The permission for which the
SecurityManager
will check when code that is running in an applet calls the
DriverManager.setLogWriter
method or the
DriverManager.setLogStream
(deprecated) method. If there is no
SQLPermission
object, these methods throw a
java.lang.SecurityException
as a runtime exception.
A SQLPermission
object contains a name (also referred to as a "target name") but no actions list; there is either a named permission or there is not. The target name is the name of the permission (see below). The naming convention follows the hierarchical property naming convention. In addition, an asterisk may appear at the end of the name, following a ".", or by itself, to signify a wildcard match. For example: loadLibrary.*
or *
is valid, but *loadLibrary
or a*b
is not valid.
The following table lists all the possible SQLPermission
target names. Currently, the only name allowed is setLog
. The table gives a description of what the permission allows and a discussion of the risks of granting code the permission.
Permission Target Name | What the Permission Allows | Risks of Allowing this Permission |
setLog | Setting of the logging stream | This is a dangerous permission to grant. The contents of the log may contain usernames and passwords, SQL statements, and SQL data. |
The person running an applet decides what permissions to allow and will run the
Policy Tool
to create an
SQLPermission
in a policy file. A programmer does not use a constructor directly to create an instance of
SQLPermission
but rather uses a tool.
@since 1.3
@see java.security.BasicPermission
@see java.security.Permission
@see java.security.Permissions
@see java.security.PermissionCollection
@see java.lang.SecurityManager