主权项 |
1. A method of installing or executing a software application in a computing environment governed by a security application, wherein the security application prohibits installation or execution of untrusted software applications in the computing environment, the method comprising:
executing a security bypass environment in a computing environment governed by the security application that prohibits installation or execution of untrusted software applications, execution of the security bypass environment being allowed by the security application and creating a gateway for installing or executing the untrusted software applications; receiving, via the security bypass environment, information associated with a user or a portion of an untrusted software application to be installed or executed in the computing environment, wherein installation or execution of the untrusted software application in the computing environment is initially prohibited by the security application; applying, via the security bypass environment, one or more access control procedures to the information associated with a user or the portion of the untrusted software application; and performing the installation or the execution of the untrusted software application in the computing environment via the security bypass environment and bypassing the security application in response to satisfaction of access control criteria associated with the one or more access control procedures. |