Was this page helpful?
Your feedback about this content is important. Let us know what you think.
Additional feedback?
1500 characters remaining
Export (0) Print
Expand All

Deploying Signed Form Templates [InfoPath 2003 SDK Documentation]

Office 2003
Applies to:
Microsoft Office InfoPath 2003 Service Pack 1

Before reading this topic, see the "Signed form templates" section in Form Security Model for an understanding of signed form template security. Information and discussions in the Security Levels, E-mail Deployment, and Mobile Form Templates topic are also relevant.

Digitally Signing a Form Template

If you digitally sign a form template, you can set the security level for the form template to Full Trust, which means the form can access files and settings on the user's computer or on a different domain. You can also set the security level for the form template to the Domain or Restricted security level. In addition, you can deploy the signed form template to users who are using an e-mail program and later automatically update the signed form template by sending the updated version to the users as an attachment to an e-mail message. To sign a form template, use the following procedure:

  1. In design mode, on the Tools menu, click Form Options.
  2. In the Form Options dialog box, click the Security tab.
  3. Under Form Signing, select the Sign this form check box.
  4. Click Select Certificate.
  5. In the Select Certificate dialog box, click the certificate you want to use to digitally sign the form.

    Note  The Create Certificate button in the Security tab dialog can be used to generate a test certificate to sign a form template. The test certificate should be used to sign form templates for testing purposes only. Test certificates should not be used to sign form templates that will be distributed publicly. Because the certificates are not issued by a Certificate Authority whose root certificate is already trusted on a user's computer, the test certificate will not validate correctly on the user's computer. If you deploy a form template signed with a test certificate, users of your form template will most likely not be able to open it.

Establishing a Trusted Root Certificate and Publisher

The default security setting for InfoPath is High. In InfoPath, the High security setting is the only setting allowed for signed form templates. The trusted root certificate of the certificate used to sign the form template must be in the trusted root certificate store on the client computer. If not, the publisher of the form template cannot be verified, and users of your form template will not be given the option to trust the publisher. If the trusted root certificate is in the trusted root certificate store, but the publisher is not in the trusted publisher list, users will be prompted and given the option to trust the publisher of the form template.

Note  If a signed form template requests Domain or Restricted access, InfoPath will use the signature to verify that the form template was not tampered with after it was signed. InfoPath also uses the signature to determine whether the form template can be updated automatically.

Deploying Signed Form Templates with Full Trust Access

The primary scenario for deploying signed form templates is to enable domain-like functionality (automatic update) in full-trust forms. A signed form template requesting full-trust access has the same access to system resources as a fully trusted form. For a detailed discussion of how fully trusted forms work and how to create and deploy them, see Understanding Fully Trusted Forms.

Depending upon your organization's computing environment, however, you might prefer to use either signed form templates or fully trusted forms. For example, there are benefits to using a signed form template that requests full-trust access instead of a registered, fully trusted form. A signed form template requesting full-trust access has the following benefits:

  • Does not have to be registered, unlike an unsigned, fully trusted form template.
  • Enables silent automatic update of the form template.

Because you do not have to register a signed form template that requests full-trust access, you do not have to use an installer package or script file to deploy it. This benefit greatly simplifies the deployment of a full-trust form template.

When you update your signed form template that requests full-trust access, all you have to do is send the updated template to the user or update it in a shared location. When the user opens the updated template, the user will not be prompted, and the updated version will silently overwrite the older copy on the user's computer. If you updated the template in a shared location, the user will be able to use the updated copy without being prompted.

If you want to update an unsigned, fully trusted form, you must repackage your form and re-register it. Additionally, an existing, installed fully trusted form template works only for the path to the local computer but does not work for a network path, because the RegForm.exe tool does not support changing a local computer path to a network path. Because a certificate is needed to sign a form template, however, you may prefer to deploy fully trusted, registered form templates, if you do not want to purchase a certificate.

Deploying Signed Form Templates with Domain or Restricted Access

A signed form template that has a Domain or Restricted security level also has the advantage of the automatic update functionality. For example, you could publish a signed form template to a form library on a server that is running Microsoft Windows SharePoint Services or on a server with a Domain security level. When you update your form template in the shared location, users will get the updated copy automatically.

You can find examples of how to publish a form to a SharePoint form library, send a form as an attachment to an e-mail message, save a completed form back to a form library, and disable design mode for users in the Lab 3: Publish a Form in InfoPath 2003 hands-on laboratory on the Office Developer Center Web site.





Show:
© 2015 Microsoft