Sun-microsystems GLASSFISH ENTERPRISE 820433510 Manual de usuario

Busca en linea o descarga Manual de usuario para Ordenadores Sun-microsystems GLASSFISH ENTERPRISE 820433510. Sun Microsystems GLASSFISH ENTERPRISE 820433510 User Manual Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 256
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente

Indice de contenidos

Pagina 1 - 2.1 Administration Guide

Sun GlassFish Enterprise Server2.1 Administration GuideSun Microsystems, Inc.4150 Network CircleSanta Clara, CA 95054U.S.A.Part No: 820–4335–10Decembe

Pagina 2 - 090122@21808

Overview of Monitoring ... 172About the Tree S

Pagina 3

Note – Enclose the alias password in single quotes as shown in the example.3. Restart the Enterprise Server for the relevant domain.Protecting Files w

Pagina 4

Caution – At this point in time, server instances that are running must not be started andrunning server instances must not be restarted until the SMP

Pagina 5

About Authentication and AuthorizationAuthentication and authorization are central concepts of application server security. Thefollowing topics are di

Pagina 6

TABLE 9–1 Enterprise Server Authentication Methods (Continued)DIGEST HTTP and SIP Server authenticates the client basedon an encrypted response.SSL an

Pagina 7

Conguring Message SecurityMessage Security enables a server to perform end-to-end authentication of web serviceinvocations and responses at the messa

Pagina 8

Note – Users and groups are designated for the entire Enterprise Server, whereas eachapplication denes its own roles. When the application is being p

Pagina 9

RolesA role denes which applications and what parts of each application users can access and whatthey can do. In other words, roles determine users&a

Pagina 10 - Contents

In the JDBC realm, the server gets user credentials from a database. The Enterprise Server usesthe database information and the enabled JDBC realm opt

Pagina 11

Assign a security role to users in the realm.To assign a security role to a user, add a security-role-mapping element to the deploymentdescriptor that

Pagina 12

Most importantly, a certicate binds the owner's public key to the owner's identity. Like apassport binds a photograph to personal informati

Pagina 13

CTheasadmin Utility ...231The

Pagina 14

When a Web browser (client) wants to connect to a secure site, an SSL handshake happens: The browser sends a message over the network requesting a sec

Pagina 15

If all virtual hosts on a single IP address need to authenticate against the same certicate, theaddition of multiple virtual hosts probably will not

Pagina 16

In the Developer Prole, on the server side, the Enterprise Server uses the JSSE format,which uses keytool to manage certicates and key stores. In th

Pagina 17 - Examples

Create a self-signed certicate in a keystore of type JKS using an RSA key algorithm. RSA ispublic-key encryption technology developed by RSA Data Se

Pagina 18

keytool -delete -noprompt -alias ${cert.alias} -keystore ${keystore.file}-storepass ${keystore.pass}Another example of deleting a certicate from a ke

Pagina 19 - Book Title Description

6. If you have changed the keystore or private key password from their default, then substitutethe new password for changeit in the above command.The

Pagina 20

keytool -delete-alias keyAlias-keystore keystore-name-storepass passwordUsing Network Security Services (NSS) ToolsIn the Clusters and Enterprise Pro

Pagina 21 - Symbol Conventions

Using the certutil UtilityBefore running certutil, make sure that LD_LIBRARY_PATH points to the location of thelibraries required for this utility to

Pagina 22 - Sun WelcomesYour Comments

Import an RFC text-formatted certicate into an NSS certicate database.certutil -A -a -n ${cert.nickname} -t ${cert.trust.options}-f ${pass.file} -i

Pagina 23 - Enterprise Server Overview

pk12util -o -n ${cert.nickname} -h ${token.name} -k ${pass.file}-w ${cert.pass.file} -d ${admin.domain.dir}/${admin.domain}/config Convert a PKCS12 ce

Pagina 25 - JConsole

Using Hardware Crypto Accelerator With Enterprise ServerYou can use hardware accelerator tokens to improve the cryptographic performance and tofurnish

Pagina 26 - Enterprise Server Concepts

For the Microsoft Windows environment, add the location of NSS libraries AS_NSS and theNSS tools directory, AS_NSS_BIN to the PATH environment variabl

Pagina 27 - Usage Proles

Using database directory /var/opt/SUNWappserver/domains/domain1/config ...Listing of PKCS#11 Modules--------------------------------------------------

Pagina 28 - Node Agent

Listing Keys and Certicates To list the keys and certicates in the congured PKCS#11 tokens, run the followingcommand:certutil -L -d AS_NSS_DB [-h t

Pagina 29 - Server Instance

Working With Private Keys and CerticatesUse certutil to create self-signed certicates and to import or export certicates. To import orexport privat

Pagina 30

To create a custom conguration le:1. Create a conguration le called as-install/mypkcs11.cfg with the following code and savethe le.name=HW1000lib

Pagina 32 - Starting the Domain

Conguring Message SecuritySome of the material in this chapter assumes a basic understanding of security and web servicesconcepts. This chapter descr

Pagina 33 - Creating a Cluster

Understanding Message Security in the Enterprise ServerThe Enterprise Server oers integrated support for the WS-Security standard in its web services

Pagina 34 - Starting a Node Agent

Application DeployerThe application deployer is responsible for: Specifying (at application assembly) any required application-specic message protect

Pagina 35 - Restarting an Instance

FiguresFIGURE 1–1 Enterprise Server Instance ... 29FIGURE 9–1 Rol

Pagina 36 - To migrate the DAS

About Digital SignaturesThe Enterprise Server uses XML Digital signatures to bind an authentication identity tomessage content. Clients use digital si

Pagina 37

Glossary of Message Security TerminologyThe terminology used in this document is described below. The concepts are also discussed in“Conguring the En

Pagina 38

The response policy denes the authentication policy requirements associated with responseprocessing performed by the authentication provider. Policie

Pagina 39 - Java Business Integration

Conguring Application-Specic Web ServicesSecurityApplication-specic web services security functionality is congured (at application assembly)by de

Pagina 40 - JBI Component Loggers

Actions of Request and Response PolicyCongurationsThe following table shows message protection policy congurations and the resulting messagesecurity

Pagina 41 - Service Assemblies

TABLE 10–1 Message protection policy to WS-Security SOAP message security operation mapping(Continued)Message Protection Policy ResultingWS-Security S

Pagina 42 - JBI Descriptors

If you are running the Enterprise Server on version 1.5 of the Java SDK, the JCE provider isalready congured properly. If you are running the Enterpr

Pagina 43 - JDBC Resources

6. Restart the Enterprise Server.Message Security SetupMost of the steps for setting up the Enterprise Server for using message security can beaccompl

Pagina 44 - JDBC Connection Pools

To specify the default server provider:asadmin set --user admin-user --port admin-portserver-config.security-service.message-security-config.SOAP.def

Pagina 45 - Setting Up Database Access

Creating a Message Security ProviderTo congure an existing provider using the Admin Console, select Conguration node > theinstance to Congure>

Pagina 47 - Chapter 3 • JDBC Resources 47

<log-service file="" level="WARNING"/><message-security-config auth-layer="SOAP"default-client-provider="C

Pagina 48 - Parameter Description

Conguring the Diagnostic ServiceThe Diagnostic Service provides more visibility into and control of the runtime performance ofa server and its applic

Pagina 49 - Chapter 3 • JDBC Resources 49

Installation specic details are collected only for le-based installations. Capture System Information: The following system information is collected

Pagina 50

TransactionsBy enclosing one or more steps in an indivisible unit of work, a transaction ensures dataintegrity and consistency. This chapter contains

Pagina 51 - Chapter 3 • JDBC Resources 51

See Also: “Transactions in Java EE Technology” on page 144 “Conguring Transactions” on page 145Transactions in Java EETechnologyTransaction processin

Pagina 52

Workarounds for Specic DatabasesThe Enterprise Server provides workarounds for some known issues with the recoveryimplementations of the following JD

Pagina 53 - Java DB Type 4 Driver

When the transaction spans across servers, the server that started the transaction can contactthe other servers to get the outcome of the transactions

Pagina 54 - Databases

Select the instance to congure: To congure a particular instance, select the instance’s cong node. For example, the defaultinstance, server , selec

Pagina 55

Restart the Enterprise Server.▼To set the keypoint intervalKeypoint operations compress the transaction log le. The keypoint interval is the number o

Pagina 56 - IBM DB2 8.1 Type 2 Driver

Conguring the HTTP ServiceThe HTTP service is the component of the Enterprise Server that provides facilities fordeploying web applications and for m

Pagina 57 - MySQL Type 4 Driver

TablesTABLE 1–1 Features Available for Each Prole ... 27TABLE 1–2 Enterprise S

Pagina 58

http://www.aaa.com:8080/web1http://www.bbb.com:8080/web2http://www.ccc.com:8080/web3The rst URL is mapped to virtual host www.aaa.com , the second UR

Pagina 59

However, if an HTTP listener uses the 0.0.0.0 IP address, which listens on all IP addresses on aport, you cannot create HTTP listeners for additional

Pagina 60

The Keep-Alive subsystem periodically polls such idle connections and queues thoseconnections with activity into the connection queue for future proce

Pagina 61 - CloudScape 5.1 Type 4 Driver

Managing Web ServicesThis chapter describes web services management with Enterprise Server. Admin Console andthe asadmin tool enable you deploy, test,

Pagina 62

simple, exible, text-based markup language. XML data is marked using tags enclosed in angledbrackets. The tags contain the meaning of the data they m

Pagina 63 - JMS Resources

service endpoints, along with corresponding WSDL descriptions, and clients. A JAX-RPCbased web service can interact with clients that are not based on

Pagina 64 - Resources

Viewing Deployed Web ServicesTo test a web service with Admin Console, select Applications > Web Services >web-service-name | General. Admin Con

Pagina 65 - JMS Physical Destinations

Adding a RegistryAdd or remove a web services registry with Admin Console at Application Server > WebServices | Registry. Use this page to create a

Pagina 66

Transforming Messages with XSLT FiltersYou can apply XSLT transformation rules to a web service end point. This enables ne-grainedcontrol of web serv

Pagina 67 - Foreign JMS Providers

OFF- Disables monitoring.Enter a value for the Message History. The default is 25. Click the Reset button to clear allstatistics and the running aver

Pagina 68 - Resource Adapter Properties

TABLE 18–23 JVM Statistics for Java SE - Thread Info ...190TABLE 18–24 JVM Statistics for

Pagina 70

Conguring the Object Request BrokerThis chapter describes how to congure the Object Request Broker (ORB) and IIOP listeners. Ithas the following sec

Pagina 71

What is the ORB?The Object Request Broker (ORB) is the central component of CORBA. The ORB provides therequired infrastructure to identify and locate

Pagina 72 - Activation Spec Properties

Thread PoolsThe Java Virtual Machine (JVM) can support many threads of execution at once. To helpperformance, the Enterprise Server maintains one or m

Pagina 73

Working with Thread PoolsTo create a thread pool using the Admin Console, go to Conguration > Thread Pools >Current Pools > New. Enter the n

Pagina 74

Conguring LoggingThis chapter briey describes how to congure logging and view the server log. It contains thefollowing sections: “About Logging” on

Pagina 75 - Conguring JavaMail Resources

[#|2006-10-21T13:25:53.852-0400|INFO|sun-appserver9.1|javax.enterprise.system.core|_ThreadID=13;|CORE5004: Resource Deployed:[cr:jms/DurableConnection

Pagina 76 - Creating a JavaMail Session

TABLE 17–1 Enterprise Server Logger Namespaces (Continued)Module Name NamespaceGroup Management Service (cluster andenterprise proles only)javax.ee.e

Pagina 77 - JNDI Resources

Conguring LoggingThis section contains the following topics: “Conguring General Logging Settings” on page 168 “Conguring Log Levels” on page 168 “V

Pagina 78

Viewing Server LogsTo view the log les: In the developer prole, go to Applications Server → Logging → View Log Files. In the cluster and enterprise

Pagina 79 - Using Custom Resources

ExamplesEXAMPLE 18–1 Applications Node Tree Structure ...173EXAMPLE 18–2 HTTP Se

Pagina 80

A window labeled Log Entry Detail appears, with a formatted version of the message.At the end of the list of entries, click the buttons to view earlie

Pagina 81 - Connector Resources

Monitoring Components and ServicesThis chapter contains information about monitoring components using the Enterprise ServerAdmin Console. This chapter

Pagina 82

Overview of MonitoringTo monitor the Enterprise Server, perform these steps:1. Enable the monitoring of specic services and components using either t

Pagina 83 - Equivalent asadmin command

EXAMPLE 18–1 Applications Node Tree Structureapplications|--- application1| |--- ejb-module-1| | |--- ejb1 *| | |--- cache (for entity/sfsb) *| | |---

Pagina 84 - Click Save

EXAMPLE 18–3 HTTP Service Schematic (Cluster and Enterprise Prole Version)http-service *|---connection-queue *|---dns *|---file-cache *|---keep-alive

Pagina 85 - Attributes

EXAMPLE 18–6 JMS Service Schematicjms-service|-- connection-factories [AKA conn. pools in the RA world]| |-- connection-factory-1 (All CF stats for th

Pagina 86 - More Information

“Thread Pools Statistics” on page 186 “Transaction Service Statistics” on page 186 “Java Virtual Machine (JVM) Statistics” on page 187 “JVM Statistic

Pagina 87 - Managing Security Maps

TABLE 18–2 EJB Method StatisticsAttribute Name DataType Descriptionmethodstatistic TimeStatistic Number of times an operation iscalled; the total time

Pagina 88 - Managing Connector Resources

TABLE 18–3 EJB Session Store Statistics (Continued)Attribute Name DataType DescriptionactivationErrorCount CountStatistic Time (ms) spent executing th

Pagina 89 - To Edit a Connector Resource

TABLE 18–4 EJB Pool StatisticsAttribute Name DataType Descriptionnumbeansinpool BoundedRangeStatistic Number of EJB’s in the associated pool,providing

Pagina 91

TABLE 18–5 EJB Cache Statistics (Continued)Attribute Name DataType Descriptionnumpassivationsuccess CountStatistic Number of times passivation complet

Pagina 92

TABLE 18–8 Web Container (Web Module) StatisticsStatistic DataType Commentsjspcount CountStatistic Number of JSP pages that havebeen loaded in the web

Pagina 93 - Web and EJB Containers

TABLE 18–9 HTTP Service Statistics (Developer Prole)Statistic Units Data Type Commentsbytesreceived Bytes CountStatistic The cumulative value of the

Pagina 94 - The SIP Servlet Container

The statistics available for the JDBC connection pool are shown in the following table.TABLE 18–10 JDBC Connection Pool StatisticsStatistic Units Data

Pagina 95 - The EJB Container

TABLE 18–10 JDBC Connection Pool Statistics (Continued)Statistic Units DataType Descriptionnumconnacquired Number CountStatistic Number of logical con

Pagina 96

TABLE 18–11 Connector Connection Pool Statistics (Continued)Statistic Units DataType Descriptionnumconndestroyed Number CountStatistic Number of physi

Pagina 97 - Conguring Security

TABLE 18–13 Connection Manager (in an ORB) Statistics (Continued)Statistic Units DataType Descriptiontotalconnections Number BoundedRangeStatistic Tot

Pagina 98 - Tools for Managing Security

TABLE 18–15 Transaction Service Statistics (Continued)Statistic DataType Descriptioncommittedcount CountStatistic Number of transactions that have bee

Pagina 99

TABLE 18–17 JVM Statistics for Java SE- Class Loading (Continued)Statistic DataType Descriptiontotalloadedclasscount CountStatistic Total number of cl

Pagina 100 - Changing the Master Password

TABLE 18–20 JVM Statistics for Java SE- Memory (Continued)Statistic DataType Descriptioncommittedheapsize CountStatistic Amount of memory (in bytes) t

Pagina 101 - Changing the Admin Password

PrefaceThe Administration guide describes the administrative tasks of the Enterprise Server.This preface contains information about and conventions fo

Pagina 102 - Authenticating Entities

TABLE 18–22 JVM Statistics for Java SE - Runtime (Continued)Statistic DataType Descriptionmanagementspecversion StringStatistic Management spec. versi

Pagina 103 - Specifying JACC Providers

TABLE 18–23 JVM Statistics for Java SE - Thread Info (Continued)Statistic DataType Descriptionlockownerid CountStatistic ID of the thread that holds t

Pagina 104 - Conguring Message Security

Conguring Monitoring Levels Using the AdminConsoleTo congure monitoring in the Admin Console: For the developer prole, go to Conguration → Monitor

Pagina 105 - Role Mapping

Viewing Monitoring Data “Viewing Monitoring Data in the Admin Console” on page 193 “Viewing Monitoring Data With the asadmin Tool” on page 193Viewing

Pagina 106

servlet, connection, connectorpool, endpoint, entitybean, messagedriven,statefulsession, statelesssession, httpservice,orwebmodule.For example, to vie

Pagina 107

To display monitoring statistics for an application component or subsystem for whichmonitoring has been enabled, use the asadmin get command.To get th

Pagina 108 - About Digital Certicates

Another example, application, is a valid monitorable object type and is not a singleton. Toaddress a non-singleton child node representing, for exampl

Pagina 109 - About Secure Sockets Layer

Examples for the list --user admin-user --monitor CommandThe list command provides information about the application components and subsystemscurrentl

Pagina 110 - About Ciphers

When an attribute is requested that does not exist for a particular component or subsystem,an error is returned. Similarly, when a specic attribute i

Pagina 111 - About Certicate Files

Example 3Attempt to get a specic attribute from a subsystem:asadmin> get --user admin-user --monitor server.jvm.uptime-lastsampletimeReturns:serve

Pagina 112 - Using the keytool Utility

Copyright 2008 Sun Microsystems, Inc. 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved.Sun Microsystems, Inc. has intellectual pr

Pagina 113

TABLE P–1 Books in the Enterprise Server Documentation Set (Continued)Book Title DescriptionHigh Availability AdministrationGuideSetting up clusters,

Pagina 114

server.http-serviceserver.resourcesserver.thread-poolsThe list of monitorable components includes thread-pools, http-service, resources, and alldeploy

Pagina 115

Returns:Nothing to list at server.applications.petstore.signon-ejb_jar.UserEJB.bean-methods.getUserName. To get the valid names beginning with astring

Pagina 116 - -storepass password

server.applications.petstore.signon-ejb_jar.UserEJB.bean-methods.getUserName.totalnumerrors-count = 0server.applications.petstore.signon-ejb_jar.UserE

Pagina 117 - Using the certutil Utility

TABLE 18–25 Top LevelCommand Dotted Name Outputlist -m server server.applicationsserver.thread-poolsserver.resourcesserver.http-serviceserver.transact

Pagina 118

TABLE 18–27 Applications - Enterprise Applications and Standalone ModulesCommand Dotted Name Outputlist -m server.applications.app1or*app1Note: this l

Pagina 119

TABLE 18–27 Applications - Enterprise Applications and Standalone Modules (Continued)Command Dotted Name Outputlist -m server.applications.app1.ejb-mo

Pagina 120

TABLE 18–27 Applications - Enterprise Applications and Standalone Modules (Continued)Command Dotted Name Outputlist -m server.applications.app1.ejb-mo

Pagina 121 - Conguring PKCS#11 Tokens

TABLE 18–28 HTTP-Service LevelCommand Dotted Name Outputlist -m server.http-service List of virtual servers.get -m server.http-service.* No output exc

Pagina 122 - Managing Keys And Certicates

TABLE 18–30 Resources LevelCommand Dotted Name Outputlist -m server.resources List of pool names.get -m server.resources.* No output except message sa

Pagina 123 - Listing Keys and Certicates

TABLE 18–32 ORB Level (Continued)Command Dotted Name Outputget -m server.orb.connection-managers.* No output except message saying there are noattribu

Pagina 124

Typographic ConventionsThe following table describes the typographic changes that are used in this book.TABLE P–3 TypographicConventionsTypeface Meani

Pagina 125

To view all the MBeans, Enterprise Server provides a conguration of the Standard JMXConnector Server called System JMX Connector Server. As part of E

Pagina 126

The security-enabled ag for the JMX Connector is false. If you are running the cluster orenterprise prole, or if you have turned on security for the

Pagina 127

In the Connect to Agent tab of JConsole, enter user name, password, host name and port (8686,by default).The user name refers to the administration us

Pagina 128 - System Administrator

Start JConsole by running JDK_HOME/bin/jconsoleIn the Connect to Agent tab of JConsole, enter user name, password, host name and port (8686,by default

Pagina 130 - About Encryption

Conguring Management RulesThis section contains information about setting administration policies to automate routineadministration tasks, congure s

Pagina 131

notications and take appropriate action. For details on developing a custom MBean anddeploying it, see Chapter 14, “Developing Custom MBeans,” in Sun

Pagina 132 - Securing aWeb Service

In addition, to enable a individual management rule, you must enable the rule on this page byclicking the box next to the rule and clicking Enable.A r

Pagina 134 - Congurations

JavaVirtual Machine and Advanced SettingsThe Java Virtual Machine (JVM) is an interpretive computing engine responsible for runningthe byte codes in a

Pagina 135 - Conguring a JCE Provider

TABLE P–4 Symbol Conventions (Continued)Symbol Description Example Meaning→ Indicates menu itemselection in a graphical userinterface.File → New → Tem

Pagina 136

Debug Options: Specify the JPDA options passed to the JVM when the debugging isenabled. RMI Compile Options: Enter the command-line options for the r

Pagina 137 - Message Security Setup

Automatically Restarting a Domain or NodeAgentIf your domain or node agent is stopped unexpectedly (for example, if you need to restart yourmachine),

Pagina 138

To determine if a user has the net_privaddr privilege, log in as that user and type the commandppriv -l | grep net_privaddr.To run the asadmin create-

Pagina 139 - <client-container>

Restarting Automatically Using inittab on Solaris 9 and LinuxPlatformsTo restart your domain on the Solaris 9 or Linux platform, add a line of text to

Pagina 140 - Further Information

C:\winnt\system32\sc.exe create service-name binPath= \"fully-qualied-path-to-appservService.exe\"fully-qualied-path-to-asadmin.bat start-

Pagina 141 - Diagnostic Service Framework

Preventing the Service From Shutting Down When aUser Logs OutBy default, the Java VM catches signals from Windows that indicate that the operating sys

Pagina 142

If the “interact with desktop” option is not set, the service stays in a “start-pending” stateand appears to hang. Kill the service process to recover

Pagina 143 - Transactions

Dotted Name Attributes for domain.xmlThis appendix describes the dotted name attributes that can be used to address the MBean andits attributes. Every

Pagina 144 - About Transactions

Element Name Dotted Name Prexclusters domain.clustersEvery cluster contained in this element is accessible as cluster-name. Wherecluster-name is the

Pagina 145 - Conguring Transactions

Dotted Name Aliased totarget.admin-service cong-name.admin-servicetarget.web-container cong-name.web-containertarget.sip-container cong-name.sip-co

Pagina 146

Enterprise Server OverviewSun GlassFish Enterprise Server administration includes many tasks such as deployingapplications, creating and conguring do

Pagina 148 - To set the keypoint interval

The asadmin UtilityThe Application Server includes a command-line administration utility known as asadmin.Theasadmin utility is used to start and stop

Pagina 149 - Conguring the HTTP Service

The asadmin UtilityUse the asadmin utility to perform any administrative tasks for the Application Server. You canuse this asadmin utility in place of

Pagina 150 - HTTP Listeners

-s --secure if true, uses SSL/TLS to communicate with the domain application server. -t --terse indicates that any output data must be very concise,

Pagina 151

To use the --secure option, you must use the set command to enable the security --enabledag in the admin http-listener in the domain.xml. When you us

Pagina 152

TABLE C–1 Remote Commands Required Options (Continued)Option Denition--passwordfile The --passwordfile option species the name of a le containing t

Pagina 153 - Managing Web Services

invokemultimode from within a multimodesession; once you exit the second multimodeenvironment, you return to your original multimode environment.The G

Pagina 154 - Java EE Web Service Standards

The list command treats this complete dotted name as the complete name of a parentnode in the abstract hierarchy. Upon providing this name to list co

Pagina 155 - DeployingWeb Services

TABLE C–2 Server Lifecycle Commands (Continued)Command Denitionstart-domain Starts a domain. If the domain directory is not specied, the domain in t

Pagina 156 - UsingWeb Services Registries

TABLE C–3 List and Status Commands (Continued)list-components Lists all deployed Java EE 5 components. If the --typeoption is not specied,all compone

Pagina 157 - Adding a Registry

Enterprise Server includes the Metro web services stack (http://metro.dev.java.net). Metroimplements important WS-* standards and WS-I standardized in

Pagina 158 - MonitoringWeb Services

Version CommandsThe version commands return the version string, display a list of all the asadmin commands,and allow you to install the license le.TA

Pagina 159

Resource Management CommandsThe resource commands allow you to manage the various resources used in your application.TABLE C–7 Resource Management Com

Pagina 160

TABLE C–7 Resource Management Commands (Continued)Command Denitiondelete-custom-resource Removes a custom resource.list-custom-resources Lists the cu

Pagina 161 - CHAPTER 15

Conguration CommandsThe conguration commands allow you to construct IIOP listeners, lifecycle modules, HTTPand IIOP listeners, prolers, and other s

Pagina 162 - Managing IIOP Listeners

TABLE C–9 Lifecycle Module CommandsCommand Denitioncreate-lifecycle-module Creates a lifecycle module. The lifecycle modules provide a means of runni

Pagina 163 - Thread Pools

TABLE C–11 JVM Options and Virtual Server CommandsCommand Denitioncreate-jvm-option Creates JVM options in the Java conguration or proler elements

Pagina 164 - Working with Thread Pools

TABLE C–13 Transaction CommandsCommand Denitionfreeze-transaction Freezes the transaction subsystem during which time all the inighttransactions are

Pagina 165 - Conguring Logging

TABLE C–15 User Management Commands (Continued)Command Denitionupdate-file-user Updates an existing entry in the keyle using the specied user_name,

Pagina 166 - About Logging

TABLE C–17 Database CommandsCommand Denitionstart-database Starts the Java DB server that is available with the Application Server. Use thiscommand o

Pagina 167

TABLE C–19 Web Service Commands (Continued)Command Denitiondelete-transformation-rule Deletes an XSLT transformation rule of a given web service.list

Pagina 168

If your conguration includes remote server instances, create node agents to manage andfacilitate remote server instances. It is the responsibility of

Pagina 169 - Viewing Server Logs

TABLE C–20 Security Commands (Continued)Command Denitiondelete-message-security-provide Enables administrators to delete a provider-config sub-elemen

Pagina 170 - _ThreadID=13

Verify CommandThe XML verier command veries the content of the domain.xml le.TABLE C–22 Verify CommandCommand Denitionverify-domain-xml Veries th

Pagina 171 - About Monitoring

Property CommandShared server instances will often need to override attributes dened in their referencedconguration. Any conguration attribute in a

Pagina 172 - Overview of Monitoring

IndexAACCSee containersapplication client, 93acceptor threads, in HTTP listeners, 151Admin Console, 24applets, 93asadmin utility, 25Bbean-cache, monit

Pagina 173 - The HTTP ServiceTree

external repositories, accessing, 79FForeign Providers, JMS, 67-74Gget command, monitoring data, 197Hhigh availability, 28HTTP listenersacceptor threa

Pagina 174 - The JMS ServiceTree

logging (Continued)viewing the server log, 169-170Mman pages, 25monitoringbean-cache attributes, 179-180container subsystems, 172-173ORB service, 185-

Pagina 175 - Services

Tthread pools, 163performance, 163thread starvation, 163threads, See thread pools, 163topics, JMS, 63-64total-beans-created, 179totalbeansdestroyed, 1

Pagina 176 - EJB Container Statistics

Enterprise Server ConceptsThe Enterprise Server consists of one or more domains. A domain is an administrativeboundary or context. Each domain has an

Pagina 177 - EJB Session Store Statistics

carry out the requests. The DAS is sometimes referred to as the admin server or default server. Itis referred to as the default server because it is t

Pagina 178

TABLE 1–1 Features Available for Each Prole (Continued)Feature Developer Prole Cluster ProleEnterprise Prole (notavailable with Sun GlassFishCommu

Pagina 179 - EJB Cache Statistics

Server InstanceThe server instance is a single Java EE compatible Java Virtual Machine hosting an EnterpriseServer on a single node. Each server insta

Pagina 181 - HTTP Service Statistics

names, IP Addresses, and some administration capabilities. For the users, it is almost as if theyhave their own web server, without the hardware and b

Pagina 182

Basic Enterprise Server CommandsAdministration of the Enterprise Server includes tasks such as creation, conguration, controland management of domain

Pagina 183

Caution – Do not create an enterprise domain unless you have HADB and the Network SecurityServices (NSS) keystore. You will not be able to start an en

Pagina 184 - Table 18–12

Starting the Default Domain on WindowsFrom the Windows Start Menu, select Programs -> Sun Microsystems -> Enterprise Server ->Start Admin Ser

Pagina 185

For the full syntax, type asadmin help create-cluster.Starting a ClusterA cluster is started using the start-cluster command. The following example st

Pagina 186 - Thread Pools Statistics

For the full syntax, type asadmin help start-node-agent.Stopping a Node AgentA node agent is stopped using the stop-node-agent command and specifying

Pagina 187 - JVM Statistics in Java SE

Recreating the Domain Administration ServerFor mirroring purposes, and to provide a working copy of the Domain Administration Server(DAS), you must ha

Pagina 188

Change domain-root-dir/domain1/generated/tmp directory permissions on the third machineto match the permissions of the same directory on rst machine.

Pagina 190

Java Business IntegrationJava Business Integration (JBI) is an implementation of the JSR 208 specication(http://www.jcp.org/en/jsr/detail?id=208)for

Pagina 191

Starting an Instance ... 35Stopping

Pagina 192

Binding ComponentsBinding Components are proxies for consumers or providers that are outside the JBIenvironment. Binding components typically are base

Pagina 193 - Viewing Monitoring Data

Note – The logging levels for JBI Components are often inherited from a parent logger such asthe JBI logger. To view and set parent logging levels, in

Pagina 194

Shared LibrariesA Shared Library provides Java classes that are not private to a single component and is typicallyshared by more than one JBI Componen

Pagina 195

JDBC ResourcesThis chapter explains how to congure JDBC resources, which are required by applications thataccess databases. This chapter contains the

Pagina 196

When creating a JDBC resource, you must identify:1. The JNDI Name. By convention, the name begins with the jdbc/ string. For example:jdbc/payrolldb. D

Pagina 197 - Example 2

Behind the scenes, the application server retrieves a physical connection from theconnection pool that corresponds to the database. The pool denes co

Pagina 198

Working with JDBC Connection PoolsA JDBC connection pool is a group of reusable connections for a particular database. Whencreating the pool with the

Pagina 199 - To Use the PetStore Example

Click OK.▼Creating a JDBC Connection Pool and JDBC Resource Using the CLIUse the asadmin create-jdbc-connection-pool command to create a JDBC connecti

Pagina 200

Editing a JDBC Connection PoolThe Edit JDBC Connection Pool page provides the means to change all of the settings for anexisting pool except its name.

Pagina 201 - Returns:

Optionally, the application server can validate connections before they are passed toapplications. This validation allows the application server to au

Pagina 202

IBM Informix Type 4 Driver ... 61CloudScape 5.1 Typ

Pagina 203 - Applications Level

Parameter DescriptionNon-transactional Connections Click the check box if you want Application Server to return allnon-transactional connections.Trans

Pagina 204

Attribute DescriptionValidate Atmost Once Amount of time, in seconds, after which aconnection is validated at most once. This will helpreduce the numb

Pagina 205

Match Connections Use this option to switch on/o connectionmatching for the pool. It can be set to false if theadministrator knows that the connectio

Pagina 206 - HTTP Service level

Note – An Oracle database user running the capture-schema command needs ANALYZE ANYTABLE privileges if that user does not own the schema. These privil

Pagina 207 - Thread-Pools Level

Sun GlassFish JDBC Driver for DB2 DatabasesThe JAR les for this driver are smbase.jar, smdb2.jar, and smutil.jar. Congure theconnection pool using t

Pagina 208 - ORBLevel

Sun GlassFish JDBC Driver for Microsoft SQL ServerDatabasesThe JAR les for this driver are smbase.jar, smsqlserver.jar, and smutil.jar. Congure thec

Pagina 209 - Using JConsole

IBM DB2 8.1 Type 2 DriverThe JAR les for the DB2 driver are db2jcc.jar, db2jcc_license_cu.jar, and db2java.zip.Set environment variables as follows:L

Pagina 210

password - Set as appropriate. databaseName - Set as appropriate. Do not specify the complete URL, only the databasename. BE_AS_JDBC_COMPLIANT_AS_POS

Pagina 211

DataSource Classname: com.inet.ora.OraDataSource Properties: user - Specify the database user. password - Specify the database password. serviceName

Pagina 212

password - Set as appropriate.Inet Sybelux JDBC Driver for Sybase DatabasesThe JAR le for the Inet Sybase driver is Sybelux.jar. Congure the connec

Pagina 213

Managing Security Maps ... 87▼ To Delete a C

Pagina 214

For example:jdbc:oracle:thin:@localhost:1521:customer_db xa-driver-does-not-support-non-tx-operations - Set to the value true. Optional:only needed if

Pagina 215 - Conguring Management Rules

xa-driver-does-not-support-non-tx-operations - Set to the value true. Optional:only needed if both non-XA and XA connections are retrieved from the s

Pagina 217

Conguring Java Message Service ResourcesThe Enterprise Server implements the Java Message Service (JMS) API by integrating theMessage Queue software

Pagina 218

TopicConnectionFactory objects, used for publish-subscribe communication ConnectionFactory objects, which can be used for both point-to-point andpubl

Pagina 219 - Tuning the JVM Settings

JMS Connection FactoriesJMS connection factories are objects that allow an application to create other JMS objectsprogrammatically. These administered

Pagina 220 - Conguring Advanced Settings

To create a physical destination from the Admin Console, select Conguration >PhysicalDestinations. In the Create Physical Destinations page, speci

Pagina 221 - APPENDIX A

In the MQ Scheme and MQ Service elds, type the Message Queue address scheme nameand the Message Queue connection service name if a non-default schem

Pagina 222

Conguring the Generic Resource AdapterPrior to deploying the resource adapter, JMS client libraries should be made available to theEnterprise Server.

Pagina 223 - Platforms

Property Name Valid Values Default Value DescriptionTopicConnectionFactoryClassNameName of the class availablein the application serverclasspath , for

Pagina 224

Users ... 105

Pagina 225 - User Logs Out

Property Name Valid Values Default Value DescriptionJndiProperties Name value pairs separatedby commaNone Species the JNDI provider propertiesto be u

Pagina 226

Property Name Valid Values Default Value DescriptionRMPolicy ProviderManaged orOnePerPhysicalConnectionProviderManagedThe isSameRM method on anXAResou

Pagina 227 - Top Level Elements

Property Name Valid Value Default Value DescriptionClientId A valid client ID None ClientID as specied by JMS 1.1specication.ConnectionFactoryJndiNa

Pagina 228

Property Name Valid Value Default Value DescriptionMaxPoolSize An integer 8 Maximum size of server session poolinternally created by the resourceadapt

Pagina 229 - Elements Not Aliased

Property Name Valid Value Default Value DescriptionRedeliveryAttempts integer Number of times a message will bedelivered if a message causes aruntime

Pagina 230

Conguring JavaMail ResourcesThe Enterprise Server includes the JavaMail API. The JavaMail API is a set of abstract APIs thatmodel a mail system. The

Pagina 231 - The asadmin Utility

To create a JavaMail session using the Admin Console, select Resources —> JavaMail Sessions.Specify the JavaMail settings as follows: JNDI Name: Th

Pagina 232

JNDI ResourcesThe Java Naming and Directory Interface (JNDI) is an application programming interface(API) for accessing dierent kinds of naming and d

Pagina 233 - AS_ADMIN_MASTERPASSWORD=value

application component's environment allows the application component to be customizedwithout the need to access or change the application compone

Pagina 234 - Option Denition

TABLE 6–1 JNDI Lookups and Their Associated ReferencesJNDI Lookup Name Associated Referencejava:comp/env Application environment entriesjava:comp/env/

Pagina 235 - The Multimode Command

Actions of Request and Response Policy Congurations ... 134Conguring Other Security Facilities ..

Pagina 236

-- and jndi-lookup-name refers to the JNDI name to lookup to fetch the-- designated (in this case the java) object.--><external-jndi-resource jn

Pagina 237 - Server Lifecycle Commands

Connector ResourcesThis chapter explains how to congure connectors, which are used to access enterpriseinformation systems (EISs). This chapter conta

Pagina 238 - List and Status Commands

Managing Connector Connection Pools “To Create a Connector Connection Pool” on page 82 “To Edit a Connector Connection Pool” on page 83 “To Edit Conne

Pagina 239 - Deployment Commands

c. In the Additional Properties table, add any required properties.In the previous Create Connector Connection Pool page, you selected a class in theC

Pagina 240 - Version Commands

On Any Failure If you select the checkbox labelled Close AllConnections, if a single connection fails, then theapplication server will close all conne

Pagina 241 - Resource Management Commands

Using the asadmin commands to change connection pool properties.You can use the asadmin get and set commands to view and change the values of theconne

Pagina 242

Lazy Association Connections are lazily associated when an operation is performed on them. Also,they are disassociated when the transaction is complet

Pagina 243 - Conguration Commands

▼To Edit Connection Pool PropertiesUse the Additional Properties tab to modify the properties of an existing pool.The properties specied depend on th

Pagina 244 - Proler and SSL Commands

Equivalent asadmin commanddelete-connector-connection-pool▼To Set Up EIS AccessDeploy (install) a connector.Create a connection pool for the connector

Pagina 245 - Transaction andTimer Commands

d. Do one of the following: If you are using the cluster prole, you will see the Targets section of the page. in theTargets section of the page, sele

Pagina 246 - User Management Commands

Viewing Deployed Web Services ... 156Testing Web Services ..

Pagina 247 - Database Commands

On the Connector Resources page, select the checkbox for the resource to be deleted.Click Delete.Equivalent asadmin commanddelete-connector-resource▼T

Pagina 248 - Web Service Commands

To create, edit, and delete Connector Connection Pools, click Resources —> AdministeredObject Resources in the Admin Console. Consult the Admin Con

Pagina 249 - Security Service Commands

g. Click Finish.Equivalent asadmin commandcreate-admin-object▼To Edit an Administered Object ResourceIn the tree component, expand the Resource node a

Pagina 250 - Password Commands

Web and EJB ContainersContainers provide runtime support for application components. Application components usethe protocols and methods of the contai

Pagina 251 - Service Command

Editing the Properties of the SIP ContainerThe sub-elements of the SIP container are session-managerand session-properties.store-properties, manager-p

Pagina 252 - Property Command

Editing SIP Container Session Manager PropertiesTo view the sub-elements of the SIP container session manager properties, use the followingcommand: li

Pagina 254

Conguring SecuritySecurity is about protecting data: how to prevent unauthorized access or damage to it in storageor transit. The Enterprise Server;

Pagina 255

In declarative security, the container (the Enterprise Server) handles security through anapplication's deployment descriptors. You can control

Pagina 256

For more information on using certutil, pk12util, and other NSS security tools, see NSSSecurity Tools athttp://www.mozilla.org/projects/security/pki/n

Comentarios a estos manuales

Sin comentarios