Home » Core Java » How to run application blocked by Java security

About Santosh Balgar

Santosh Balgar
He is a Software Engineer working in an industry-leading organization. He has completed his bachelors from Visweswaraya Technological University. In his career, he has worked in designing and implementing various software systems involving Java/J2EE, Spring/ Spring Boot, React JS, JQuery, Hibernate and related database technologies. He loves to share his knowledge and always look forward to learning and explore new technologies. He loves to spend his free time with his family. He enjoys traveling and loves to play cricket.

How to run application blocked by Java security

Java is a ubiquitously used programming language. Java team is constantly improving the language’s security features. It is quite common to see Java security warnings while running some programs. This is not like a regular security warning prompted by the operating system.

In this article, I am trying to provide an overview of how to work with Java security settings and what to do when an application is blocked by the Java security system.

1. When does Java security block the application?

Java 7 introduced an ability to manage when and how an untrusted Java application can be run. The moment Java Security system sees an application as a potential risk, the system stops it from running. Some typical scenarios are as follows,

1.1. Unsigned Application

Any application not signed by a trusted certificate authority is blocked by Java. Even the missing name or missing publisher information will attribute to blocking the application. It is potentially very unsafe to run this kind of application.

1.2. Self-signed applications

Application not signed by the authorized certificate authority is very risky to run and they are blocked by default. Own signatures can’t be trusted and they are hindered from getting the file system access.

1.3. Permission attributes missing in the bundle

Normally Java applications are bundled as jar files. Each application must contain the permission file that specifies the privileges required to run the application. If this file is missing, attackers can mimic the same applications with their permission files and easily get access to our computer.

Normally, applications exhibiting the above characteristics are blocked by Java as they don’t meet Java’s security guidelines. In such cases, it is advised to contact the developer or the publisher of the application.

2. Java security explained

Java Security model is focused on protecting the user’s machines from hostile programs.Java accomplishes it by providing a customized sandbox environment to run the untrusted code and application. These Java applications can run only in the boundaries of the Java Sandbox. Sandbox protects us from hostile activities like,

  • Unauthorized file access (reading and writing to the file system)
  • Making network connections
  • Calling native methods and invoking new processes
  • Downloading code

In the traditional security mode users were responsible for scanning the application using antiviruses to ensure safety. With Java sandbox, users can try to run any application and Sandbo will take care of giving permissions and verifying the authenticity of applications.

The Java sandbox is completely customizable. You can customize the sandbox by implementing your own class loader and SecurityManager.

Some of the Java Virtual Machine’s safety features are as follows,

  • Byte code verification before running
  • Tape safety
  • No support for pointers
  • Automated garbage collection
  • Array bounds checking
  • Null reference checking

More reading on Java security can be found here.

Note that from Java 8, applications signed using MD5WithRSA and MD5WithDSA are blocked.

3. How to run a blocked application?

In this section we will see how an application blocked by Java Security can be run.

Java 7 introduced an ability to manage when and how an untrusted application can be run. The various security level decides whether unsupported applications are totally blocked or the user is asked for permission to run.

This section applies to the Windows platform and Java version 8 or higher.

To access Java control panel in Windows, follow the below steps,

  • Go to Control Panel
  • Click on Programs
  • Click on Java to launch Java Control Panel
  • Go to Security tab to change the security settings
application blocked by Java security - control panel
Java Security control panel

Trusted certificates are listed under the Manage Certificates tab. Also, a trusted certificate can be added here.

application blocked by Java security - Manage Certificates
Manage Certificates

By changing the security level and adding certificates we can run the blocked trusted applications in Java.

3.1. Java security levels

In this section let us see each of the Java security levels.

3.1.1. Very High

This is the most restrictive security level. Only the applications with a valid certificate and permission attributes in manifest file are allowed to run after the prompt, all other applications are blocked.

3.1.2. High

This is the default recommended security setting. Applications with a valid or expired certificate and that include permission attributes are allowed t run with a security prompt. Even though certificate revocation status can’t be verified, the application can be run. All other applications are blocked.

3.1.3 Medium (Removed from Java 8)

Only unsigned applications requesting all permissions are blocked. All other applications are allowed to run. The medium-security level is not recommended as it may allow malicious applications to run.

4. Conclusion

Java takes all the due care to block the potential hostile applications. All developers need to take the utmost care to follow secure coding principles and sign their applications with valid trusted certificates.

Do you want to know how to develop your skillset to become a Java Rockstar?

Subscribe to our newsletter to start Rocking right now!

To get you started we give you our best selling eBooks for FREE!


1. JPA Mini Book

2. JVM Troubleshooting Guide

3. JUnit Tutorial for Unit Testing

4. Java Annotations Tutorial

5. Java Interview Questions

6. Spring Interview Questions

7. Android UI Design


and many more ....


Receive Java & Developer job alerts in your Area


Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Inline Feedbacks
View all comments