Sun GlassFish Enterprise Server2.1 Administration GuideSun Microsystems, Inc.4150 Network CircleSanta Clara, CA 95054U.S.A.Part No: 820–4335–10Decembe
Overview of Monitoring ... 172About the Tree S
Note – Enclose the alias password in single quotes as shown in the example.3. Restart the Enterprise Server for the relevant domain.Protecting Files w
Caution – At this point in time, server instances that are running must not be started andrunning server instances must not be restarted until the SMP
About Authentication and AuthorizationAuthentication and authorization are central concepts of application server security. Thefollowing topics are di
TABLE 9–1 Enterprise Server Authentication Methods (Continued)DIGEST HTTP and SIP Server authenticates the client basedon an encrypted response.SSL an
Conguring Message SecurityMessage Security enables a server to perform end-to-end authentication of web serviceinvocations and responses at the messa
Note – Users and groups are designated for the entire Enterprise Server, whereas eachapplication denes its own roles. When the application is being p
RolesA role denes which applications and what parts of each application users can access and whatthey can do. In other words, roles determine users&a
In the JDBC realm, the server gets user credentials from a database. The Enterprise Server usesthe database information and the enabled JDBC realm opt
Assign a security role to users in the realm.To assign a security role to a user, add a security-role-mapping element to the deploymentdescriptor that
Most importantly, a certicate binds the owner's public key to the owner's identity. Like apassport binds a photograph to personal informati
CTheasadmin Utility ...231The
When a Web browser (client) wants to connect to a secure site, an SSL handshake happens: The browser sends a message over the network requesting a sec
If all virtual hosts on a single IP address need to authenticate against the same certicate, theaddition of multiple virtual hosts probably will not
In the Developer Prole, on the server side, the Enterprise Server uses the JSSE format,which uses keytool to manage certicates and key stores. In th
Create a self-signed certicate in a keystore of type JKS using an RSA key algorithm. RSA ispublic-key encryption technology developed by RSA Data Se
keytool -delete -noprompt -alias ${cert.alias} -keystore ${keystore.file}-storepass ${keystore.pass}Another example of deleting a certicate from a ke
6. If you have changed the keystore or private key password from their default, then substitutethe new password for changeit in the above command.The
keytool -delete-alias keyAlias-keystore keystore-name-storepass passwordUsing Network Security Services (NSS) ToolsIn the Clusters and Enterprise Pro
Using the certutil UtilityBefore running certutil, make sure that LD_LIBRARY_PATH points to the location of thelibraries required for this utility to
Import an RFC text-formatted certicate into an NSS certicate database.certutil -A -a -n ${cert.nickname} -t ${cert.trust.options}-f ${pass.file} -i
pk12util -o -n ${cert.nickname} -h ${token.name} -k ${pass.file}-w ${cert.pass.file} -d ${admin.domain.dir}/${admin.domain}/config Convert a PKCS12 ce
Using Hardware Crypto Accelerator With Enterprise ServerYou can use hardware accelerator tokens to improve the cryptographic performance and tofurnish
For the Microsoft Windows environment, add the location of NSS libraries AS_NSS and theNSS tools directory, AS_NSS_BIN to the PATH environment variabl
Using database directory /var/opt/SUNWappserver/domains/domain1/config ...Listing of PKCS#11 Modules--------------------------------------------------
Listing Keys and Certicates To list the keys and certicates in the congured PKCS#11 tokens, run the followingcommand:certutil -L -d AS_NSS_DB [-h t
Working With Private Keys and CerticatesUse certutil to create self-signed certicates and to import or export certicates. To import orexport privat
To create a custom conguration le:1. Create a conguration le called as-install/mypkcs11.cfg with the following code and savethe le.name=HW1000lib
Conguring Message SecuritySome of the material in this chapter assumes a basic understanding of security and web servicesconcepts. This chapter descr
Understanding Message Security in the Enterprise ServerThe Enterprise Server oers integrated support for the WS-Security standard in its web services
Application DeployerThe application deployer is responsible for: Specifying (at application assembly) any required application-specic message protect
FiguresFIGURE 1–1 Enterprise Server Instance ... 29FIGURE 9–1 Rol
About Digital SignaturesThe Enterprise Server uses XML Digital signatures to bind an authentication identity tomessage content. Clients use digital si
Glossary of Message Security TerminologyThe terminology used in this document is described below. The concepts are also discussed in“Conguring the En
The response policy denes the authentication policy requirements associated with responseprocessing performed by the authentication provider. Policie
Conguring Application-Specic Web ServicesSecurityApplication-specic web services security functionality is congured (at application assembly)by de
Actions of Request and Response PolicyCongurationsThe following table shows message protection policy congurations and the resulting messagesecurity
TABLE 10–1 Message protection policy to WS-Security SOAP message security operation mapping(Continued)Message Protection Policy ResultingWS-Security S
If you are running the Enterprise Server on version 1.5 of the Java SDK, the JCE provider isalready congured properly. If you are running the Enterpr
6. Restart the Enterprise Server.Message Security SetupMost of the steps for setting up the Enterprise Server for using message security can beaccompl
To specify the default server provider:asadmin set --user admin-user --port admin-portserver-config.security-service.message-security-config.SOAP.def
Creating a Message Security ProviderTo congure an existing provider using the Admin Console, select Conguration node > theinstance to Congure>
14
<log-service file="" level="WARNING"/><message-security-config auth-layer="SOAP"default-client-provider="C
Conguring the Diagnostic ServiceThe Diagnostic Service provides more visibility into and control of the runtime performance ofa server and its applic
Installation specic details are collected only for le-based installations. Capture System Information: The following system information is collected
TransactionsBy enclosing one or more steps in an indivisible unit of work, a transaction ensures dataintegrity and consistency. This chapter contains
See Also: “Transactions in Java EE Technology” on page 144 “Conguring Transactions” on page 145Transactions in Java EETechnologyTransaction processin
Workarounds for Specic DatabasesThe Enterprise Server provides workarounds for some known issues with the recoveryimplementations of the following JD
When the transaction spans across servers, the server that started the transaction can contactthe other servers to get the outcome of the transactions
Select the instance to congure: To congure a particular instance, select the instance’s cong node. For example, the defaultinstance, server , selec
Restart the Enterprise Server.▼To set the keypoint intervalKeypoint operations compress the transaction log le. The keypoint interval is the number o
Conguring the HTTP ServiceThe HTTP service is the component of the Enterprise Server that provides facilities fordeploying web applications and for m
TablesTABLE 1–1 Features Available for Each Prole ... 27TABLE 1–2 Enterprise S
http://www.aaa.com:8080/web1http://www.bbb.com:8080/web2http://www.ccc.com:8080/web3The rst URL is mapped to virtual host www.aaa.com , the second UR
However, if an HTTP listener uses the 0.0.0.0 IP address, which listens on all IP addresses on aport, you cannot create HTTP listeners for additional
The Keep-Alive subsystem periodically polls such idle connections and queues thoseconnections with activity into the connection queue for future proce
Managing Web ServicesThis chapter describes web services management with Enterprise Server. Admin Console andthe asadmin tool enable you deploy, test,
simple, exible, text-based markup language. XML data is marked using tags enclosed in angledbrackets. The tags contain the meaning of the data they m
service endpoints, along with corresponding WSDL descriptions, and clients. A JAX-RPCbased web service can interact with clients that are not based on
Viewing Deployed Web ServicesTo test a web service with Admin Console, select Applications > Web Services >web-service-name | General. Admin Con
Adding a RegistryAdd or remove a web services registry with Admin Console at Application Server > WebServices | Registry. Use this page to create a
Transforming Messages with XSLT FiltersYou can apply XSLT transformation rules to a web service end point. This enables ne-grainedcontrol of web serv
OFF- Disables monitoring.Enter a value for the Message History. The default is 25. Click the Reset button to clear allstatistics and the running aver
TABLE 18–23 JVM Statistics for Java SE - Thread Info ...190TABLE 18–24 JVM Statistics for
160
Conguring the Object Request BrokerThis chapter describes how to congure the Object Request Broker (ORB) and IIOP listeners. Ithas the following sec
What is the ORB?The Object Request Broker (ORB) is the central component of CORBA. The ORB provides therequired infrastructure to identify and locate
Thread PoolsThe Java Virtual Machine (JVM) can support many threads of execution at once. To helpperformance, the Enterprise Server maintains one or m
Working with Thread PoolsTo create a thread pool using the Admin Console, go to Conguration > Thread Pools >Current Pools > New. Enter the n
Conguring LoggingThis chapter briey describes how to congure logging and view the server log. It contains thefollowing sections: “About Logging” on
[#|2006-10-21T13:25:53.852-0400|INFO|sun-appserver9.1|javax.enterprise.system.core|_ThreadID=13;|CORE5004: Resource Deployed:[cr:jms/DurableConnection
TABLE 17–1 Enterprise Server Logger Namespaces (Continued)Module Name NamespaceGroup Management Service (cluster andenterprise proles only)javax.ee.e
Conguring LoggingThis section contains the following topics: “Conguring General Logging Settings” on page 168 “Conguring Log Levels” on page 168 “V
Viewing Server LogsTo view the log les: In the developer prole, go to Applications Server → Logging → View Log Files. In the cluster and enterprise
ExamplesEXAMPLE 18–1 Applications Node Tree Structure ...173EXAMPLE 18–2 HTTP Se
A window labeled Log Entry Detail appears, with a formatted version of the message.At the end of the list of entries, click the buttons to view earlie
Monitoring Components and ServicesThis chapter contains information about monitoring components using the Enterprise ServerAdmin Console. This chapter
Overview of MonitoringTo monitor the Enterprise Server, perform these steps:1. Enable the monitoring of specic services and components using either t
EXAMPLE 18–1 Applications Node Tree Structureapplications|--- application1| |--- ejb-module-1| | |--- ejb1 *| | |--- cache (for entity/sfsb) *| | |---
EXAMPLE 18–3 HTTP Service Schematic (Cluster and Enterprise Prole Version)http-service *|---connection-queue *|---dns *|---file-cache *|---keep-alive
EXAMPLE 18–6 JMS Service Schematicjms-service|-- connection-factories [AKA conn. pools in the RA world]| |-- connection-factory-1 (All CF stats for th
“Thread Pools Statistics” on page 186 “Transaction Service Statistics” on page 186 “Java Virtual Machine (JVM) Statistics” on page 187 “JVM Statistic
TABLE 18–2 EJB Method StatisticsAttribute Name DataType Descriptionmethodstatistic TimeStatistic Number of times an operation iscalled; the total time
TABLE 18–3 EJB Session Store Statistics (Continued)Attribute Name DataType DescriptionactivationErrorCount CountStatistic Time (ms) spent executing th
TABLE 18–4 EJB Pool StatisticsAttribute Name DataType Descriptionnumbeansinpool BoundedRangeStatistic Number of EJB’s in the associated pool,providing
18
TABLE 18–5 EJB Cache Statistics (Continued)Attribute Name DataType Descriptionnumpassivationsuccess CountStatistic Number of times passivation complet
TABLE 18–8 Web Container (Web Module) StatisticsStatistic DataType Commentsjspcount CountStatistic Number of JSP pages that havebeen loaded in the web
TABLE 18–9 HTTP Service Statistics (Developer Prole)Statistic Units Data Type Commentsbytesreceived Bytes CountStatistic The cumulative value of the
The statistics available for the JDBC connection pool are shown in the following table.TABLE 18–10 JDBC Connection Pool StatisticsStatistic Units Data
TABLE 18–10 JDBC Connection Pool Statistics (Continued)Statistic Units DataType Descriptionnumconnacquired Number CountStatistic Number of logical con
TABLE 18–11 Connector Connection Pool Statistics (Continued)Statistic Units DataType Descriptionnumconndestroyed Number CountStatistic Number of physi
TABLE 18–13 Connection Manager (in an ORB) Statistics (Continued)Statistic Units DataType Descriptiontotalconnections Number BoundedRangeStatistic Tot
TABLE 18–15 Transaction Service Statistics (Continued)Statistic DataType Descriptioncommittedcount CountStatistic Number of transactions that have bee
TABLE 18–17 JVM Statistics for Java SE- Class Loading (Continued)Statistic DataType Descriptiontotalloadedclasscount CountStatistic Total number of cl
TABLE 18–20 JVM Statistics for Java SE- Memory (Continued)Statistic DataType Descriptioncommittedheapsize CountStatistic Amount of memory (in bytes) t
PrefaceThe Administration guide describes the administrative tasks of the Enterprise Server.This preface contains information about and conventions fo
TABLE 18–22 JVM Statistics for Java SE - Runtime (Continued)Statistic DataType Descriptionmanagementspecversion StringStatistic Management spec. versi
TABLE 18–23 JVM Statistics for Java SE - Thread Info (Continued)Statistic DataType Descriptionlockownerid CountStatistic ID of the thread that holds t
Conguring Monitoring Levels Using the AdminConsoleTo congure monitoring in the Admin Console: For the developer prole, go to Conguration → Monitor
Viewing Monitoring Data “Viewing Monitoring Data in the Admin Console” on page 193 “Viewing Monitoring Data With the asadmin Tool” on page 193Viewing
servlet, connection, connectorpool, endpoint, entitybean, messagedriven,statefulsession, statelesssession, httpservice,orwebmodule.For example, to vie
To display monitoring statistics for an application component or subsystem for whichmonitoring has been enabled, use the asadmin get command.To get th
Another example, application, is a valid monitorable object type and is not a singleton. Toaddress a non-singleton child node representing, for exampl
Examples for the list --user admin-user --monitor CommandThe list command provides information about the application components and subsystemscurrentl
When an attribute is requested that does not exist for a particular component or subsystem,an error is returned. Similarly, when a specic attribute i
Example 3Attempt to get a specic attribute from a subsystem:asadmin> get --user admin-user --monitor server.jvm.uptime-lastsampletimeReturns:serve
Copyright 2008 Sun Microsystems, Inc. 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved.Sun Microsystems, Inc. has intellectual pr
TABLE P–1 Books in the Enterprise Server Documentation Set (Continued)Book Title DescriptionHigh Availability AdministrationGuideSetting up clusters,
server.http-serviceserver.resourcesserver.thread-poolsThe list of monitorable components includes thread-pools, http-service, resources, and alldeploy
Returns:Nothing to list at server.applications.petstore.signon-ejb_jar.UserEJB.bean-methods.getUserName. To get the valid names beginning with astring
server.applications.petstore.signon-ejb_jar.UserEJB.bean-methods.getUserName.totalnumerrors-count = 0server.applications.petstore.signon-ejb_jar.UserE
TABLE 18–25 Top LevelCommand Dotted Name Outputlist -m server server.applicationsserver.thread-poolsserver.resourcesserver.http-serviceserver.transact
TABLE 18–27 Applications - Enterprise Applications and Standalone ModulesCommand Dotted Name Outputlist -m server.applications.app1or*app1Note: this l
TABLE 18–27 Applications - Enterprise Applications and Standalone Modules (Continued)Command Dotted Name Outputlist -m server.applications.app1.ejb-mo
TABLE 18–27 Applications - Enterprise Applications and Standalone Modules (Continued)Command Dotted Name Outputlist -m server.applications.app1.ejb-mo
TABLE 18–28 HTTP-Service LevelCommand Dotted Name Outputlist -m server.http-service List of virtual servers.get -m server.http-service.* No output exc
TABLE 18–30 Resources LevelCommand Dotted Name Outputlist -m server.resources List of pool names.get -m server.resources.* No output except message sa
TABLE 18–32 ORB Level (Continued)Command Dotted Name Outputget -m server.orb.connection-managers.* No output except message saying there are noattribu
Typographic ConventionsThe following table describes the typographic changes that are used in this book.TABLE P–3 TypographicConventionsTypeface Meani
To view all the MBeans, Enterprise Server provides a conguration of the Standard JMXConnector Server called System JMX Connector Server. As part of E
The security-enabled ag for the JMX Connector is false. If you are running the cluster orenterprise prole, or if you have turned on security for the
In the Connect to Agent tab of JConsole, enter user name, password, host name and port (8686,by default).The user name refers to the administration us
Start JConsole by running JDK_HOME/bin/jconsoleIn the Connect to Agent tab of JConsole, enter user name, password, host name and port (8686,by default
Conguring Management RulesThis section contains information about setting administration policies to automate routineadministration tasks, congure s
notications and take appropriate action. For details on developing a custom MBean anddeploying it, see Chapter 14, “Developing Custom MBeans,” in Sun
In addition, to enable a individual management rule, you must enable the rule on this page byclicking the box next to the rule and clicking Enable.A r
JavaVirtual Machine and Advanced SettingsThe Java Virtual Machine (JVM) is an interpretive computing engine responsible for runningthe byte codes in a
TABLE P–4 Symbol Conventions (Continued)Symbol Description Example Meaning→ Indicates menu itemselection in a graphical userinterface.File → New → Tem
Debug Options: Specify the JPDA options passed to the JVM when the debugging isenabled. RMI Compile Options: Enter the command-line options for the r
Automatically Restarting a Domain or NodeAgentIf your domain or node agent is stopped unexpectedly (for example, if you need to restart yourmachine),
To determine if a user has the net_privaddr privilege, log in as that user and type the commandppriv -l | grep net_privaddr.To run the asadmin create-
Restarting Automatically Using inittab on Solaris 9 and LinuxPlatformsTo restart your domain on the Solaris 9 or Linux platform, add a line of text to
C:\winnt\system32\sc.exe create service-name binPath= \"fully-qualied-path-to-appservService.exe\"fully-qualied-path-to-asadmin.bat start-
Preventing the Service From Shutting Down When aUser Logs OutBy default, the Java VM catches signals from Windows that indicate that the operating sys
If the “interact with desktop” option is not set, the service stays in a “start-pending” stateand appears to hang. Kill the service process to recover
Dotted Name Attributes for domain.xmlThis appendix describes the dotted name attributes that can be used to address the MBean andits attributes. Every
Element Name Dotted Name Prexclusters domain.clustersEvery cluster contained in this element is accessible as cluster-name. Wherecluster-name is the
Dotted Name Aliased totarget.admin-service cong-name.admin-servicetarget.web-container cong-name.web-containertarget.sip-container cong-name.sip-co
Enterprise Server OverviewSun GlassFish Enterprise Server administration includes many tasks such as deployingapplications, creating and conguring do
The asadmin UtilityThe Application Server includes a command-line administration utility known as asadmin.Theasadmin utility is used to start and stop
The asadmin UtilityUse the asadmin utility to perform any administrative tasks for the Application Server. You canuse this asadmin utility in place of
-s --secure if true, uses SSL/TLS to communicate with the domain application server. -t --terse indicates that any output data must be very concise,
To use the --secure option, you must use the set command to enable the security --enabledag in the admin http-listener in the domain.xml. When you us
TABLE C–1 Remote Commands Required Options (Continued)Option Denition--passwordfile The --passwordfile option species the name of a le containing t
invokemultimode from within a multimodesession; once you exit the second multimodeenvironment, you return to your original multimode environment.The G
The list command treats this complete dotted name as the complete name of a parentnode in the abstract hierarchy. Upon providing this name to list co
TABLE C–2 Server Lifecycle Commands (Continued)Command Denitionstart-domain Starts a domain. If the domain directory is not specied, the domain in t
TABLE C–3 List and Status Commands (Continued)list-components Lists all deployed Java EE 5 components. If the --typeoption is not specied,all compone
Enterprise Server includes the Metro web services stack (http://metro.dev.java.net). Metroimplements important WS-* standards and WS-I standardized in
Version CommandsThe version commands return the version string, display a list of all the asadmin commands,and allow you to install the license le.TA
Resource Management CommandsThe resource commands allow you to manage the various resources used in your application.TABLE C–7 Resource Management Com
TABLE C–7 Resource Management Commands (Continued)Command Denitiondelete-custom-resource Removes a custom resource.list-custom-resources Lists the cu
Conguration CommandsThe conguration commands allow you to construct IIOP listeners, lifecycle modules, HTTPand IIOP listeners, prolers, and other s
TABLE C–9 Lifecycle Module CommandsCommand Denitioncreate-lifecycle-module Creates a lifecycle module. The lifecycle modules provide a means of runni
TABLE C–11 JVM Options and Virtual Server CommandsCommand Denitioncreate-jvm-option Creates JVM options in the Java conguration or proler elements
TABLE C–13 Transaction CommandsCommand Denitionfreeze-transaction Freezes the transaction subsystem during which time all the inighttransactions are
TABLE C–15 User Management Commands (Continued)Command Denitionupdate-file-user Updates an existing entry in the keyle using the specied user_name,
TABLE C–17 Database CommandsCommand Denitionstart-database Starts the Java DB server that is available with the Application Server. Use thiscommand o
TABLE C–19 Web Service Commands (Continued)Command Denitiondelete-transformation-rule Deletes an XSLT transformation rule of a given web service.list
If your conguration includes remote server instances, create node agents to manage andfacilitate remote server instances. It is the responsibility of
TABLE C–20 Security Commands (Continued)Command Denitiondelete-message-security-provide Enables administrators to delete a provider-config sub-elemen
Verify CommandThe XML verier command veries the content of the domain.xml le.TABLE C–22 Verify CommandCommand Denitionverify-domain-xml Veries th
Property CommandShared server instances will often need to override attributes dened in their referencedconguration. Any conguration attribute in a
IndexAACCSee containersapplication client, 93acceptor threads, in HTTP listeners, 151Admin Console, 24applets, 93asadmin utility, 25Bbean-cache, monit
external repositories, accessing, 79FForeign Providers, JMS, 67-74Gget command, monitoring data, 197Hhigh availability, 28HTTP listenersacceptor threa
logging (Continued)viewing the server log, 169-170Mman pages, 25monitoringbean-cache attributes, 179-180container subsystems, 172-173ORB service, 185-
Tthread pools, 163performance, 163thread starvation, 163threads, See thread pools, 163topics, JMS, 63-64total-beans-created, 179totalbeansdestroyed, 1
Enterprise Server ConceptsThe Enterprise Server consists of one or more domains. A domain is an administrativeboundary or context. Each domain has an
carry out the requests. The DAS is sometimes referred to as the admin server or default server. Itis referred to as the default server because it is t
TABLE 1–1 Features Available for Each Prole (Continued)Feature Developer Prole Cluster ProleEnterprise Prole (notavailable with Sun GlassFishCommu
Server InstanceThe server instance is a single Java EE compatible Java Virtual Machine hosting an EnterpriseServer on a single node. Each server insta
ContentsPreface ...
names, IP Addresses, and some administration capabilities. For the users, it is almost as if theyhave their own web server, without the hardware and b
Basic Enterprise Server CommandsAdministration of the Enterprise Server includes tasks such as creation, conguration, controland management of domain
Caution – Do not create an enterprise domain unless you have HADB and the Network SecurityServices (NSS) keystore. You will not be able to start an en
Starting the Default Domain on WindowsFrom the Windows Start Menu, select Programs -> Sun Microsystems -> Enterprise Server ->Start Admin Ser
For the full syntax, type asadmin help create-cluster.Starting a ClusterA cluster is started using the start-cluster command. The following example st
For the full syntax, type asadmin help start-node-agent.Stopping a Node AgentA node agent is stopped using the stop-node-agent command and specifying
Recreating the Domain Administration ServerFor mirroring purposes, and to provide a working copy of the Domain Administration Server(DAS), you must ha
Change domain-root-dir/domain1/generated/tmp directory permissions on the third machineto match the permissions of the same directory on rst machine.
38
Java Business IntegrationJava Business Integration (JBI) is an implementation of the JSR 208 specication(http://www.jcp.org/en/jsr/detail?id=208)for
Starting an Instance ... 35Stopping
Binding ComponentsBinding Components are proxies for consumers or providers that are outside the JBIenvironment. Binding components typically are base
Note – The logging levels for JBI Components are often inherited from a parent logger such asthe JBI logger. To view and set parent logging levels, in
Shared LibrariesA Shared Library provides Java classes that are not private to a single component and is typicallyshared by more than one JBI Componen
JDBC ResourcesThis chapter explains how to congure JDBC resources, which are required by applications thataccess databases. This chapter contains the
When creating a JDBC resource, you must identify:1. The JNDI Name. By convention, the name begins with the jdbc/ string. For example:jdbc/payrolldb. D
Behind the scenes, the application server retrieves a physical connection from theconnection pool that corresponds to the database. The pool denes co
Working with JDBC Connection PoolsA JDBC connection pool is a group of reusable connections for a particular database. Whencreating the pool with the
Click OK.▼Creating a JDBC Connection Pool and JDBC Resource Using the CLIUse the asadmin create-jdbc-connection-pool command to create a JDBC connecti
Editing a JDBC Connection PoolThe Edit JDBC Connection Pool page provides the means to change all of the settings for anexisting pool except its name.
Optionally, the application server can validate connections before they are passed toapplications. This validation allows the application server to au
IBM Informix Type 4 Driver ... 61CloudScape 5.1 Typ
Parameter DescriptionNon-transactional Connections Click the check box if you want Application Server to return allnon-transactional connections.Trans
Attribute DescriptionValidate Atmost Once Amount of time, in seconds, after which aconnection is validated at most once. This will helpreduce the numb
Match Connections Use this option to switch on/o connectionmatching for the pool. It can be set to false if theadministrator knows that the connectio
Note – An Oracle database user running the capture-schema command needs ANALYZE ANYTABLE privileges if that user does not own the schema. These privil
Sun GlassFish JDBC Driver for DB2 DatabasesThe JAR les for this driver are smbase.jar, smdb2.jar, and smutil.jar. Congure theconnection pool using t
Sun GlassFish JDBC Driver for Microsoft SQL ServerDatabasesThe JAR les for this driver are smbase.jar, smsqlserver.jar, and smutil.jar. Congure thec
IBM DB2 8.1 Type 2 DriverThe JAR les for the DB2 driver are db2jcc.jar, db2jcc_license_cu.jar, and db2java.zip.Set environment variables as follows:L
password - Set as appropriate. databaseName - Set as appropriate. Do not specify the complete URL, only the databasename. BE_AS_JDBC_COMPLIANT_AS_POS
DataSource Classname: com.inet.ora.OraDataSource Properties: user - Specify the database user. password - Specify the database password. serviceName
password - Set as appropriate.Inet Sybelux JDBC Driver for Sybase DatabasesThe JAR le for the Inet Sybase driver is Sybelux.jar. Congure the connec
Managing Security Maps ... 87▼ To Delete a C
For example:jdbc:oracle:thin:@localhost:1521:customer_db xa-driver-does-not-support-non-tx-operations - Set to the value true. Optional:only needed if
xa-driver-does-not-support-non-tx-operations - Set to the value true. Optional:only needed if both non-XA and XA connections are retrieved from the s
62
Conguring Java Message Service ResourcesThe Enterprise Server implements the Java Message Service (JMS) API by integrating theMessage Queue software
TopicConnectionFactory objects, used for publish-subscribe communication ConnectionFactory objects, which can be used for both point-to-point andpubl
JMS Connection FactoriesJMS connection factories are objects that allow an application to create other JMS objectsprogrammatically. These administered
To create a physical destination from the Admin Console, select Conguration >PhysicalDestinations. In the Create Physical Destinations page, speci
In the MQ Scheme and MQ Service elds, type the Message Queue address scheme nameand the Message Queue connection service name if a non-default schem
Conguring the Generic Resource AdapterPrior to deploying the resource adapter, JMS client libraries should be made available to theEnterprise Server.
Property Name Valid Values Default Value DescriptionTopicConnectionFactoryClassNameName of the class availablein the application serverclasspath , for
Users ... 105
Property Name Valid Values Default Value DescriptionJndiProperties Name value pairs separatedby commaNone Species the JNDI provider propertiesto be u
Property Name Valid Values Default Value DescriptionRMPolicy ProviderManaged orOnePerPhysicalConnectionProviderManagedThe isSameRM method on anXAResou
Property Name Valid Value Default Value DescriptionClientId A valid client ID None ClientID as specied by JMS 1.1specication.ConnectionFactoryJndiNa
Property Name Valid Value Default Value DescriptionMaxPoolSize An integer 8 Maximum size of server session poolinternally created by the resourceadapt
Property Name Valid Value Default Value DescriptionRedeliveryAttempts integer Number of times a message will bedelivered if a message causes aruntime
Conguring JavaMail ResourcesThe Enterprise Server includes the JavaMail API. The JavaMail API is a set of abstract APIs thatmodel a mail system. The
To create a JavaMail session using the Admin Console, select Resources —> JavaMail Sessions.Specify the JavaMail settings as follows: JNDI Name: Th
JNDI ResourcesThe Java Naming and Directory Interface (JNDI) is an application programming interface(API) for accessing dierent kinds of naming and d
application component's environment allows the application component to be customizedwithout the need to access or change the application compone
TABLE 6–1 JNDI Lookups and Their Associated ReferencesJNDI Lookup Name Associated Referencejava:comp/env Application environment entriesjava:comp/env/
Actions of Request and Response Policy Congurations ... 134Conguring Other Security Facilities ..
-- and jndi-lookup-name refers to the JNDI name to lookup to fetch the-- designated (in this case the java) object.--><external-jndi-resource jn
Connector ResourcesThis chapter explains how to congure connectors, which are used to access enterpriseinformation systems (EISs). This chapter conta
Managing Connector Connection Pools “To Create a Connector Connection Pool” on page 82 “To Edit a Connector Connection Pool” on page 83 “To Edit Conne
c. In the Additional Properties table, add any required properties.In the previous Create Connector Connection Pool page, you selected a class in theC
On Any Failure If you select the checkbox labelled Close AllConnections, if a single connection fails, then theapplication server will close all conne
Using the asadmin commands to change connection pool properties.You can use the asadmin get and set commands to view and change the values of theconne
Lazy Association Connections are lazily associated when an operation is performed on them. Also,they are disassociated when the transaction is complet
▼To Edit Connection Pool PropertiesUse the Additional Properties tab to modify the properties of an existing pool.The properties specied depend on th
Equivalent asadmin commanddelete-connector-connection-pool▼To Set Up EIS AccessDeploy (install) a connector.Create a connection pool for the connector
d. Do one of the following: If you are using the cluster prole, you will see the Targets section of the page. in theTargets section of the page, sele
Viewing Deployed Web Services ... 156Testing Web Services ..
On the Connector Resources page, select the checkbox for the resource to be deleted.Click Delete.Equivalent asadmin commanddelete-connector-resource▼T
To create, edit, and delete Connector Connection Pools, click Resources —> AdministeredObject Resources in the Admin Console. Consult the Admin Con
g. Click Finish.Equivalent asadmin commandcreate-admin-object▼To Edit an Administered Object ResourceIn the tree component, expand the Resource node a
Web and EJB ContainersContainers provide runtime support for application components. Application components usethe protocols and methods of the contai
Editing the Properties of the SIP ContainerThe sub-elements of the SIP container are session-managerand session-properties.store-properties, manager-p
Editing SIP Container Session Manager PropertiesTo view the sub-elements of the SIP container session manager properties, use the followingcommand: li
96
Conguring SecuritySecurity is about protecting data: how to prevent unauthorized access or damage to it in storageor transit. The Enterprise Server;
In declarative security, the container (the Enterprise Server) handles security through anapplication's deployment descriptors. You can control
For more information on using certutil, pk12util, and other NSS security tools, see NSSSecurity Tools athttp://www.mozilla.org/projects/security/pki/n
Comentarios a estos manuales