
Internet providers
Flash Player security claims
New Security Features in Flash Player 9
Flash Player security architecture
Basic sandbox security model
Domain of origin
Default permissions
Accessing data in another sandbox
Permissions for specific domains
Network files
Local files
Interpreters and byte code
Background
Code isolation
Disk, memory, and processor protections
Disk storage protections
Memory usage protections and processor quotas
The Verifier
Permission controls
Administrative user controls
The mms.cfg file
Global Flash Player Trust directory
User controls
Settings Manager
Settings UI and runtime dialog boxes
Privacy settings
Camera settings
Microphone settings
Storage settings
Domain match and HTTP/HTTPS warnings
Network Access Warning
Flash Player Trust directories and files
Website controls
Policy file usage
Developer controls
Permission mechanisms
Security.allowDomain()
Applying the rules
Granting scripting between SWF files
Security.loadPolicyFile()
Security.exactSettings
Security.sandboxType
LocalConnection.allowDomain()
Security restrictions for LocalConnections
LocalConnection channel names
Granting LocalConnection permissions
Local file system options for authors
Options when publishing
ActiveX control and browser plug-in APIs
Hierarchy of local file security controls
Deployment of the Flash Player runtime
Browser plug-ins and ActiveX controls
Authoring player
Stand-alone player and Flash projector
Other distributions
Platform and runtime environment
Deployment of Flash applications
SWF files
Executable projector files
Other security-related information
Network protocols
SSL (Secure Sockets Layer) utilization