The document provides instructions for configuring IBM WebSphere Application Server 6.1 for Web authentication with SAS 9.2 Web applications. The key steps include: 1) updating the login.config file to reference the web domain; 2) adding security constraints, authentication methods, and roles to the SAS Logon Manager application; 3) copying SAS JAR files; 4) modifying login module information in the WebSphere administrative console; 5) configuring the SAS Remote Services classpath; and 6) restarting services and verifying the configuration.
Installing web sphere application server v7 on red hat enterprise linux v6.3Dave Hay
I wrote this deck as an as-is guide for an IBM colleague who was looking to install WAS v7 on RHEL 6.3. Please note that this deck is provided as-is, and it does not replace the official installation guidance and materials in the WAS Information Center - http://pic.dhe.ibm.com/infocenter/wasinfo/v7r0/index.jsp
Jangli Narasimhulu has over 4 years of experience administering IBM WebSphere Application Server 6.X on Windows and Linux. He has experience installing, configuring, and administering WebSphere Application Server and IBM HTTP Server. His responsibilities include creating profiles, implementing security, deploying applications, configuring data sources and clusters, and monitoring performance. He has worked on projects for clients such as Carphone Warehouse, GTB NAFTA, and AVIVA NUITS.
WebSphere Application Server (WAS) provides the infrastructure to develop and run web and enterprise applications. It includes a web container to handle HTTP requests and servlets/JSPs, an EJB container to manage enterprise java beans, and various services like transactions, security, and messaging. WAS implements the J2EE specification and is available in different packages for single server or clustered/scalable environments. It supports the development and deployment of web services, SOA applications, and dynamic web sites.
The document provides an overview of getting started with JBoss Application Server 7, including downloading, installing, exploring the directory structure, starting the server, and managing it. Key points covered include downloading the distribution, a tour of the directory structure and configuration files, how to start the server in standalone and domain modes, and how to authenticate and use the administration console and CLI to manage the running server.
BISP is committed to provide BEST learning material to the beginners and advance learners.In the same series, we have prepared a complete end-to end Hands-on Guide for WebLogicAdministration. The document focuses on detailed information about WebLogic Admin Consoleand Scripting tool. Join our professional training program and learn from experts
Windows PowerShell is a new command-line shell and scripting language built on .NET. It can be used to administer SharePoint by allowing execution of multiple commands at once using cmdlets, unlike Stsadm which only accepts one command at a time. Permissions are required to use PowerShell for SharePoint, including being a member of the SharePoint_Shell_Access role and the WSS_ADMIN_WPG local group. Common tasks that can be performed with PowerShell include deploying solutions, managing features, backup/restore of content databases, and other site collection and site management operations.
IBM websphere application server types of profilesKuldeep Saxena
This document discusses various profiles in IBM Websphere Application Server Network Deployment. It describes the Application Server Profile which creates a standalone server, the Custom Profile which creates an empty node to add to a deployment manager, and several management profiles including the Deployment Manager Profile which manages nodes and servers, the Administrative Agent Profile which manages standalone servers on one machine, and the Job Manager Profile which provides centralized management across deployments. The Cell Profile combines a deployment manager and application server.
C# and ASP.NET Code and Data-Access SecurityDarren Sim
This document discusses ASP.NET security topics including authentication, authorization, forms authentication, and SQL injection. It describes how ASP.NET handles authentication using forms authentication, Windows authentication, and authentication providers. It also covers authorization configuration and URL authorization. The document discusses ADO.NET and using DataAdapters, DataSets, and DataReaders to work with databases. It provides examples of transactions, executing commands, and using a DataGrid to display query results. It warns about the risk of SQL injection and describes how user input should be sanitized in queries to prevent this vulnerability.
Installing web sphere application server v7 on red hat enterprise linux v6.3Dave Hay
I wrote this deck as an as-is guide for an IBM colleague who was looking to install WAS v7 on RHEL 6.3. Please note that this deck is provided as-is, and it does not replace the official installation guidance and materials in the WAS Information Center - http://pic.dhe.ibm.com/infocenter/wasinfo/v7r0/index.jsp
Jangli Narasimhulu has over 4 years of experience administering IBM WebSphere Application Server 6.X on Windows and Linux. He has experience installing, configuring, and administering WebSphere Application Server and IBM HTTP Server. His responsibilities include creating profiles, implementing security, deploying applications, configuring data sources and clusters, and monitoring performance. He has worked on projects for clients such as Carphone Warehouse, GTB NAFTA, and AVIVA NUITS.
WebSphere Application Server (WAS) provides the infrastructure to develop and run web and enterprise applications. It includes a web container to handle HTTP requests and servlets/JSPs, an EJB container to manage enterprise java beans, and various services like transactions, security, and messaging. WAS implements the J2EE specification and is available in different packages for single server or clustered/scalable environments. It supports the development and deployment of web services, SOA applications, and dynamic web sites.
The document provides an overview of getting started with JBoss Application Server 7, including downloading, installing, exploring the directory structure, starting the server, and managing it. Key points covered include downloading the distribution, a tour of the directory structure and configuration files, how to start the server in standalone and domain modes, and how to authenticate and use the administration console and CLI to manage the running server.
BISP is committed to provide BEST learning material to the beginners and advance learners.In the same series, we have prepared a complete end-to end Hands-on Guide for WebLogicAdministration. The document focuses on detailed information about WebLogic Admin Consoleand Scripting tool. Join our professional training program and learn from experts
Windows PowerShell is a new command-line shell and scripting language built on .NET. It can be used to administer SharePoint by allowing execution of multiple commands at once using cmdlets, unlike Stsadm which only accepts one command at a time. Permissions are required to use PowerShell for SharePoint, including being a member of the SharePoint_Shell_Access role and the WSS_ADMIN_WPG local group. Common tasks that can be performed with PowerShell include deploying solutions, managing features, backup/restore of content databases, and other site collection and site management operations.
IBM websphere application server types of profilesKuldeep Saxena
This document discusses various profiles in IBM Websphere Application Server Network Deployment. It describes the Application Server Profile which creates a standalone server, the Custom Profile which creates an empty node to add to a deployment manager, and several management profiles including the Deployment Manager Profile which manages nodes and servers, the Administrative Agent Profile which manages standalone servers on one machine, and the Job Manager Profile which provides centralized management across deployments. The Cell Profile combines a deployment manager and application server.
C# and ASP.NET Code and Data-Access SecurityDarren Sim
This document discusses ASP.NET security topics including authentication, authorization, forms authentication, and SQL injection. It describes how ASP.NET handles authentication using forms authentication, Windows authentication, and authentication providers. It also covers authorization configuration and URL authorization. The document discusses ADO.NET and using DataAdapters, DataSets, and DataReaders to work with databases. It provides examples of transactions, executing commands, and using a DataGrid to display query results. It warns about the risk of SQL injection and describes how user input should be sanitized in queries to prevent this vulnerability.
JBoss Application Server is an open source application server. It supports J2EE 1.3 technologies including EJB 2.0, JMS, JDBC, and more. JBoss installs easily and can be configured for clustering, web services, and CORBA integration. It uses Apache Tomcat as its web server and integrates the open source JBossMQ for JMS. Default topics, queues, and a Hypersonic database are provided for testing and development.
Ibm web sphere application server interview questionspraveen_guda
WebSphere Application Server is an application server that provides runtime environments for Java EE applications. It allows deploying, configuring, and managing applications. A profile defines the runtime environment and includes files processed at runtime. Profiles can be created using command line or GUI tools and include Deployment Manager profiles, Application Server profiles, and custom profiles.
This document provides instructions for installing vSphere Installation and Setup. It begins with an overview of the installation process, which includes installing vCenter Server components like vCenter Single Sign-On, vCenter Inventory Service, and the vSphere Web Client before installing vCenter Server. It then discusses system requirements, preparing the vCenter Server database, and required information before providing step-by-step instructions for installing ESXi, vCenter Server, and configuring the environment after installation.
SharePoint Security in an Insecure World - AUSPC 2012Michael Noel
The document discusses the five layers of security in a SharePoint environment: infrastructure security, data security, transport security, edge security, and rights management. It provides details on implementing security controls within each layer such as enabling Kerberos authentication, using SQL transparent data encryption, configuring SSL, and installing Active Directory Rights Management Services. The layers approach aims to secure SharePoint across physical, network, and application levels through controls at each layer of the technology stack.
SEASPC 2011 - SharePoint Security in an Insecure World: Understanding the Fiv...Michael Noel
One of the biggest advantage of using SharePoint as a Document Management and collaboration environment is that a robust security and permissions structure is built-in to the application itself. Authenticating and authorizing users is a fairly straightforward task, and administration of security permissions is simplified. Too often, however, security for SharePoint stops there, and organizations don’t pay enough attention to all of the other considerations that are part of a SharePoint Security stack, and more often than not don’t properly build them into a deployment. This includes such diverse categories including Edge, Transport, Infrastructure, Data, and Rights Management Security, all areas that are often neglected but are nonetheless extremely important. This session discusses the entire stack of Security within SharePoint, from best practices around managing permissions and ACLs to comply with Role Based Access Control, to techniques to secure inbound access to externally-facing SharePoint sites. The session is designed to be comprehensive, and includes all major security topics in SharePoint and a discussion of various real-world designs that are built to be secure.
Oracle Enterprise Repository (OER) provides a foundation for API lifecycle management and SOA governance. It manages metadata for various software assets and defines organizational roles. OER provides a common channel to exchange metadata between providers, consumers, and tools. It supports the entire API lifecycle from decision making to compliance. OER's tools include a web console, asset editor, import/export tool, and type manager. It enables configuring, publishing, and updating repository content while providing role-based access.
Instruction on creating a cluster on jboss eap environmentMadhusudan Pisipati
The document describes setting up an active-passive JBoss EAP cluster configuration with two active nodes in one cluster and two passive nodes in another cluster. Key steps include:
1. Creating users on each node for management and application access.
2. Configuring the first node as the domain controller and defining server groups and profiles for the active and passive clusters.
3. Configuring the second active node and passive nodes to connect to the domain controller and join the appropriate cluster.
4. Installing Apache HTTP Server on a separate machine and configuring mod_cluster to load balance between the active clusters.
Oracle Enterprise manager 13c InstallationOsama Mustafa
This document provides instructions for installing Oracle Enterprise Manager 13c, including invoking the installation wizard as the oracle user, checking prerequisites such as disk space and database configuration, selecting an installation type, entering details like passwords and database connection information, and finally reviewing and completing the installation process.
The document provides an introduction to JBoss Application Server, including its history, architecture, components, installation process, directory structure, and how to start and stop the server. It also discusses the JBoss Administration Console and JMX Console for managing and monitoring the application server.
This document discusses techniques for troubleshooting issues with Red Hat JBoss EAP 6. It covers generating thread dumps, heap dumps, and log files to analyze where threads are stuck or understand memory usage. The JBoss Diagnostic Reporter (JDR) subsystem can collect troubleshooting information. Byteman allows inserting extra Java code into applications to aid debugging. The log subsystem level and GC logging can be configured for additional troubleshooting data in log files.
Oracle SOA enterprise repositories Technical OverviewBiswanath Swain
This document discusses Oracle tools for managing SOA services, including Oracle Enterprise Repository (OER) and Oracle Service Registry (OSR). OER is used to specify, document, and govern business services, while OSR provides a UDDI v3 directory. These tools work with the SOA Suite to connect service definition, implementation, deployment, execution, and monitoring. The document also indicates it will cover installing and setting up OER in a subsequent post.
The document provides an overview of Weblogic concepts and administration. It defines key Weblogic terms like domains, admin servers, managed servers, and clusters. It also covers installing and configuring Weblogic, monitoring tools, and managing the application server using the admin console and WLST scripting. The presentation aims to help DBAs understand basic Weblogic architecture and administration.
This Quick Start Guide to Oracle Enterprise Repository 11g covers installation planning, installation and configuration, administering and managing users, and steps into the asset life cycle management.
The document provides an overview of JBoss Application Server, including its definition, architecture, advantages, installation, configuration, deployment, running applications, and undeployment. It discusses that JBoss is a widely used open source Java application server that allows deployment of Java applications and provides services like transaction processing and security. The document also provides details on installing JBoss, using the management console, deploying applications as WAR files using Ant build scripts, and modifying or removing deployed applications.
This document outlines the steps to upgrade an OBIEE 10g repository (RPD) and web catalog containing dashboards and reports to OBIEE 11g. It involves using the Oracle Fusion Middleware Upgrade Assistance Utility and checking the upgraded RPD and catalog in the OBIEE 11g administration tool. The process also includes verifying users, groups, dashboard functionality and report queries after the upgrade.
Developing with oracle enterprise scheduler service for fusion applicationsChandrakant Wanare ☁
This document provides instructions on how to set up a development environment and create a simple application that uses Oracle Enterprise Scheduler Service (ESS) for Fusion Applications. It covers installing JDeveloper, configuring an integrated WebLogic server domain, creating an ADF application with Model and ViewController projects, adding required libraries and metadata definitions, implementing an ESS job and UI, deployment, and testing. The goal is to illustrate the minimum steps to create an environment and build a basic ESS application.
The document provides instructions for installing Oracle API Gateway 11.12.1.0 on an Oracle Linux 5 server. It includes requirements for disk space, memory, ports and prerequisites for installing the Oracle software. Detailed steps are provided for creating a software user and group, configuring system files, installing the API Gateway software and creating an initial API Gateway instance.
This document provides steps to install OBIEE 11g R1 (11.1.1.5) including prerequisites, downloading files, installing the Repository Creation Utility (RCU) to create schemas, installing and configuring a loopback adapter, running the installation wizard to install OBIEE components, and verifying the installation. Key steps include using RCU to create schemas in an Oracle database, providing database connection details during OBIEE installation, selecting components, and testing the default analytics page upon completion.
The document provides instructions for installing Oracle Enterprise Manager Cloud Control 12c and configuring its components. Key steps include:
1. Installing the Oracle Management Server (OMS) and configuring its database connection and ports.
2. Installing agents on an Oracle SOA clustered domain and configuring auto-discovery and promotion of targets to managed state.
3. Installing the JVMD (JVM Diagnostics) manager to monitor JVMs, which requires resynchronizing agents, selecting the application performance agent, and configuring a managed server.
This document is about an event that occurred on Thursday, October 4, 2012 but provides no other details about what happened on that date. It repeats the date "Thursday, October 4, 2012" multiple times but does not include any events, people, locations or other information that would help summarize the key points of the document.
The document discusses how technology is changing how creative work is done. Previously, creatives worked more independently, but are now expected to be extroverted and work more collaboratively. This values extroversion over important qualities of introverts like solitary thinking. The document argues that valuing introversion could lead to more innovative design by allowing solitary reflection instead of prioritizing celebrity and assertiveness.
JBoss Application Server is an open source application server. It supports J2EE 1.3 technologies including EJB 2.0, JMS, JDBC, and more. JBoss installs easily and can be configured for clustering, web services, and CORBA integration. It uses Apache Tomcat as its web server and integrates the open source JBossMQ for JMS. Default topics, queues, and a Hypersonic database are provided for testing and development.
Ibm web sphere application server interview questionspraveen_guda
WebSphere Application Server is an application server that provides runtime environments for Java EE applications. It allows deploying, configuring, and managing applications. A profile defines the runtime environment and includes files processed at runtime. Profiles can be created using command line or GUI tools and include Deployment Manager profiles, Application Server profiles, and custom profiles.
This document provides instructions for installing vSphere Installation and Setup. It begins with an overview of the installation process, which includes installing vCenter Server components like vCenter Single Sign-On, vCenter Inventory Service, and the vSphere Web Client before installing vCenter Server. It then discusses system requirements, preparing the vCenter Server database, and required information before providing step-by-step instructions for installing ESXi, vCenter Server, and configuring the environment after installation.
SharePoint Security in an Insecure World - AUSPC 2012Michael Noel
The document discusses the five layers of security in a SharePoint environment: infrastructure security, data security, transport security, edge security, and rights management. It provides details on implementing security controls within each layer such as enabling Kerberos authentication, using SQL transparent data encryption, configuring SSL, and installing Active Directory Rights Management Services. The layers approach aims to secure SharePoint across physical, network, and application levels through controls at each layer of the technology stack.
SEASPC 2011 - SharePoint Security in an Insecure World: Understanding the Fiv...Michael Noel
One of the biggest advantage of using SharePoint as a Document Management and collaboration environment is that a robust security and permissions structure is built-in to the application itself. Authenticating and authorizing users is a fairly straightforward task, and administration of security permissions is simplified. Too often, however, security for SharePoint stops there, and organizations don’t pay enough attention to all of the other considerations that are part of a SharePoint Security stack, and more often than not don’t properly build them into a deployment. This includes such diverse categories including Edge, Transport, Infrastructure, Data, and Rights Management Security, all areas that are often neglected but are nonetheless extremely important. This session discusses the entire stack of Security within SharePoint, from best practices around managing permissions and ACLs to comply with Role Based Access Control, to techniques to secure inbound access to externally-facing SharePoint sites. The session is designed to be comprehensive, and includes all major security topics in SharePoint and a discussion of various real-world designs that are built to be secure.
Oracle Enterprise Repository (OER) provides a foundation for API lifecycle management and SOA governance. It manages metadata for various software assets and defines organizational roles. OER provides a common channel to exchange metadata between providers, consumers, and tools. It supports the entire API lifecycle from decision making to compliance. OER's tools include a web console, asset editor, import/export tool, and type manager. It enables configuring, publishing, and updating repository content while providing role-based access.
Instruction on creating a cluster on jboss eap environmentMadhusudan Pisipati
The document describes setting up an active-passive JBoss EAP cluster configuration with two active nodes in one cluster and two passive nodes in another cluster. Key steps include:
1. Creating users on each node for management and application access.
2. Configuring the first node as the domain controller and defining server groups and profiles for the active and passive clusters.
3. Configuring the second active node and passive nodes to connect to the domain controller and join the appropriate cluster.
4. Installing Apache HTTP Server on a separate machine and configuring mod_cluster to load balance between the active clusters.
Oracle Enterprise manager 13c InstallationOsama Mustafa
This document provides instructions for installing Oracle Enterprise Manager 13c, including invoking the installation wizard as the oracle user, checking prerequisites such as disk space and database configuration, selecting an installation type, entering details like passwords and database connection information, and finally reviewing and completing the installation process.
The document provides an introduction to JBoss Application Server, including its history, architecture, components, installation process, directory structure, and how to start and stop the server. It also discusses the JBoss Administration Console and JMX Console for managing and monitoring the application server.
This document discusses techniques for troubleshooting issues with Red Hat JBoss EAP 6. It covers generating thread dumps, heap dumps, and log files to analyze where threads are stuck or understand memory usage. The JBoss Diagnostic Reporter (JDR) subsystem can collect troubleshooting information. Byteman allows inserting extra Java code into applications to aid debugging. The log subsystem level and GC logging can be configured for additional troubleshooting data in log files.
Oracle SOA enterprise repositories Technical OverviewBiswanath Swain
This document discusses Oracle tools for managing SOA services, including Oracle Enterprise Repository (OER) and Oracle Service Registry (OSR). OER is used to specify, document, and govern business services, while OSR provides a UDDI v3 directory. These tools work with the SOA Suite to connect service definition, implementation, deployment, execution, and monitoring. The document also indicates it will cover installing and setting up OER in a subsequent post.
The document provides an overview of Weblogic concepts and administration. It defines key Weblogic terms like domains, admin servers, managed servers, and clusters. It also covers installing and configuring Weblogic, monitoring tools, and managing the application server using the admin console and WLST scripting. The presentation aims to help DBAs understand basic Weblogic architecture and administration.
This Quick Start Guide to Oracle Enterprise Repository 11g covers installation planning, installation and configuration, administering and managing users, and steps into the asset life cycle management.
The document provides an overview of JBoss Application Server, including its definition, architecture, advantages, installation, configuration, deployment, running applications, and undeployment. It discusses that JBoss is a widely used open source Java application server that allows deployment of Java applications and provides services like transaction processing and security. The document also provides details on installing JBoss, using the management console, deploying applications as WAR files using Ant build scripts, and modifying or removing deployed applications.
This document outlines the steps to upgrade an OBIEE 10g repository (RPD) and web catalog containing dashboards and reports to OBIEE 11g. It involves using the Oracle Fusion Middleware Upgrade Assistance Utility and checking the upgraded RPD and catalog in the OBIEE 11g administration tool. The process also includes verifying users, groups, dashboard functionality and report queries after the upgrade.
Developing with oracle enterprise scheduler service for fusion applicationsChandrakant Wanare ☁
This document provides instructions on how to set up a development environment and create a simple application that uses Oracle Enterprise Scheduler Service (ESS) for Fusion Applications. It covers installing JDeveloper, configuring an integrated WebLogic server domain, creating an ADF application with Model and ViewController projects, adding required libraries and metadata definitions, implementing an ESS job and UI, deployment, and testing. The goal is to illustrate the minimum steps to create an environment and build a basic ESS application.
The document provides instructions for installing Oracle API Gateway 11.12.1.0 on an Oracle Linux 5 server. It includes requirements for disk space, memory, ports and prerequisites for installing the Oracle software. Detailed steps are provided for creating a software user and group, configuring system files, installing the API Gateway software and creating an initial API Gateway instance.
This document provides steps to install OBIEE 11g R1 (11.1.1.5) including prerequisites, downloading files, installing the Repository Creation Utility (RCU) to create schemas, installing and configuring a loopback adapter, running the installation wizard to install OBIEE components, and verifying the installation. Key steps include using RCU to create schemas in an Oracle database, providing database connection details during OBIEE installation, selecting components, and testing the default analytics page upon completion.
The document provides instructions for installing Oracle Enterprise Manager Cloud Control 12c and configuring its components. Key steps include:
1. Installing the Oracle Management Server (OMS) and configuring its database connection and ports.
2. Installing agents on an Oracle SOA clustered domain and configuring auto-discovery and promotion of targets to managed state.
3. Installing the JVMD (JVM Diagnostics) manager to monitor JVMs, which requires resynchronizing agents, selecting the application performance agent, and configuring a managed server.
This document is about an event that occurred on Thursday, October 4, 2012 but provides no other details about what happened on that date. It repeats the date "Thursday, October 4, 2012" multiple times but does not include any events, people, locations or other information that would help summarize the key points of the document.
The document discusses how technology is changing how creative work is done. Previously, creatives worked more independently, but are now expected to be extroverted and work more collaboratively. This values extroversion over important qualities of introverts like solitary thinking. The document argues that valuing introversion could lead to more innovative design by allowing solitary reflection instead of prioritizing celebrity and assertiveness.
The document describes a space called "The Outsider" that is meant to provide people a quiet place outside of their office or classroom to collect their thoughts alone during breaks. It is meant as a sanctuary for people to sit, sketch, breathe, think in a way that is comfortable for them to focus their energy and mental retreat.
Our dependence on technology is changing how creativity is developed and promoted. Traditionally, artists worked alone but now an extroverted, celebrity-like personality is valued over independent thinkers. This document proposes that a model embracing introverted qualities could lead to more innovative design by allowing solitary, deep thinking without peer pressure. It questions if we are losing creative work by overvaluing the extroverted ideal.
This document simply repeats the date "Thursday, October 4, 2012" seven times without providing any other context or information. It does not have enough content to create a multi-sentence summary.
This document proposes creating a space outside the office where people can take a break from work, sit quietly, think, and focus in a way that is comfortable for them. It would provide an alternative to the noise and clutter of everyday life, serving as a sanctuary for solitary thought and concentration during lunch breaks or errands. The space aims to offer a rare opportunity for solitude and introspection in a moment defined by noise and lack of focus.
The document proposes a project to rebrand introverted creatives by giving the concept a new identity through a name, symbol, manifesto, website, poster campaign and videos. It suggests creating 3D spaces ("tents") in public areas as places for introverts to go for alone time during breaks. It also proposes developing a poster campaign featuring innovator role models and creating a calendar to arrange implementing tent materials and publicizing the campaign through November and December with a final presentation. The goal is to transform perceptions of introversion and increase perceived worth of introverted creatives.
This document provides instructions for setting up IBM WebSphere Portal Integrator for SAP to connect an IBM WebSphere Portal instance to an SAP NetWeaver Portal. It describes downloading and installing required packages, configuring the AjaxProxy and single sign-on authentication, integrating SAP navigation pages into Portal, and setting access controls. The setup creates a Credential Vault for storing SAP user credentials, displays SAP content using an iView portlet, and shares the SSO cookie to allow single sign-on between the systems.
This document provides instructions for setting up IBM WebSphere Portal Integrator for SAP to connect an IBM WebSphere Portal to an SAP NetWeaver Portal. It describes downloading and installing required packages, configuring the AjaxProxy and single sign-on settings, setting up an iView portlet and navigation integration, and restricting access to authorized users. The setup creates a Credential Vault for storing SAP credentials, integrates SAP navigation and an SAP application into Portal, and passes the SAP SSO cookie to allow single sign-on.
This webcast covers the theoretical introduction to Web Farms and how to build Drupal Web Farms with IIS. Don't miss the second part of the webcast (also part of this series) where a full demo on creating Drupal Web Farms with 4 virtual machines will be presented. If you are already familiar with Web Farms, Application Request Router, Web Farm Framework you can skip to part 2. Otherwise, this webcast is highly recommended and propaedeutic to grasp all the basic knowledge that you might need later.
Single Sign-On for APEX applications based on Kerberos (Important: latest ver...Niels de Bruijn
This document provides instructions for setting up single sign-on (SSO) for Oracle Application Express (APEX) applications using Kerberos authentication. It describes:
1) Configuring an Apache web server with mod_auth_kerb on Linux to authenticate against a Windows Active Directory server without requiring additional credentials.
2) Configuring Tomcat, ORDS, and APEX to work with the Kerberos authentication.
3) Optional additional configurations for Windows with IIS or for verifying group membership.
This document provides an overview of building web applications with Spring, including:
1) Configuring traditional Java web applications with servlets and listeners as well as the newer Servlet 3.0 approach using WebApplicationInitializer.
2) Customizing web applications using Spring adapters like view resolvers, exception handling, and static resource configuration.
3) Securing web applications with Spring Security including configuration, customization, and authentication.
4) Handling exceptions in web controllers and REST services.
Cross Platform migration of SAS BI Environment: Tips and TricksAmol Deshmukh
Cross platform migration of SAS BI environments may be needed for server upgrades, data center relocation, or workload balancing. Key challenges include performance, data protection, hardware and software compatibility, and application downtime. The migration lifecycle involves assessing the current deployment, planning hardware and software needs, installing and configuring the new environment, migrating user identities, metadata objects, portal content, and SAS data and code, and validating the new deployment before cutting over. Careful planning and use of SAS migration tools can help navigate this process.
WebSphere Application Server is a platform on which Java-based business applications run. WebSphere Application Server Is an implementation of the Java 2 Enterprise Edition(J2ee) Specification.
The document discusses configuring JBoss to work behind a firewall by modifying socket-based services that open listening ports. It lists several key JBoss services that open ports by default, including the naming service on port 1098, invoker services on ports 4444 and 4445, and others. It provides the configuration files and attributes to modify ports for each service.
SaltStack can be used to automate and orchestrate the provisioning of virtual machines on VMware ESXi 6.0. It implements the VMware APIs to allow defining VM profiles and templates that specify VM configurations, and then uses Salt commands to rapidly deploy new VMs from templates with customized configurations. Open-VM tools must be installed on templates to enable customizing VMs, such as setting the network configuration. Salt files define VM profiles and provider credentials, separating configuration from deployment logic for flexibility and reusability.
WLST can be used to monitor, manage, and configure WebLogic Server instances both online and offline. It provides various modes of operation including interactive, scripting, and embedded. Key features include creating and configuring domains, deploying applications, controlling servers and lifecycles, and accessing MBeans. WLST scripts can perform tasks such as starting servers, editing configuration attributes, and monitoring threads.
Building microservices sample applicationAnil Allewar
The slides provide details on how to build the sample Microservices application that covers the whole distributed system paradigm.
Please refer to the introduction to Microservices before following the contents in this slide
https://www.slideshare.net/anilallewar/introduction-to-microservices-78270318
The document discusses efficient deployment and management of ASP.NET 2.0 applications on IIS 6.0. It covers ASP.NET and .NET Framework concepts like the Global Assembly Cache, configuration, code access security, and versioning. It also discusses deployment and management tools like aspnet_regiis.exe and the ASP.NET MMC Snap-In for automating deployment and editing configuration files. Running ASP.NET 1.1 and 2.0 side-by-side on IIS 6.0 is also addressed.
Spring Boot is a framework for creating stand-alone, production-grade Spring based applications that can be "just run". It aims to provide a radically faster and widely accessible starting experience for developing Spring applications. Spring Boot applications can be started using java -jar or traditional WAR deployments and require very little Spring configuration. The document then discusses system requirements, development environment, creating a simple Hello World application, using Spring Boot Admin to monitor applications, configuring databases, Spring Data JPA, REST controllers, caching with EhCache, building web applications with Thymeleaf, and project structure.
This document provides information on scalable virtual machines (VMs) and VM scale sets in Microsoft Azure. It includes descriptions of VM scale sets, how they can be used to manage groups of identical VMs, and how they provide capabilities for deployment at scale, autoscale, load balancer integration, and other features. The document also compares unique attributes of VMs and VM scale sets. It provides examples of VM scale set templates and links to documentation and code samples for working with VM scale sets.
ibm websphere admin training | websphere admin course | ibm websphere adminis...Nancy Thomas
Website : http://www.todaycourses.com
1. WAS product Family overview
Version 8 for Distributed Platform
Some key differences between the Version 5,6,7 and Version 8,
Standards support and programming models
Product packaging bundle
Express / Base / ND – Overview
IBM HTTP server
WAS edge components
Flexible management
2.Architectural Overview
Express / Base / ND
WAS basics
WAS runtime
JDBC providers
Data Sources
Administrative agent
Job manager
Enhanced EAR
ND runtime flow, concepts
Managed Nodes Vs Un managed Nodes
Installation Concepts
H/W pre-requisites
S/W pre-requisites
Browser pre-requisites
Database requirements
Installation overview
Installation Environments
WAS profiles
Pre-install tasks
Install verify
Silent Installation
Uninstall
Application Installation
Directory Structure
Server Commands
WAS plug-in installer, settings
ibm websphere admin training, websphere training online, ibm websphere administration training, ibm websphere admin course, ibm websphere portal administration training, ibm websphere application server administration training, ibm websphere process server administration training, ibm websphere mq system administration training, ibm websphere application server administration training in bangalore, ibm websphere portal admin training, ibm websphere portal admin online training, ibm websphere portal server training
Full credit to Microsoft but i have modified and updated the presentation to increase readability and simplicity. Hope you will enjoy knowing about Session Mgmt.
The document summarizes several key Java EE services including resource management, Java Naming and Directory Service (JNDS), security services, and transaction services. Resource management is implemented using resource pooling and activation/deactivation. Security services provide declarative security using roles and securing both EJBs and web components requires defining a security domain, login/error pages, and security declarations in deployment descriptors. Transactions services allow distributed transactions across multiple resources.
This document describes how to hack a default JBoss installation using the JMX console by deploying a web application that executes system commands. It explains how to create a WAR file with a JSP that allows command execution, deploy it to JBoss by adding the URL to the DeploymentScanner, and then use the application to execute commands with the privileges of the JBoss server. It concludes by providing information on securing the JMX console to prevent this type of attack.
SharePoint Object Model, Web Services and EventsMohan Arumugam
This document provides an overview of the SharePoint object model and how it can be used to programmatically access and modify SharePoint data. It describes the top-level objects like SPFarm, SPWebApplication, SPSite and SPWeb that represent different SharePoint scopes. It also discusses objects for lists, items, users and other entities. Examples are provided for common tasks like retrieving list data, adding users to roles, and handling list events. Best practices around object instantiation and disposal are also covered.
This document provides instructions for installing and configuring the TeamLab portal on a local server or intranet. It describes compiling the source code, system requirements, deploying the portal in the default configuration using an embedded web server and SQLite database, configuring the portal as a Windows service, and basic portal configuration steps. It also provides warnings and additional steps for deploying the portal on the internet using IIS and migrating from SQLite to MySQL.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Configuring was webauth
1. Configuration Guide
Configuring IBM WebSphere Application
Server 6.1 for Web Authentication
with SAS 9.2 Web Applications
Configuring the System for Web Authentication
This document explains how to configure Web authentication with IBM WebSphere Application Server for the
SAS Web applications. Before using this document, you must secure WebSphere Application Server (see Chapter
3, “Administrative security” in WebSphere Application Server V6.1 Security Handbook). Also, you need to review
“Web Authentication” in SAS 9.2 Intelligence: Security Administration Guide to understand and verify that Web
authentication is the appropriate choice for your environment.
The default security mechanism for SAS Web applications is to authenticate against the authentication provider
of the SAS Metadata Server. An alternative authentication mechanism, Web authentication, is to configure
WebSphere Application Server to authenticate against a user registry, such as an LDAP server, and to configure
SAS Web applications to trust the authentication that WebSphere Application Server performs.
Here are the high-level steps that you must perform to configure Web authentication.
Update the login.config file in your SAS configuration directory so that it contains the necessary
references to the web domain.
Add information about security constraints, an authentication method, and security roles to the SAS Logon
Manager application. When you reinstall the application, provide a security role to user or group mapping to
indicate which users have permission to access the application.
Copy SAS JAR files to the WebSphere Application Server installation.
Using the IBM WebSphere Integrated Solutions Console (known as the administrative console), update
information about the login modules that the server uses for authentication and authorization when the
system is configured for Web authentication. You must modify information for some login modules and add
information for others.
Configure the SAS Remote Services application so that its classpath includes the location of the WebSphere
Application Server classes that represent Java Authentication and Authorization Service (JAAS) principals.
Logon Manager retrieves the current Subject from WebSphere Application Server and passes it to Remote
Services.
Restart Remote Services and WebSphere Application Server.
Verify the configuration. You might need to create a web authentication domain and add new accounts in
that domain for users.
1
2. Before Starting This Configuration
Before you try to configure Web authentication, you must have already configured a user registry, such as an
LDAP server, in WebSphere Application Server and you must enable WebSphere Application Server application
security. For more information about configuring a user registry, see "Chapter 2: Configuring the user registry" in
the WebSphere Application Server V6.1 Security Handbook. Verify the configuration by accessing a Web application
on the server such as snoop by opening a Web browser to http://HOSTNAME:9080/snoop. If WebSphere
Application Server is configured correctly, WebSphere Application Server asks you for credentials that are stored
in the user registry.
Before beginning this configuration, be sure that the WebSphere Application Server that is hosting SAS Web
applications is running. At the end of the procedure, you must start or restart Remote Services and all
WebSphere Application Server processes.
Update the login.config Configuration File
Update the SAS-config-dir/Lev1/Web/Common/login.config file so that the aliasdomain property is set to
web. The file content should resemble this example:
PFS {
com.sas.services.security.login.OMILoginModule required
"host"="metadata-server-host"
"port"="8561"
"repository"="Foundation"
"domain"="DefaultAuth"
"trusteduser"="sastrust@saspw"
"trustedpw"="encoded-password"
"aliasdomain"="web"
"debug"="false";
};
SCS {
com.sas.services.security.login.OMILoginModule required
"host"=" metadata-server-host "
"port"="8561"
"repository"="Foundation"
"domain"="DefaultAuth"
"trusteduser"="sastrust@saspw"
"trustedpw"="encoded-password"
"aliasdomain"="web"
"holdopenconnection"="true";
"debug"="false";
};
The default value of aliasdomain is DefaultAuth.
2
3. Modify Logon Manager
To make the necessary changes to Logon Manager, you must edit its web.xml file. The web.xml file is located in
its WEB-INF directory. To extract and edit the file, follow these steps.
1. Use the WebSphere administrative console to stop and uninstall SAS Web Infrastructure Platform
applications (SASWebInfrstructrePlatformApplications9.2). You need to make changes to the corresponding
SAS-config-dir/Lev1/Web/Staging/sas.wip.apps9.2.ear (EAR) file.
2. Extract the sas.wip.apps9.2.ear file so that you can access the WEB-INF directory for Logon Manager.
a. In a temporary directory, extract the EAR file. You can use the jar command to do this:
jar xvf sas.wip.apps9.2.ear
File sas.svcs.logon.war is available in the extracted directory.
b. In a second temporary directory, extract sas.svcs.logon.war. You now have access to the Logon
Manager WEB-INF directory.
3. Edit the file web.xml in the WEB-INF directory to add information about security constraints, an
authentication method, and security roles. For example, just above the closing </web-app> tag, you might
add these elements:
<security-constraint>
<web-resource-collection>
<web-resource-name>All resources</web-resource-name>
<url-pattern>/*</url-pattern>
<http-method>GET</http-method>
<http-method>POST</http-method>
</web-resource-collection>
<auth-constraint>
<role-name>SASWebUser</role-name>
</auth-constraint>
</security-constraint>
<login-config>
<auth-method>BASIC</auth-method>
<realm-name>myrealm</realm-name>
</login-config>
<security-role>
<role-name>SASWebUser</role-name>
</security-role>
In this example, all pages are protected and only users who have been assigned the SASWebUser role can
access them.
Note: This example is for BASIC authentication. For FORM authentication, see Appendix: FORM
Authentication.
3
4. 4. Before you rebuild the WAR and EAR files, change directories from the WEB-INF directory to the lib
directory inside it, and copy these JAR files to a temporary location:
sas.core.jar
sas.oma.omi.jar
sas.security.sspi.jar
sas.svc.connection.jar
sas.svc.sec.login.jar
sas.svc.sec.login.websphere.jar
Note: This step is not part of updating SAS Web Infrastructure Platform applications. However, it is
preparation for a later step in configuring Web authentication.
5. Rebuild the WAR and EAR files. You can use the jar command to create these files:
jar cvf sas.svcs.logon.war *
jar cvf sas.wip.apps9.2.ear *
6. Copy the EAR file to your staging directory. However, do not overwrite the original EAR file unless you
already made a backup copy.
Reinstall the SAS Web Infrastructure Platform Applications EAR File
Use the WebSphere administration console to reinstall the EAR file and then map the role SASWebUser to users
or groups. To reinstall the SAS Web Infrastructure Platform applications, follow these steps.
1. Select Applications > Enterprise Applications.
2. Click Install.
3. On the Specify the EAR, WAR, JAR, or SAR module to upload and install page, select the Local file system
or Remote file system radio button, and then browse to the location of the EAR file. Select the EAR file and
click OK. Click Next.
4. Finish running the installation wizard by accepting all defaults.
5. From the Enterprise Applications page, select the newly installed application.
6. On the page for that application, set the class-loading behavior for the EAR file:
a. Click Class loading and update detection.
b. On the Class loader page, set Class loader order to Classes loaded with application class loader first.
(Leave the WAR class loader policy set to Class loader for each WAR file in application.)
Note: To work around a defect in the administration console, set the polling interval to zero (0) before you
click OK.
7. For each WAR file in the EAR file, set the class-loader behavior:
a. On the main page for configuring the application (EAR), click Manage Modules.
b. Click the name of the Web module (WAR file) that you want to configure.
c. On the configuration page for the WAR file, change the value of Class loader order to Classes loaded
with application class loader first and click OK.
d. Click OK to close the Manage Module page.
8. Set the startup order by selecting Startup behavior, set the Startup order value to 3, and then click OK.
9. Set the security mapping by clicking the Security role to user/group mapping link. Map the role
SASWebUser to All authenticated. If this option is not appropriate for your site, then consider mapping
4
5. the role to users or groups that are defined in your user registry. The following figure shows an example of
mapping the role to the group sasusers that is defined in the user registry.
Note: If you do not see the Role that you entered in the web.xml file, then check that the correct EAR file is
deployed and that the changes to the web.xml file are correct.
Copy SAS JAR Files to the WebSphere Installation
The “Modify Logon Manager” section instructed you to copy SAS JAR files to a temporary location. Copy those
files now to the WAS_INSTALL_ROOT/lib/ext directory.
Make Changes to Application JAAS Logins
Using the WebSphere administrative console, change the JAAS application logins for PFS and SCS. To change
application logins, follow these steps.
1. Select Security > Secure administration, applications, and infrastructure > Java Authentication and
Authorization Service > Application logins.
2. For the PFS alias, make these changes to the first login module.
a. Change the name of the Module class name from
com.sas.services.security.login.OMILoginModule
to
com.sas.services.security.login.TrustedLoginModule.
b. Add a new custom property with these values.
Name: aliasdomain
Value: DefaultAuth
Note: If you chose an authentication domain value other than DefaultAuth when you ran the SAS
Deployment Wizard, then use the value you chose.
c. Change the value of the custom property domain from DefaultAuth to web.
5
6. 3. For the SCS alias, change the properties associated with the login module
com.sas.services.security.login.OMILoginModule. Add a new custom property with these
values.
Name: aliasdomain
Value: web
Add a Login Module to the System JAAS Login WEB_INBOUND
Using the WebSphere administrative console, assign a new JAAS login module to the WEB_INBOUND JAAS alias.
1. Select Security > Secure administration, applications, and infrastructure > Java Authentication and
Authorization Service > System logins > WEB_INBOUND > JAAS login modules.
2. Click New, provide this information, and click OK.
Module class name: com.sas.services.security.login.websphere.WSTrustedLoginModule
Authentication strategy: OPTIONAL
3. Select the module that you just created and then click the Custom Properties link.
4. On the Custom properties page, for each of these name-value pairs, click New, enter the name-value pair,
and click OK.
Name: aliasdomain
Value: DefaultAuth
Name: debug
Value: false
Name: domain
Value: web
Name: host
Value: metadata-server-host
Name: port
Value: 8561 (or nondefault port)
Name: repository
Value: Foundation
Name: trustedpw
Value: encoded-password (for sastrust)
Name: trusteduser
Value: sastrust@saspw
6
7. Set the CLASSPATH for the Remote Services JVM
Modify the classpath for Remote Services so that the Java Virtual Machine (JVM) can locate the WebSphere
Application Server classes that it needs when it starts. These JAR files are required and contain classes that
represent JAAS principals that the JVM acquires from your WebSphere Application Server:
WAS_INSTALL_ROOT/plugins/com.ibm.ws.runtime_6.1.0.jar
WAS_INSTALL_ROOT/lib/bootstrap.jar
WAS_INSTALL_ROOT/plugins/com.ibm.ws.emf_2.1.0.jar
WAS_INSTALL_ROOT/plugins/org.eclipse.emf.ecore_2.2.1.v200609210005.jar
WAS_INSTALL_ROOT/plugins/org.eclipse.emf.common_2.2.1.v200609210005.jar
WAS_INSTALL_ROOT/lib/j2ee.jar
Important: You must enter the classpath all on one line, without spaces or carriage returns.
Windows
For Windows machines, the RemoteServices.bat script should resemble the following example:
:start2
start "SAS Remote Services" "%JAVA_JRE_COMMAND%" ^
-classpath "%CLASSPATH%" ^
-Dsas.ext.config="D:Program
FilesSASSASFoundationServices9.2sas.java.ext.config" ^
-Djava.system.class.loader=com.sas.app.AppClassLoader
-Dsas.app.launch.config="%PICKLIST%" ^
-Dsas.app.repository.path="%SASVJR_REPOSITORYPATH%" ^
-Dsas.app.class.path="%REMOTESERVICESDIR%;c:baseWebSphereAppServer
pluginscom.ibm.ws.runtime_6.1.0.jar;c:baseWebSphereAppServerlib
bootstrap.jar;c:baseWebSphereAppServerpluginscom.ibm.ws.emf_2.1.0.jar;
c:baseWebSphereAppServerpluginsorg.eclipse.emf.ecore_2.2.1.v200609210005.jar;c
:baseWebSphereAppServerpluginsorg.eclipse.emf.common_2.2.1.v200609210005.jar;c
:baseWebSphereAppServerlibj2ee.jar" ^
-Djava.net.preferIPv4Stack=true -Djava.net.preferIPv6Addresses=false
-Dmulticast_udp_ip_ttl=1 ^
-Dsas.vjr.dir="%SASVJR_REPOSITORYPATH%" -Dsas.lev.dir="%LEVEL_ROOT%"
-Dsas.home.dir="%SAS_HOME%" ^
-Dsas.services.information.types.path="D:Program
FilesSASSASPlatformObjectFramework9.2plugins" ^
-Dsas.vm.identifier=Lev3:5093 ^
-Xms128m -Xmx128m -XX:+UseTLAB -XX:+UseConcMarkSweepGC
-XX:+DisableExplicitGC -Dsun.rmi.dgc.client.gcInterval=3600000
-Dsun.rmi.dgc.server.gcInterval=3600000 -Djava.awt.headless=true -Xss256k
-XX:NewSize=16m -XX:MaxNewSize=16m -XX:PermSize=64m -XX:MaxPermSize=64m ^
com.sas.framework.services.bootstrap.SASRemoteServices
goto end
7
8. If Remote Services is started as a Windows service, then you must make the same modification to the SAS-
config-dirLev1WebApplicationsRemoteServiceswrapper.conf file. The part of the file that sets
the classpath should resemble the following example:
# This numbering starts at the endpoint of the including wrapper.conf
wrapper.java.additional.3=-Dsas.app.class.path="C:SASConfig
Lev3WebApplicationsRemoteServices;c:baseWebSphereAppServer
pluginscom.ibm.ws.runtime_6.1.0.jar;c:baseWebSphereAppServerlib
bootstrap.jar;c:baseWebSphereAppServerpluginscom.ibm.ws.emf_2.1.0.jar;
c:baseWebSphereAppServerpluginsorg.eclipse.emf.ecore_2.2.1.v200609210005.jar;c
:baseWebSphereAppServerpluginsorg.eclipse.emf.common_2.2.1.v200609210005.jar;c
:baseWebSphereAppServerlibj2ee.jar"
UNIX
For a UNIX machine, the classpath property is set beneath the start2 tag and the changes should resemble the
following example:
start2)
"$JAVA_JRE_COMMAND" -Dsas.ext.config="/opt/SAS/SASFoundation
Services/9.2/sas.java.ext.config"
-classpath "$CLASSPATH"
-Djava.system.class.loader=com.sas.app.AppClassLoader
-Dsas.app.launch.config="$MERGER_PICKLIST"
-Dsas.app.repository.path="$SASVJR_REPOSITORYPATH"
-Dsas.app.class.path="$REMOTESERVICESDIR"
com.sas.framework.picklist.PicklistMerger
-primary "$PRIMARY_PICKLIST"
"$PICKLIST"
"$SECONDARY_PICKLIST1"
"$SECONDARY_PICKLIST2"
cd $REMOTESERVICESLOGSDIR
nohup "$JAVA_JRE_COMMAND" -Dsas.ext.config="/opt/SAS/
SASFoundationServices/9.2/sas.java.ext.config"
-classpath "$CLASSPATH"
-Djava.system.class.loader=com.sas.app.AppClassLoader
-Dsas.app.launch.config="$PICKLIST"
-Dsas.app.repository.path="$SASVJR_REPOSITORYPATH"
-Dsas.app.class.path="$REMOTESERVICESDIR:/opt/IBM/WebSphere/AppServer/
plugins/com.ibm.ws.runtime_6.1.0.jar:/opt/was61/lib/bootstrap.jar:/opt/
IBM/WebSphere/AppServer/plugins/com.ibm.ws.emf_2.1.0.jar:/opt/IBM/
WebSphere/AppServer/plugins/org.eclipse.emf.ecore_2.2.1.v200609210005.jar:/opt/I
BM/WebSphere/AppServer/plugins/org.eclipse.emf.common_2.2.1.v200609210005.jar:/o
pt/IBM/WebSphere/AppServer/lib/j2ee.jar"
-Djava.net.preferIPv4Stack=true -Djava.net.preferIPv6Addresses=false
-Dmulticast_udp_ip_ttl=1
...
Restart Remote Services and WebSphere Application Server
At this point, restart Remote Services and the WebSphere Application Server that is hosting SAS Web
applications. After restart, when you log in to a SAS Web application, WebSphere Application Server handles
authentication. You do not see the Logon Manager Web page; instead, a dialog box prompts you for your user ID
and password. WebSphere Application Server authenticates the user ID and password that you enter against the
user registry, such as an LDAP server, that you configured previously. You might not need to re-enter your user
ID and password each time you start a SAS Web application because credentials are cached.
8
9. Set the WebApp.AuthDomain Property
Some applications such as SAS Enterprise Guide need to know the authentication domain that is associated with
the SAS Web applications. Follow these steps.
1. Start SAS Management Console and connect to the SAS Metadata Server.
2. Select Application Management > Configuration Manager > SAS Application Infrastructure.
3. Right click SAS Application Infrastructure and select Properties.
4. Select Advanced.
5. Click Add.
6. Select Property Name, enter WebApp.AuthDomain.
7. Select Property Value, enter web.
8. Click OK until you are out of the dialogs.
Log On to Verify the Web Authentication Configuration
If your site was migrated from a previous SAS release and has user IDs and authentication domains already
registered in metadata, try logging on to a SAS Web application such as SAS Web Report Studio.
Otherwise, follow these steps to test and confirm that Web authentication is properly configured.
1. Use SAS Management Console to create an authentication domain named web.
a. Right-click User Manager and select Authentication Domains.
b. Click New, enter web in the Name field, and click OK.
2. Choose a trial user ID that exists in your user registry. Use SAS Management Console to create a user
definition for the user in the web authentication domain. Do not enter a password for the account.
3. Try logging on to a SAS Web application with the user ID.
If the log-on attempt fails, view the SAS Metadata Server log. Look for the format of the user ID that was used in
the log-on attempt. Use SAS Management Console to modify the user definition so that the user account in the
web authentication domain matches the user ID in the log. While you are troubleshooting, do not enter a
password in the user definition because it has no effect on Web authentication. Also, do not try logging on with
an internal account such as sasadm@saspw.
Note: As part of Web authentication, the user ID but not the password is checked against the user accounts that
are stored in the SAS Metadata Repository. The user ID used to authenticate with the user registry must match
exactly the user ID string found on the SAS Metadata Server for authentication to succeed. For example, if joe is
the user ID in your user registry, the exact user ID string “joe” must also be found in the SAS Metadata
Repository without a prefixed domain name.
Appendix: FORM Authentication
Use the following instructions to set up a simple FORM authentication with WebSphere 6.1 and SAS 9.2M3.
1. To enable the custom logoff message, follow the instructions at Sample 36785: Creating a custom message to
display when users log off or time-out of the SAS® Business Intelligence Web applications.
9
10. 2. Extract the sas.wip.apps9.2.ear and sas.scvs.login.war files using the instructions in section
Modify Logon Manager.
3. Modify the <login-config> section in web.xml as shown in the example below. The specification of the <form-
login-page> and <form-error-page> are required, but the associated file names can differ from the example. The
files also can be .jsp files instead of .html files.
<login-config>
<auth-method>FORM</auth-method>
<realm-name>Form Auth</realm-name>
<form-login-config>
<form-login-page>/was_login.html</form-login-page>
<form-error-page>/form_error.html</form-error-page>
</form-login-config>
</login-config>
4. Create a login form and error page file that are referenced in the web.xml file. The rest of the page can be
formatted per the customer's needs. The ACTION specified in the example is required for successful login
with WebSphere. Also use the exact name values in the input fields.
Login form code example (was_login.html):
<FORM METHOD=POST ACTION="j_security_check">
<p>
<font size="2"> <strong> Enter user ID and password: </strong></font>
<BR><br>
<strong> User ID</strong> <input type="text" size="20" name="j_username">
<Br>
<strong> Password </strong> <input type="password" size="20" name="j_password">
<BR>
<BR>
<font size="2"> <strong> And then click this button: </strong></font>
<input type="submit" name="login" value="Login">
</p>
Error page code example (form_error.html):
<!DOCTYPE HTML PUBLIC "-//W3C/DTD HTML 4.0 Transitional//EN">
<html>
<head><title>A Form login authentication failure occurred</head></title>
<body>
Error Message
</body>
</html>
5. Save the files in root level of sas.scvs.login.war.
6. Modify the custom_logoff.jsp file. The following example automatically executes upon logoff, and
redirects you back to the login page.
The ACTION specified in the example is required to invalidate the authenticated WebSphere session.
Otherwise, customize to the customer's requirements.
<html>
<body onLoad="submitForm()">
<FORM METHOD=POST ACTION="ibm_security_logout" NAME="myForm" ID="myForm">
</form>
10
11. </body>
<script type='text/javascript'>
document.myForm.submit();
</script>
</html>
7. Rebuild the .war file and .ear file as described in Step 5 of the Modify Logon Manager.
8. Re-install sas.wip.apps9.2.ear.
9. Restart WebSphere server instance.
11
12. Recommended Reading
As of March 2010:
IBM Corporation, 2009. WebSphere Application Server V6.1 Security Handbook. ibm.com/Redbooks.
Available at http://www.redbooks.ibm.com/abstracts/sg246316.html?Open.
SAS Institute, Inc., 2009. SAS 9.2 Intelligence Platform: Security Administration Guide. Cary, NC: SAS
Institute, Inc. Available at http://support.sas.com/92administration.
SAS and all other SAS Institute product or service names are registered trademarks or trademarks of SAS Institute Inc. in the USA and other
countries. Other brand and product names are registered trademarks or trademarks of their respective companies.
indicates USA registration.
Copyright 2011 SAS Institute Inc., Cary, NC, USA. All rights reserved.
12
March 30, 2011