We have an application (Siebel v 8.0) that requires a work-around for a GUI interface problem. The problem with the work around is that it must be initiated from within IE and the code needed to fix the problem opens an instance of ActiveXObject. Here's a snippet of code:
var myShell = new ActiveXObject("WScript.Shell");
var strExe = this.BusComp().GetFieldValue("FullPath");
var strExeWinStyle = this.BusComp().GetFieldValue("WindowStyle");
ar strCommand = strQuote + strExe + strQuote + "{TAB}{TAB}{TAB}" + ", " + strExeWinStyle;
myShell.Run (strCommand);
The problem is that with Windows XP, SP2 ActiveXObject is not considered trusted and opens a prompt on screen asking for comfirmation that it is OK to execute the command and this is not acceptable to the user community. As a work-around to the prompting issue, the application vendor suggested that a modification to the Wscript.Shell CLSID be made to the registry that would make any shelled execution be "Trusted for Scripting" and "Trusted for Initialization". At this point, our IT Security department is concerned about the implications of doing this as it seems to open a vulnerability on our workstations.
So....... Does anyone know of another way to allow this code to run on the machine without the prompt but without having to change the context of Wscript.shell?
Any help would be appreciated.
var myShell = new ActiveXObject("WScript.Shell");
var strExe = this.BusComp().GetFieldValue("FullPath");
var strExeWinStyle = this.BusComp().GetFieldValue("WindowStyle");
ar strCommand = strQuote + strExe + strQuote + "{TAB}{TAB}{TAB}" + ", " + strExeWinStyle;
myShell.Run (strCommand);
The problem is that with Windows XP, SP2 ActiveXObject is not considered trusted and opens a prompt on screen asking for comfirmation that it is OK to execute the command and this is not acceptable to the user community. As a work-around to the prompting issue, the application vendor suggested that a modification to the Wscript.Shell CLSID be made to the registry that would make any shelled execution be "Trusted for Scripting" and "Trusted for Initialization". At this point, our IT Security department is concerned about the implications of doing this as it seems to open a vulnerability on our workstations.
So....... Does anyone know of another way to allow this code to run on the machine without the prompt but without having to change the context of Wscript.shell?
Any help would be appreciated.