Sun-microsystems GLASSFISH ENTERPRISE 820433510 Bedienungsanleitung Seite 1

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Computers Sun-microsystems GLASSFISH ENTERPRISE 820433510 herunter. Sun Microsystems GLASSFISH ENTERPRISE 820433510 User Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 256
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - 2.1 Administration Guide

Sun GlassFish Enterprise Server2.1 Administration GuideSun Microsystems, Inc.4150 Network CircleSanta Clara, CA 95054U.S.A.Part No: 820–4335–10Decembe

Seite 2 - 090122@21808

Overview of Monitoring ... 172About the Tree S

Seite 3

Note – Enclose the alias password in single quotes as shown in the example.3. Restart the Enterprise Server for the relevant domain.Protecting Files w

Seite 4

Caution – At this point in time, server instances that are running must not be started andrunning server instances must not be restarted until the SMP

Seite 5

About Authentication and AuthorizationAuthentication and authorization are central concepts of application server security. Thefollowing topics are di

Seite 6

TABLE 9–1 Enterprise Server Authentication Methods (Continued)DIGEST HTTP and SIP Server authenticates the client basedon an encrypted response.SSL an

Seite 7

Conguring Message SecurityMessage Security enables a server to perform end-to-end authentication of web serviceinvocations and responses at the messa

Seite 8

Note – Users and groups are designated for the entire Enterprise Server, whereas eachapplication denes its own roles. When the application is being p

Seite 9

RolesA role denes which applications and what parts of each application users can access and whatthey can do. In other words, roles determine users&a

Seite 10 - Contents

In the JDBC realm, the server gets user credentials from a database. The Enterprise Server usesthe database information and the enabled JDBC realm opt

Seite 11

Assign a security role to users in the realm.To assign a security role to a user, add a security-role-mapping element to the deploymentdescriptor that

Seite 12

Most importantly, a certicate binds the owner's public key to the owner's identity. Like apassport binds a photograph to personal informati

Seite 13

CTheasadmin Utility ...231The

Seite 14

When a Web browser (client) wants to connect to a secure site, an SSL handshake happens: The browser sends a message over the network requesting a sec

Seite 15

If all virtual hosts on a single IP address need to authenticate against the same certicate, theaddition of multiple virtual hosts probably will not

Seite 16

In the Developer Prole, on the server side, the Enterprise Server uses the JSSE format,which uses keytool to manage certicates and key stores. In th

Seite 17 - Examples

Create a self-signed certicate in a keystore of type JKS using an RSA key algorithm. RSA ispublic-key encryption technology developed by RSA Data Se

Seite 18

keytool -delete -noprompt -alias ${cert.alias} -keystore ${keystore.file}-storepass ${keystore.pass}Another example of deleting a certicate from a ke

Seite 19 - Book Title Description

6. If you have changed the keystore or private key password from their default, then substitutethe new password for changeit in the above command.The

Seite 20

keytool -delete-alias keyAlias-keystore keystore-name-storepass passwordUsing Network Security Services (NSS) ToolsIn the Clusters and Enterprise Pro

Seite 21 - Symbol Conventions

Using the certutil UtilityBefore running certutil, make sure that LD_LIBRARY_PATH points to the location of thelibraries required for this utility to

Seite 22 - Sun WelcomesYour Comments

Import an RFC text-formatted certicate into an NSS certicate database.certutil -A -a -n ${cert.nickname} -t ${cert.trust.options}-f ${pass.file} -i

Seite 23 - Enterprise Server Overview

pk12util -o -n ${cert.nickname} -h ${token.name} -k ${pass.file}-w ${cert.pass.file} -d ${admin.domain.dir}/${admin.domain}/config Convert a PKCS12 ce

Seite 25 - JConsole

Using Hardware Crypto Accelerator With Enterprise ServerYou can use hardware accelerator tokens to improve the cryptographic performance and tofurnish

Seite 26 - Enterprise Server Concepts

For the Microsoft Windows environment, add the location of NSS libraries AS_NSS and theNSS tools directory, AS_NSS_BIN to the PATH environment variabl

Seite 27 - Usage Proles

Using database directory /var/opt/SUNWappserver/domains/domain1/config ...Listing of PKCS#11 Modules--------------------------------------------------

Seite 28 - Node Agent

Listing Keys and Certicates To list the keys and certicates in the congured PKCS#11 tokens, run the followingcommand:certutil -L -d AS_NSS_DB [-h t

Seite 29 - Server Instance

Working With Private Keys and CerticatesUse certutil to create self-signed certicates and to import or export certicates. To import orexport privat

Seite 30

To create a custom conguration le:1. Create a conguration le called as-install/mypkcs11.cfg with the following code and savethe le.name=HW1000lib

Seite 32 - Starting the Domain

Conguring Message SecuritySome of the material in this chapter assumes a basic understanding of security and web servicesconcepts. This chapter descr

Seite 33 - Creating a Cluster

Understanding Message Security in the Enterprise ServerThe Enterprise Server oers integrated support for the WS-Security standard in its web services

Seite 34 - Starting a Node Agent

Application DeployerThe application deployer is responsible for: Specifying (at application assembly) any required application-specic message protect

Seite 35 - Restarting an Instance

FiguresFIGURE 1–1 Enterprise Server Instance ... 29FIGURE 9–1 Rol

Seite 36 - To migrate the DAS

About Digital SignaturesThe Enterprise Server uses XML Digital signatures to bind an authentication identity tomessage content. Clients use digital si

Seite 37

Glossary of Message Security TerminologyThe terminology used in this document is described below. The concepts are also discussed in“Conguring the En

Seite 38

The response policy denes the authentication policy requirements associated with responseprocessing performed by the authentication provider. Policie

Seite 39 - Java Business Integration

Conguring Application-Specic Web ServicesSecurityApplication-specic web services security functionality is congured (at application assembly)by de

Seite 40 - JBI Component Loggers

Actions of Request and Response PolicyCongurationsThe following table shows message protection policy congurations and the resulting messagesecurity

Seite 41 - Service Assemblies

TABLE 10–1 Message protection policy to WS-Security SOAP message security operation mapping(Continued)Message Protection Policy ResultingWS-Security S

Seite 42 - JBI Descriptors

If you are running the Enterprise Server on version 1.5 of the Java SDK, the JCE provider isalready congured properly. If you are running the Enterpr

Seite 43 - JDBC Resources

6. Restart the Enterprise Server.Message Security SetupMost of the steps for setting up the Enterprise Server for using message security can beaccompl

Seite 44 - JDBC Connection Pools

To specify the default server provider:asadmin set --user admin-user --port admin-portserver-config.security-service.message-security-config.SOAP.def

Seite 45 - Setting Up Database Access

Creating a Message Security ProviderTo congure an existing provider using the Admin Console, select Conguration node > theinstance to Congure>

Seite 47 - Chapter 3 • JDBC Resources 47

<log-service file="" level="WARNING"/><message-security-config auth-layer="SOAP"default-client-provider="C

Seite 48 - Parameter Description

Conguring the Diagnostic ServiceThe Diagnostic Service provides more visibility into and control of the runtime performance ofa server and its applic

Seite 49 - Chapter 3 • JDBC Resources 49

Installation specic details are collected only for le-based installations. Capture System Information: The following system information is collected

Seite 50

TransactionsBy enclosing one or more steps in an indivisible unit of work, a transaction ensures dataintegrity and consistency. This chapter contains

Seite 51 - Chapter 3 • JDBC Resources 51

See Also: “Transactions in Java EE Technology” on page 144 “Conguring Transactions” on page 145Transactions in Java EETechnologyTransaction processin

Seite 52

Workarounds for Specic DatabasesThe Enterprise Server provides workarounds for some known issues with the recoveryimplementations of the following JD

Seite 53 - Java DB Type 4 Driver

When the transaction spans across servers, the server that started the transaction can contactthe other servers to get the outcome of the transactions

Seite 54 - Databases

Select the instance to congure: To congure a particular instance, select the instance’s cong node. For example, the defaultinstance, server , selec

Seite 55

Restart the Enterprise Server.▼To set the keypoint intervalKeypoint operations compress the transaction log le. The keypoint interval is the number o

Seite 56 - IBM DB2 8.1 Type 2 Driver

Conguring the HTTP ServiceThe HTTP service is the component of the Enterprise Server that provides facilities fordeploying web applications and for m

Seite 57 - MySQL Type 4 Driver

TablesTABLE 1–1 Features Available for Each Prole ... 27TABLE 1–2 Enterprise S

Seite 58

http://www.aaa.com:8080/web1http://www.bbb.com:8080/web2http://www.ccc.com:8080/web3The rst URL is mapped to virtual host www.aaa.com , the second UR

Seite 59

However, if an HTTP listener uses the 0.0.0.0 IP address, which listens on all IP addresses on aport, you cannot create HTTP listeners for additional

Seite 60

The Keep-Alive subsystem periodically polls such idle connections and queues thoseconnections with activity into the connection queue for future proce

Seite 61 - CloudScape 5.1 Type 4 Driver

Managing Web ServicesThis chapter describes web services management with Enterprise Server. Admin Console andthe asadmin tool enable you deploy, test,

Seite 62

simple, exible, text-based markup language. XML data is marked using tags enclosed in angledbrackets. The tags contain the meaning of the data they m

Seite 63 - JMS Resources

service endpoints, along with corresponding WSDL descriptions, and clients. A JAX-RPCbased web service can interact with clients that are not based on

Seite 64 - Resources

Viewing Deployed Web ServicesTo test a web service with Admin Console, select Applications > Web Services >web-service-name | General. Admin Con

Seite 65 - JMS Physical Destinations

Adding a RegistryAdd or remove a web services registry with Admin Console at Application Server > WebServices | Registry. Use this page to create a

Seite 66

Transforming Messages with XSLT FiltersYou can apply XSLT transformation rules to a web service end point. This enables ne-grainedcontrol of web serv

Seite 67 - Foreign JMS Providers

OFF- Disables monitoring.Enter a value for the Message History. The default is 25. Click the Reset button to clear allstatistics and the running aver

Seite 68 - Resource Adapter Properties

TABLE 18–23 JVM Statistics for Java SE - Thread Info ...190TABLE 18–24 JVM Statistics for

Seite 70

Conguring the Object Request BrokerThis chapter describes how to congure the Object Request Broker (ORB) and IIOP listeners. Ithas the following sec

Seite 71

What is the ORB?The Object Request Broker (ORB) is the central component of CORBA. The ORB provides therequired infrastructure to identify and locate

Seite 72 - Activation Spec Properties

Thread PoolsThe Java Virtual Machine (JVM) can support many threads of execution at once. To helpperformance, the Enterprise Server maintains one or m

Seite 73

Working with Thread PoolsTo create a thread pool using the Admin Console, go to Conguration > Thread Pools >Current Pools > New. Enter the n

Seite 74

Conguring LoggingThis chapter briey describes how to congure logging and view the server log. It contains thefollowing sections: “About Logging” on

Seite 75 - Conguring JavaMail Resources

[#|2006-10-21T13:25:53.852-0400|INFO|sun-appserver9.1|javax.enterprise.system.core|_ThreadID=13;|CORE5004: Resource Deployed:[cr:jms/DurableConnection

Seite 76 - Creating a JavaMail Session

TABLE 17–1 Enterprise Server Logger Namespaces (Continued)Module Name NamespaceGroup Management Service (cluster andenterprise proles only)javax.ee.e

Seite 77 - JNDI Resources

Conguring LoggingThis section contains the following topics: “Conguring General Logging Settings” on page 168 “Conguring Log Levels” on page 168 “V

Seite 78

Viewing Server LogsTo view the log les: In the developer prole, go to Applications Server → Logging → View Log Files. In the cluster and enterprise

Seite 79 - Using Custom Resources

ExamplesEXAMPLE 18–1 Applications Node Tree Structure ...173EXAMPLE 18–2 HTTP Se

Seite 80

A window labeled Log Entry Detail appears, with a formatted version of the message.At the end of the list of entries, click the buttons to view earlie

Seite 81 - Connector Resources

Monitoring Components and ServicesThis chapter contains information about monitoring components using the Enterprise ServerAdmin Console. This chapter

Seite 82

Overview of MonitoringTo monitor the Enterprise Server, perform these steps:1. Enable the monitoring of specic services and components using either t

Seite 83 - Equivalent asadmin command

EXAMPLE 18–1 Applications Node Tree Structureapplications|--- application1| |--- ejb-module-1| | |--- ejb1 *| | |--- cache (for entity/sfsb) *| | |---

Seite 84 - Click Save

EXAMPLE 18–3 HTTP Service Schematic (Cluster and Enterprise Prole Version)http-service *|---connection-queue *|---dns *|---file-cache *|---keep-alive

Seite 85 - Attributes

EXAMPLE 18–6 JMS Service Schematicjms-service|-- connection-factories [AKA conn. pools in the RA world]| |-- connection-factory-1 (All CF stats for th

Seite 86 - More Information

“Thread Pools Statistics” on page 186 “Transaction Service Statistics” on page 186 “Java Virtual Machine (JVM) Statistics” on page 187 “JVM Statistic

Seite 87 - Managing Security Maps

TABLE 18–2 EJB Method StatisticsAttribute Name DataType Descriptionmethodstatistic TimeStatistic Number of times an operation iscalled; the total time

Seite 88 - Managing Connector Resources

TABLE 18–3 EJB Session Store Statistics (Continued)Attribute Name DataType DescriptionactivationErrorCount CountStatistic Time (ms) spent executing th

Seite 89 - To Edit a Connector Resource

TABLE 18–4 EJB Pool StatisticsAttribute Name DataType Descriptionnumbeansinpool BoundedRangeStatistic Number of EJB’s in the associated pool,providing

Seite 91

TABLE 18–5 EJB Cache Statistics (Continued)Attribute Name DataType Descriptionnumpassivationsuccess CountStatistic Number of times passivation complet

Seite 92

TABLE 18–8 Web Container (Web Module) StatisticsStatistic DataType Commentsjspcount CountStatistic Number of JSP pages that havebeen loaded in the web

Seite 93 - Web and EJB Containers

TABLE 18–9 HTTP Service Statistics (Developer Prole)Statistic Units Data Type Commentsbytesreceived Bytes CountStatistic The cumulative value of the

Seite 94 - The SIP Servlet Container

The statistics available for the JDBC connection pool are shown in the following table.TABLE 18–10 JDBC Connection Pool StatisticsStatistic Units Data

Seite 95 - The EJB Container

TABLE 18–10 JDBC Connection Pool Statistics (Continued)Statistic Units DataType Descriptionnumconnacquired Number CountStatistic Number of logical con

Seite 96

TABLE 18–11 Connector Connection Pool Statistics (Continued)Statistic Units DataType Descriptionnumconndestroyed Number CountStatistic Number of physi

Seite 97 - Conguring Security

TABLE 18–13 Connection Manager (in an ORB) Statistics (Continued)Statistic Units DataType Descriptiontotalconnections Number BoundedRangeStatistic Tot

Seite 98 - Tools for Managing Security

TABLE 18–15 Transaction Service Statistics (Continued)Statistic DataType Descriptioncommittedcount CountStatistic Number of transactions that have bee

Seite 99

TABLE 18–17 JVM Statistics for Java SE- Class Loading (Continued)Statistic DataType Descriptiontotalloadedclasscount CountStatistic Total number of cl

Seite 100 - Changing the Master Password

TABLE 18–20 JVM Statistics for Java SE- Memory (Continued)Statistic DataType Descriptioncommittedheapsize CountStatistic Amount of memory (in bytes) t

Seite 101 - Changing the Admin Password

PrefaceThe Administration guide describes the administrative tasks of the Enterprise Server.This preface contains information about and conventions fo

Seite 102 - Authenticating Entities

TABLE 18–22 JVM Statistics for Java SE - Runtime (Continued)Statistic DataType Descriptionmanagementspecversion StringStatistic Management spec. versi

Seite 103 - Specifying JACC Providers

TABLE 18–23 JVM Statistics for Java SE - Thread Info (Continued)Statistic DataType Descriptionlockownerid CountStatistic ID of the thread that holds t

Seite 104 - Conguring Message Security

Conguring Monitoring Levels Using the AdminConsoleTo congure monitoring in the Admin Console: For the developer prole, go to Conguration → Monitor

Seite 105 - Role Mapping

Viewing Monitoring Data “Viewing Monitoring Data in the Admin Console” on page 193 “Viewing Monitoring Data With the asadmin Tool” on page 193Viewing

Seite 106

servlet, connection, connectorpool, endpoint, entitybean, messagedriven,statefulsession, statelesssession, httpservice,orwebmodule.For example, to vie

Seite 107

To display monitoring statistics for an application component or subsystem for whichmonitoring has been enabled, use the asadmin get command.To get th

Seite 108 - About Digital Certicates

Another example, application, is a valid monitorable object type and is not a singleton. Toaddress a non-singleton child node representing, for exampl

Seite 109 - About Secure Sockets Layer

Examples for the list --user admin-user --monitor CommandThe list command provides information about the application components and subsystemscurrentl

Seite 110 - About Ciphers

When an attribute is requested that does not exist for a particular component or subsystem,an error is returned. Similarly, when a specic attribute i

Seite 111 - About Certicate Files

Example 3Attempt to get a specic attribute from a subsystem:asadmin> get --user admin-user --monitor server.jvm.uptime-lastsampletimeReturns:serve

Seite 112 - Using the keytool Utility

Copyright 2008 Sun Microsystems, Inc. 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved.Sun Microsystems, Inc. has intellectual pr

Seite 113

TABLE P–1 Books in the Enterprise Server Documentation Set (Continued)Book Title DescriptionHigh Availability AdministrationGuideSetting up clusters,

Seite 114

server.http-serviceserver.resourcesserver.thread-poolsThe list of monitorable components includes thread-pools, http-service, resources, and alldeploy

Seite 115

Returns:Nothing to list at server.applications.petstore.signon-ejb_jar.UserEJB.bean-methods.getUserName. To get the valid names beginning with astring

Seite 116 - -storepass password

server.applications.petstore.signon-ejb_jar.UserEJB.bean-methods.getUserName.totalnumerrors-count = 0server.applications.petstore.signon-ejb_jar.UserE

Seite 117 - Using the certutil Utility

TABLE 18–25 Top LevelCommand Dotted Name Outputlist -m server server.applicationsserver.thread-poolsserver.resourcesserver.http-serviceserver.transact

Seite 118

TABLE 18–27 Applications - Enterprise Applications and Standalone ModulesCommand Dotted Name Outputlist -m server.applications.app1or*app1Note: this l

Seite 119

TABLE 18–27 Applications - Enterprise Applications and Standalone Modules (Continued)Command Dotted Name Outputlist -m server.applications.app1.ejb-mo

Seite 120

TABLE 18–27 Applications - Enterprise Applications and Standalone Modules (Continued)Command Dotted Name Outputlist -m server.applications.app1.ejb-mo

Seite 121 - Conguring PKCS#11 Tokens

TABLE 18–28 HTTP-Service LevelCommand Dotted Name Outputlist -m server.http-service List of virtual servers.get -m server.http-service.* No output exc

Seite 122 - Managing Keys And Certicates

TABLE 18–30 Resources LevelCommand Dotted Name Outputlist -m server.resources List of pool names.get -m server.resources.* No output except message sa

Seite 123 - Listing Keys and Certicates

TABLE 18–32 ORB Level (Continued)Command Dotted Name Outputget -m server.orb.connection-managers.* No output except message saying there are noattribu

Seite 124

Typographic ConventionsThe following table describes the typographic changes that are used in this book.TABLE P–3 TypographicConventionsTypeface Meani

Seite 125

To view all the MBeans, Enterprise Server provides a conguration of the Standard JMXConnector Server called System JMX Connector Server. As part of E

Seite 126

The security-enabled ag for the JMX Connector is false. If you are running the cluster orenterprise prole, or if you have turned on security for the

Seite 127

In the Connect to Agent tab of JConsole, enter user name, password, host name and port (8686,by default).The user name refers to the administration us

Seite 128 - System Administrator

Start JConsole by running JDK_HOME/bin/jconsoleIn the Connect to Agent tab of JConsole, enter user name, password, host name and port (8686,by default

Seite 130 - About Encryption

Conguring Management RulesThis section contains information about setting administration policies to automate routineadministration tasks, congure s

Seite 131

notications and take appropriate action. For details on developing a custom MBean anddeploying it, see Chapter 14, “Developing Custom MBeans,” in Sun

Seite 132 - Securing aWeb Service

In addition, to enable a individual management rule, you must enable the rule on this page byclicking the box next to the rule and clicking Enable.A r

Seite 134 - Congurations

JavaVirtual Machine and Advanced SettingsThe Java Virtual Machine (JVM) is an interpretive computing engine responsible for runningthe byte codes in a

Seite 135 - Conguring a JCE Provider

TABLE P–4 Symbol Conventions (Continued)Symbol Description Example Meaning→ Indicates menu itemselection in a graphical userinterface.File → New → Tem

Seite 136

Debug Options: Specify the JPDA options passed to the JVM when the debugging isenabled. RMI Compile Options: Enter the command-line options for the r

Seite 137 - Message Security Setup

Automatically Restarting a Domain or NodeAgentIf your domain or node agent is stopped unexpectedly (for example, if you need to restart yourmachine),

Seite 138

To determine if a user has the net_privaddr privilege, log in as that user and type the commandppriv -l | grep net_privaddr.To run the asadmin create-

Seite 139 - <client-container>

Restarting Automatically Using inittab on Solaris 9 and LinuxPlatformsTo restart your domain on the Solaris 9 or Linux platform, add a line of text to

Seite 140 - Further Information

C:\winnt\system32\sc.exe create service-name binPath= \"fully-qualied-path-to-appservService.exe\"fully-qualied-path-to-asadmin.bat start-

Seite 141 - Diagnostic Service Framework

Preventing the Service From Shutting Down When aUser Logs OutBy default, the Java VM catches signals from Windows that indicate that the operating sys

Seite 142

If the “interact with desktop” option is not set, the service stays in a “start-pending” stateand appears to hang. Kill the service process to recover

Seite 143 - Transactions

Dotted Name Attributes for domain.xmlThis appendix describes the dotted name attributes that can be used to address the MBean andits attributes. Every

Seite 144 - About Transactions

Element Name Dotted Name Prexclusters domain.clustersEvery cluster contained in this element is accessible as cluster-name. Wherecluster-name is the

Seite 145 - Conguring Transactions

Dotted Name Aliased totarget.admin-service cong-name.admin-servicetarget.web-container cong-name.web-containertarget.sip-container cong-name.sip-co

Seite 146

Enterprise Server OverviewSun GlassFish Enterprise Server administration includes many tasks such as deployingapplications, creating and conguring do

Seite 148 - To set the keypoint interval

The asadmin UtilityThe Application Server includes a command-line administration utility known as asadmin.Theasadmin utility is used to start and stop

Seite 149 - Conguring the HTTP Service

The asadmin UtilityUse the asadmin utility to perform any administrative tasks for the Application Server. You canuse this asadmin utility in place of

Seite 150 - HTTP Listeners

-s --secure if true, uses SSL/TLS to communicate with the domain application server. -t --terse indicates that any output data must be very concise,

Seite 151

To use the --secure option, you must use the set command to enable the security --enabledag in the admin http-listener in the domain.xml. When you us

Seite 152

TABLE C–1 Remote Commands Required Options (Continued)Option Denition--passwordfile The --passwordfile option species the name of a le containing t

Seite 153 - Managing Web Services

invokemultimode from within a multimodesession; once you exit the second multimodeenvironment, you return to your original multimode environment.The G

Seite 154 - Java EE Web Service Standards

The list command treats this complete dotted name as the complete name of a parentnode in the abstract hierarchy. Upon providing this name to list co

Seite 155 - DeployingWeb Services

TABLE C–2 Server Lifecycle Commands (Continued)Command Denitionstart-domain Starts a domain. If the domain directory is not specied, the domain in t

Seite 156 - UsingWeb Services Registries

TABLE C–3 List and Status Commands (Continued)list-components Lists all deployed Java EE 5 components. If the --typeoption is not specied,all compone

Seite 157 - Adding a Registry

Enterprise Server includes the Metro web services stack (http://metro.dev.java.net). Metroimplements important WS-* standards and WS-I standardized in

Seite 158 - MonitoringWeb Services

Version CommandsThe version commands return the version string, display a list of all the asadmin commands,and allow you to install the license le.TA

Seite 159

Resource Management CommandsThe resource commands allow you to manage the various resources used in your application.TABLE C–7 Resource Management Com

Seite 160

TABLE C–7 Resource Management Commands (Continued)Command Denitiondelete-custom-resource Removes a custom resource.list-custom-resources Lists the cu

Seite 161 - CHAPTER 15

Conguration CommandsThe conguration commands allow you to construct IIOP listeners, lifecycle modules, HTTPand IIOP listeners, prolers, and other s

Seite 162 - Managing IIOP Listeners

TABLE C–9 Lifecycle Module CommandsCommand Denitioncreate-lifecycle-module Creates a lifecycle module. The lifecycle modules provide a means of runni

Seite 163 - Thread Pools

TABLE C–11 JVM Options and Virtual Server CommandsCommand Denitioncreate-jvm-option Creates JVM options in the Java conguration or proler elements

Seite 164 - Working with Thread Pools

TABLE C–13 Transaction CommandsCommand Denitionfreeze-transaction Freezes the transaction subsystem during which time all the inighttransactions are

Seite 165 - Conguring Logging

TABLE C–15 User Management Commands (Continued)Command Denitionupdate-file-user Updates an existing entry in the keyle using the specied user_name,

Seite 166 - About Logging

TABLE C–17 Database CommandsCommand Denitionstart-database Starts the Java DB server that is available with the Application Server. Use thiscommand o

Seite 167

TABLE C–19 Web Service Commands (Continued)Command Denitiondelete-transformation-rule Deletes an XSLT transformation rule of a given web service.list

Seite 168

If your conguration includes remote server instances, create node agents to manage andfacilitate remote server instances. It is the responsibility of

Seite 169 - Viewing Server Logs

TABLE C–20 Security Commands (Continued)Command Denitiondelete-message-security-provide Enables administrators to delete a provider-config sub-elemen

Seite 170 - _ThreadID=13

Verify CommandThe XML verier command veries the content of the domain.xml le.TABLE C–22 Verify CommandCommand Denitionverify-domain-xml Veries th

Seite 171 - About Monitoring

Property CommandShared server instances will often need to override attributes dened in their referencedconguration. Any conguration attribute in a

Seite 172 - Overview of Monitoring

IndexAACCSee containersapplication client, 93acceptor threads, in HTTP listeners, 151Admin Console, 24applets, 93asadmin utility, 25Bbean-cache, monit

Seite 173 - The HTTP ServiceTree

external repositories, accessing, 79FForeign Providers, JMS, 67-74Gget command, monitoring data, 197Hhigh availability, 28HTTP listenersacceptor threa

Seite 174 - The JMS ServiceTree

logging (Continued)viewing the server log, 169-170Mman pages, 25monitoringbean-cache attributes, 179-180container subsystems, 172-173ORB service, 185-

Seite 175 - Services

Tthread pools, 163performance, 163thread starvation, 163threads, See thread pools, 163topics, JMS, 63-64total-beans-created, 179totalbeansdestroyed, 1

Seite 176 - EJB Container Statistics

Enterprise Server ConceptsThe Enterprise Server consists of one or more domains. A domain is an administrativeboundary or context. Each domain has an

Seite 177 - EJB Session Store Statistics

carry out the requests. The DAS is sometimes referred to as the admin server or default server. Itis referred to as the default server because it is t

Seite 178

TABLE 1–1 Features Available for Each Prole (Continued)Feature Developer Prole Cluster ProleEnterprise Prole (notavailable with Sun GlassFishCommu

Seite 179 - EJB Cache Statistics

Server InstanceThe server instance is a single Java EE compatible Java Virtual Machine hosting an EnterpriseServer on a single node. Each server insta

Seite 181 - HTTP Service Statistics

names, IP Addresses, and some administration capabilities. For the users, it is almost as if theyhave their own web server, without the hardware and b

Seite 182

Basic Enterprise Server CommandsAdministration of the Enterprise Server includes tasks such as creation, conguration, controland management of domain

Seite 183

Caution – Do not create an enterprise domain unless you have HADB and the Network SecurityServices (NSS) keystore. You will not be able to start an en

Seite 184 - Table 18–12

Starting the Default Domain on WindowsFrom the Windows Start Menu, select Programs -> Sun Microsystems -> Enterprise Server ->Start Admin Ser

Seite 185

For the full syntax, type asadmin help create-cluster.Starting a ClusterA cluster is started using the start-cluster command. The following example st

Seite 186 - Thread Pools Statistics

For the full syntax, type asadmin help start-node-agent.Stopping a Node AgentA node agent is stopped using the stop-node-agent command and specifying

Seite 187 - JVM Statistics in Java SE

Recreating the Domain Administration ServerFor mirroring purposes, and to provide a working copy of the Domain Administration Server(DAS), you must ha

Seite 188

Change domain-root-dir/domain1/generated/tmp directory permissions on the third machineto match the permissions of the same directory on rst machine.

Seite 190

Java Business IntegrationJava Business Integration (JBI) is an implementation of the JSR 208 specication(http://www.jcp.org/en/jsr/detail?id=208)for

Seite 191

Starting an Instance ... 35Stopping

Seite 192

Binding ComponentsBinding Components are proxies for consumers or providers that are outside the JBIenvironment. Binding components typically are base

Seite 193 - Viewing Monitoring Data

Note – The logging levels for JBI Components are often inherited from a parent logger such asthe JBI logger. To view and set parent logging levels, in

Seite 194

Shared LibrariesA Shared Library provides Java classes that are not private to a single component and is typicallyshared by more than one JBI Componen

Seite 195

JDBC ResourcesThis chapter explains how to congure JDBC resources, which are required by applications thataccess databases. This chapter contains the

Seite 196

When creating a JDBC resource, you must identify:1. The JNDI Name. By convention, the name begins with the jdbc/ string. For example:jdbc/payrolldb. D

Seite 197 - Example 2

Behind the scenes, the application server retrieves a physical connection from theconnection pool that corresponds to the database. The pool denes co

Seite 198

Working with JDBC Connection PoolsA JDBC connection pool is a group of reusable connections for a particular database. Whencreating the pool with the

Seite 199 - To Use the PetStore Example

Click OK.▼Creating a JDBC Connection Pool and JDBC Resource Using the CLIUse the asadmin create-jdbc-connection-pool command to create a JDBC connecti

Seite 200

Editing a JDBC Connection PoolThe Edit JDBC Connection Pool page provides the means to change all of the settings for anexisting pool except its name.

Seite 201 - Returns:

Optionally, the application server can validate connections before they are passed toapplications. This validation allows the application server to au

Seite 202

IBM Informix Type 4 Driver ... 61CloudScape 5.1 Typ

Seite 203 - Applications Level

Parameter DescriptionNon-transactional Connections Click the check box if you want Application Server to return allnon-transactional connections.Trans

Seite 204

Attribute DescriptionValidate Atmost Once Amount of time, in seconds, after which aconnection is validated at most once. This will helpreduce the numb

Seite 205

Match Connections Use this option to switch on/o connectionmatching for the pool. It can be set to false if theadministrator knows that the connectio

Seite 206 - HTTP Service level

Note – An Oracle database user running the capture-schema command needs ANALYZE ANYTABLE privileges if that user does not own the schema. These privil

Seite 207 - Thread-Pools Level

Sun GlassFish JDBC Driver for DB2 DatabasesThe JAR les for this driver are smbase.jar, smdb2.jar, and smutil.jar. Congure theconnection pool using t

Seite 208 - ORBLevel

Sun GlassFish JDBC Driver for Microsoft SQL ServerDatabasesThe JAR les for this driver are smbase.jar, smsqlserver.jar, and smutil.jar. Congure thec

Seite 209 - Using JConsole

IBM DB2 8.1 Type 2 DriverThe JAR les for the DB2 driver are db2jcc.jar, db2jcc_license_cu.jar, and db2java.zip.Set environment variables as follows:L

Seite 210

password - Set as appropriate. databaseName - Set as appropriate. Do not specify the complete URL, only the databasename. BE_AS_JDBC_COMPLIANT_AS_POS

Seite 211

DataSource Classname: com.inet.ora.OraDataSource Properties: user - Specify the database user. password - Specify the database password. serviceName

Seite 212

password - Set as appropriate.Inet Sybelux JDBC Driver for Sybase DatabasesThe JAR le for the Inet Sybase driver is Sybelux.jar. Congure the connec

Seite 213

Managing Security Maps ... 87▼ To Delete a C

Seite 214

For example:jdbc:oracle:thin:@localhost:1521:customer_db xa-driver-does-not-support-non-tx-operations - Set to the value true. Optional:only needed if

Seite 215 - Conguring Management Rules

xa-driver-does-not-support-non-tx-operations - Set to the value true. Optional:only needed if both non-XA and XA connections are retrieved from the s

Seite 217

Conguring Java Message Service ResourcesThe Enterprise Server implements the Java Message Service (JMS) API by integrating theMessage Queue software

Seite 218

TopicConnectionFactory objects, used for publish-subscribe communication ConnectionFactory objects, which can be used for both point-to-point andpubl

Seite 219 - Tuning the JVM Settings

JMS Connection FactoriesJMS connection factories are objects that allow an application to create other JMS objectsprogrammatically. These administered

Seite 220 - Conguring Advanced Settings

To create a physical destination from the Admin Console, select Conguration >PhysicalDestinations. In the Create Physical Destinations page, speci

Seite 221 - APPENDIX A

In the MQ Scheme and MQ Service elds, type the Message Queue address scheme nameand the Message Queue connection service name if a non-default schem

Seite 222

Conguring the Generic Resource AdapterPrior to deploying the resource adapter, JMS client libraries should be made available to theEnterprise Server.

Seite 223 - Platforms

Property Name Valid Values Default Value DescriptionTopicConnectionFactoryClassNameName of the class availablein the application serverclasspath , for

Seite 224

Users ... 105

Seite 225 - User Logs Out

Property Name Valid Values Default Value DescriptionJndiProperties Name value pairs separatedby commaNone Species the JNDI provider propertiesto be u

Seite 226

Property Name Valid Values Default Value DescriptionRMPolicy ProviderManaged orOnePerPhysicalConnectionProviderManagedThe isSameRM method on anXAResou

Seite 227 - Top Level Elements

Property Name Valid Value Default Value DescriptionClientId A valid client ID None ClientID as specied by JMS 1.1specication.ConnectionFactoryJndiNa

Seite 228

Property Name Valid Value Default Value DescriptionMaxPoolSize An integer 8 Maximum size of server session poolinternally created by the resourceadapt

Seite 229 - Elements Not Aliased

Property Name Valid Value Default Value DescriptionRedeliveryAttempts integer Number of times a message will bedelivered if a message causes aruntime

Seite 230

Conguring JavaMail ResourcesThe Enterprise Server includes the JavaMail API. The JavaMail API is a set of abstract APIs thatmodel a mail system. The

Seite 231 - The asadmin Utility

To create a JavaMail session using the Admin Console, select Resources —> JavaMail Sessions.Specify the JavaMail settings as follows: JNDI Name: Th

Seite 232

JNDI ResourcesThe Java Naming and Directory Interface (JNDI) is an application programming interface(API) for accessing dierent kinds of naming and d

Seite 233 - AS_ADMIN_MASTERPASSWORD=value

application component's environment allows the application component to be customizedwithout the need to access or change the application compone

Seite 234 - Option Denition

TABLE 6–1 JNDI Lookups and Their Associated ReferencesJNDI Lookup Name Associated Referencejava:comp/env Application environment entriesjava:comp/env/

Seite 235 - The Multimode Command

Actions of Request and Response Policy Congurations ... 134Conguring Other Security Facilities ..

Seite 236

-- and jndi-lookup-name refers to the JNDI name to lookup to fetch the-- designated (in this case the java) object.--><external-jndi-resource jn

Seite 237 - Server Lifecycle Commands

Connector ResourcesThis chapter explains how to congure connectors, which are used to access enterpriseinformation systems (EISs). This chapter conta

Seite 238 - List and Status Commands

Managing Connector Connection Pools “To Create a Connector Connection Pool” on page 82 “To Edit a Connector Connection Pool” on page 83 “To Edit Conne

Seite 239 - Deployment Commands

c. In the Additional Properties table, add any required properties.In the previous Create Connector Connection Pool page, you selected a class in theC

Seite 240 - Version Commands

On Any Failure If you select the checkbox labelled Close AllConnections, if a single connection fails, then theapplication server will close all conne

Seite 241 - Resource Management Commands

Using the asadmin commands to change connection pool properties.You can use the asadmin get and set commands to view and change the values of theconne

Seite 242

Lazy Association Connections are lazily associated when an operation is performed on them. Also,they are disassociated when the transaction is complet

Seite 243 - Conguration Commands

▼To Edit Connection Pool PropertiesUse the Additional Properties tab to modify the properties of an existing pool.The properties specied depend on th

Seite 244 - Proler and SSL Commands

Equivalent asadmin commanddelete-connector-connection-pool▼To Set Up EIS AccessDeploy (install) a connector.Create a connection pool for the connector

Seite 245 - Transaction andTimer Commands

d. Do one of the following: If you are using the cluster prole, you will see the Targets section of the page. in theTargets section of the page, sele

Seite 246 - User Management Commands

Viewing Deployed Web Services ... 156Testing Web Services ..

Seite 247 - Database Commands

On the Connector Resources page, select the checkbox for the resource to be deleted.Click Delete.Equivalent asadmin commanddelete-connector-resource▼T

Seite 248 - Web Service Commands

To create, edit, and delete Connector Connection Pools, click Resources —> AdministeredObject Resources in the Admin Console. Consult the Admin Con

Seite 249 - Security Service Commands

g. Click Finish.Equivalent asadmin commandcreate-admin-object▼To Edit an Administered Object ResourceIn the tree component, expand the Resource node a

Seite 250 - Password Commands

Web and EJB ContainersContainers provide runtime support for application components. Application components usethe protocols and methods of the contai

Seite 251 - Service Command

Editing the Properties of the SIP ContainerThe sub-elements of the SIP container are session-managerand session-properties.store-properties, manager-p

Seite 252 - Property Command

Editing SIP Container Session Manager PropertiesTo view the sub-elements of the SIP container session manager properties, use the followingcommand: li

Seite 254

Conguring SecuritySecurity is about protecting data: how to prevent unauthorized access or damage to it in storageor transit. The Enterprise Server;

Seite 255

In declarative security, the container (the Enterprise Server) handles security through anapplication's deployment descriptors. You can control

Seite 256

For more information on using certutil, pk12util, and other NSS security tools, see NSSSecurity Tools athttp://www.mozilla.org/projects/security/pki/n

Kommentare zu diesen Handbüchern

Keine Kommentare