Debugging applications under different permissions
First Claim
1. A system for debugging an application under a restricted security context, comprising:
- a project system for developing an application;
a deployment system for deploying applications to users;
a debugger that observes run-time behavior of said application and evaluates instructions within said application; and
a hosting process for running said application, wherein during development of said application, said hosting process executes said application under said restricted security context and said debugger provides an indication of an occurrence of a security exception.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method that allows developers to debug a component while it is restricted by any arbitrary set of specific permissions, or restricted by an existing permission set associated with a security “zone.” A security sandbox is mimicked within the development environment so that developers can study how applications perform inside the sandbox. Developers are able create any sandbox and debug inside it, where violating any bound of the artificial sandbox will throw a security exception and drop the user out on the exact line of code which generated the error, as well as provide helpful information about how to correct the error.
81 Citations
22 Claims
-
1. A system for debugging an application under a restricted security context, comprising:
-
a project system for developing an application;
a deployment system for deploying applications to users;
a debugger that observes run-time behavior of said application and evaluates instructions within said application; and
a hosting process for running said application, wherein during development of said application, said hosting process executes said application under said restricted security context and said debugger provides an indication of an occurrence of a security exception. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for debugging a software application under a restricted security context, comprising:
-
executing said software application in a debugging environment;
applying said restricted security context to said software application; and
providing an indication of an occurrence of a security exception. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification