Adobe 22002486 Digital Signature User Guide - Page 177
Edit > Preferences > Security Enhanced
View all Adobe 22002486 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 177 highlights
Acrobat 9 Family of Products Security Feature User Guide Migrating and Sharing Security Settings Importing Application Settings with FDF Files 177 Dynamic content: Trusts multimedia and other dynamic content in certified documents. Selecting this option automatically adds documents that are certified with this certificate to the Trusted Documents list which is maintained by the Multimedia Trust Manager. For this reason, verify your application environment is configured correctly. For details, "Controlling Multimedia" on page 136. Embedded high privilege JavaScript: Trusts embedded scripts. Certificate settings do not override application-level settings, so even if JavaScript is enabled for a particular certificate, it may not execute unless the application's preferences allow it. This option requires that the application environment be configured correctly. For details, see "Setting JavaScript Options" on page 139. Privileged system operations (networking, printing, file access, etc.: Some operations represent a security risk more serious than others. Acrobat considers the following operations potential threats to a secure application operating environment: Internet connections, cross domain scripting, silent printing, external-object references, and FDF data injection. If this checkbox is checked, documents that are certified with this certificate will allow these actions. Tip: This feature interacts with the Enhanced Security preferences which may be set by choosing Edit > Preferences > Security (Enhanced). The application always takes the most permissive setting when determining what is allowed. For example, if the trust level for this certificate does not allow privileged operations but the certified file resided in a privileged location, then these operations will be permitted. 6. If you need to specify a policy restriction, do so. Most users only need to set policy restrictions at the request of their administrator. "Certificate Trust Settings" on page 35. 7. Choose OK twice. 8. Choose Close.