diff options
| author | Adrian Ludwig <aludwig@google.com> | 2011-09-30 15:46:41 -0700 |
|---|---|---|
| committer | Android (Google) Code Review <android-gerrit@google.com> | 2011-09-30 15:46:41 -0700 |
| commit | 3fd8275c0a35157fccc10063da3ce6f775c17d4c (patch) | |
| tree | f34526738cefab5a3a527607c1d4a4d9dc0f51b5 /docs/html/guide | |
| parent | 94309e3fc7c3d8fe54f8edb9cf8b59ab62628ff6 (diff) | |
| parent | 4caa0d72ebc935a3dbb3da6cf6d0877a251cd032 (diff) | |
| download | frameworks_base-3fd8275c0a35157fccc10063da3ce6f775c17d4c.zip frameworks_base-3fd8275c0a35157fccc10063da3ce6f775c17d4c.tar.gz frameworks_base-3fd8275c0a35157fccc10063da3ce6f775c17d4c.tar.bz2 | |
Merge "Update existing security FAQ and Developer Overview"
Diffstat (limited to 'docs/html/guide')
| -rw-r--r-- | docs/html/guide/topics/security/security.jd | 25 |
1 files changed, 15 insertions, 10 deletions
diff --git a/docs/html/guide/topics/security/security.jd b/docs/html/guide/topics/security/security.jd index 2e31940..1fd9ba0 100644 --- a/docs/html/guide/topics/security/security.jd +++ b/docs/html/guide/topics/security/security.jd @@ -20,6 +20,10 @@ page.title=Security and Permissions </ol> </div> </div> +<p>This document describes how application developers can use the +security features provided by Android. A more general <a +href="http://source.android.com/tech/security/index.html"> Android Security +Overview</a> is provided in the Android Open Source Project.</p> <p>Android is a privilege-separated operating system, in which each application runs with a distinct system identity (Linux user ID and group @@ -41,7 +45,7 @@ includes reading or writing the user's private data (such as contacts or e-mails), reading or writing another application's files, performing network access, keeping the device awake, etc.</p> -<p>Because the kernel sandboxes applications from each other, applications +<p>Because Android sandboxes applications from each other, applications must explicitly share resources and data. They do this by declaring the <em>permissions</em> they need for additional capabilities not provided by the basic sandbox. Applications statically declare the permissions they @@ -50,11 +54,11 @@ application is installed. Android has no mechanism for granting permissions dynamically (at run-time) because it complicates the user experience to the detriment of security.</p> -<p>The kernel is solely responsible for sandboxing applications from each -other. In particular the Dalvik VM is not a security boundary, and any app -can run native code (see <a href="/sdk/ndk/index.html">the Android NDK</a>). -All types of applications — Java, native, and hybrid — are -sandboxed in the same way and have the same degree of security from each +<p>The application sandbox does not depend on the technology used to build +an application. In particular the Dalvik VM is not a security boundary, and +any app can run native code (see <a href="/sdk/ndk/index.html">the Android +NDK</a>). All types of applications — Java, native, and hybrid — +are sandboxed in the same way and have the same degree of security from each other.</p> <a name="signing"></a> @@ -220,12 +224,13 @@ permission:</p> </pre> <p>You can look at the permissions currently defined in the system with the -shell command <code>adb shell pm list permissions</code>. In particular, -the '-s' option displays the permissions in a form roughly similar to how the -user will see them:</p> +Settings app and the shell command <code>adb shell pm list permissions</code>. +To use the Settings app, go to Settings > Applications. Pick an app and +scroll down to see the permissions that the app uses. For developers, the adb '-s' +option displays the permissions in a form similar to how the user will see them:</p> <pre> -$ adb shell pm list permissions -s +$ adb shell pm list permissions -s All Permissions: Network communication: view Wi-Fi state, create Bluetooth connections, full |
