Adobe Developer
Console
Acrobat Enterprise
Security Configuration Guide for Acrobat
  • Application Security Overview
    • Content security
    • Best practices
    • Additional resources
  • Sandbox Protections
    • What is a “sandbox”?
      • Sandbox features
      • User interface configuration
    • Protected View
      • Configuration
        • Registry configuration
        • Trusting PDFs
      • Verifying PV is enabled
      • Protected view FAQs
    • Protected Mode
      • Configuration
        • Trust overrides
        • Logging setup
      • Verifying PM is enabled
      • PM and shell extensions
      • Policy configuration
        • Default read policy
        • Enabling custom policies
        • Creating policies
      • 3rd party plugin support
      • Using 3rd party JS editors
      • Protected Mode dialogs
      • FAQs
    • AppContainer
      • Configuration
  • Enhanced Security
    • Feature interaction
    • Configuration
      • UI and registry config
      • Locking enhanced security
      • Macintosh configuration
      • UNIX configuration
    • Trust overrides
      • Privileged locations
      • Internet Access
      • Certificate trust
      • xdomain policy files
    • User experience
      • FDF, XFDF, and XDP
      • Dialogs and warnings
        • 9.2, 8.1.7, and earlier
        • 9.3, 8.2, and later
    • Examples
      • Most restrictive settings (unlocked)
      • Most restrictive settings (locked)
      • Least restrictive settings
    • Troubleshooting and FAQs
  • JavaScript Controls
    • Permissions basics
    • Workflow diagrams
    • Disabling JavaScript
      • Trusted override
    • Blacklisting JS APIs
      • Blacklist locations
      • Blacklist configuration
      • Trusted override
      • JS blacklist tool
        • Installation
        • Usage
    • Disabling menu-invoked JS
      • Trusted override
    • Disabling global object access
    • High privileged JavaScript
      • Trusted override
        • Certificate trust
    • Certified document trust
    • JavaScript invoked URLs
      • Trusted override
    • JavaScript injection
      • Trusted override
    • Workflow changes by version
      • What you should do
  • Attachments
    • Basic configuration
      • Attachments and 3rd party apps
      • Opening non-PDF file types
      • Setting file type permissions
    • Attachment user interface
      • Resetting attachment permissions
      • Allowing attachments to launch applications
      • Modifying permissions on-the-fly
    • Black lists and white lists
      • Blacklisted extensions
  • Cross Domain Configuration
    • Cross domain basics
      • Same-origin policies
      • Cross domain workflow
      • When you need cross domain access
      • When you don’t need cross domain support
      • PDFs in a standalone application vs. the browser
      • User experience
    • Policy file configuration
      • Policy file syntax
      • Policy file best practices
      • Typical policy
      • Permissive vs. restrictive policies
      • Meta vs. master policies
      • HTTP-HTTPS communications
      • Socket permissions
      • Credential-based permissions
      • Friendly names and alias use
      • IP address
      • Header-based permissions
    • Certificate-based permissions
      • Certified documents
      • Reader enabled documents
      • Adding a certificate hash to a policy file
      • Fingerprint usage rules
    • Server configuration
      • Policy file host basics
      • Differences between Acrobat and Flash
      • Server setup examples
        • JBoss
        • WebSphere
        • SAP Netweaver 7 and 7.1
        • Windows
        • WebLogic
    • Calling policies via JavaScript
    • Troubleshooting
      • Enabling logging
      • General log messages
      • Meta policy messages
      • Policy file parsing/syntax errors
      • Flash only messages
  • External Content Access
    • Internet access
      • Configuration
    • Multimedia (legacy)
      • Configuration
    • XObjects
    • 3D content
    • Flash integration
    • PDF Links
  • Trust Methods
    • Privileged locations
      • UI configuration
      • Wizard configuration
      • UI (on-the-fly) config.
      • Registry configuration
      • Recursive directory trust
      • Disabling Priv. Locations
      • Wildcard and host trust
      • Trusting IE trusted sites
        • Locking IE trusted sites
    • Internet access
    • Certified document trust
    • Per-certificate trust
    • Cross domain trust
    • XObject (stream) access
    • EMF and XPS conversion to PDF
  • FIPS Compliance
    • Document encryption
Enterprise Toolkit Console Help Forum Mobile
Console
Security Configuration Guide for Acrobat
  • »
  • Search


© Copyright 2021, Adobe Inc.. Last update: Jun 29, 2023.