Revision as of 07:21, 6 June 2011
A Java Security Manager is now installed to enforce access restrictions in order to reduce exposure. Process and thread control is also prohibited. To confirm that your problem is Engine Security related, please do the following:
1. Collect Engine (MIVR) Logs.
2. Search for the string 'SECURITY_VIOLATION' in them. Occurrence of this string confirms that there is some attempt to access a resource which has been denied by Java Security Manager.
By traversing the parameters ahead of “SECURITY_VIOLATION” string, you will get all the information about access attempt. Following are their meanings:-
Parameter 0: PERMISSION NAME, Parameter 1: PERMISSION ACTION, Parameter 2: APPLICATION NAME, Parameter 3: SCRIPT NAME, Parameter 4: STEP ID, Parameter 5: STEP CLASS, Parameter 6: STEP DESCRIPTION, Parameter 7: EXPRESSION, Parameter 8: EXCEPTION REASON e.g. 2172: Nov 30 14:44:09.612 IST %MIVR-SECURITY_MGR-3-SECURITY_VIOLATION:SECURITY_VIOLATION: Param_0=/opt/cisco/uccx/Customer,Param_1=read,Param_2=[MEDT:220.127.116.11]/opt/cisco/uccx/C:/Program Files/wfavvid_801/Script2.aef$$DEBUG$$18.104.22.168$$29000000001$$,Param_3=[MEDT:22.214.171.124]/opt/cisco/uccx/C:/Program Files/wfavvid_801/Script2.aef,Param_4=19,Param_5=com.cisco.wfframework.obj.WFBeanStep,Param_6=Write Document(d to "/opt/cisco/uccx/Customer/ff.txt"),Param_7=null,Param_8=java.security.AccessControlException: access denied (java.io.FilePermission /opt/cisco/uccx/Customer read)