Sun-microsystems GLASSFISH ENTERPRISE 820433510 Manual do Utilizador

Consulte online ou descarregue Manual do Utilizador para Computadores Sun-microsystems GLASSFISH ENTERPRISE 820433510. Sun Microsystems GLASSFISH ENTERPRISE 820433510 User Manual Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 256
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes

Resumo do Conteúdo

Página 1 - 2.1 Administration Guide

Sun GlassFish Enterprise Server2.1 Administration GuideSun Microsystems, Inc.4150 Network CircleSanta Clara, CA 95054U.S.A.Part No: 820–4335–10Decembe

Página 2 - 090122@21808

Overview of Monitoring ... 172About the Tree S

Página 3

Note – Enclose the alias password in single quotes as shown in the example.3. Restart the Enterprise Server for the relevant domain.Protecting Files w

Página 4

Caution – At this point in time, server instances that are running must not be started andrunning server instances must not be restarted until the SMP

Página 5

About Authentication and AuthorizationAuthentication and authorization are central concepts of application server security. Thefollowing topics are di

Página 6

TABLE 9–1 Enterprise Server Authentication Methods (Continued)DIGEST HTTP and SIP Server authenticates the client basedon an encrypted response.SSL an

Página 7

Conguring Message SecurityMessage Security enables a server to perform end-to-end authentication of web serviceinvocations and responses at the messa

Página 8

Note – Users and groups are designated for the entire Enterprise Server, whereas eachapplication denes its own roles. When the application is being p

Página 9

RolesA role denes which applications and what parts of each application users can access and whatthey can do. In other words, roles determine users&a

Página 10 - Contents

In the JDBC realm, the server gets user credentials from a database. The Enterprise Server usesthe database information and the enabled JDBC realm opt

Página 11

Assign a security role to users in the realm.To assign a security role to a user, add a security-role-mapping element to the deploymentdescriptor that

Página 12

Most importantly, a certicate binds the owner's public key to the owner's identity. Like apassport binds a photograph to personal informati

Página 13

CTheasadmin Utility ...231The

Página 14

When a Web browser (client) wants to connect to a secure site, an SSL handshake happens: The browser sends a message over the network requesting a sec

Página 15

If all virtual hosts on a single IP address need to authenticate against the same certicate, theaddition of multiple virtual hosts probably will not

Página 16

In the Developer Prole, on the server side, the Enterprise Server uses the JSSE format,which uses keytool to manage certicates and key stores. In th

Página 17 - Examples

Create a self-signed certicate in a keystore of type JKS using an RSA key algorithm. RSA ispublic-key encryption technology developed by RSA Data Se

Página 18

keytool -delete -noprompt -alias ${cert.alias} -keystore ${keystore.file}-storepass ${keystore.pass}Another example of deleting a certicate from a ke

Página 19 - Book Title Description

6. If you have changed the keystore or private key password from their default, then substitutethe new password for changeit in the above command.The

Página 20

keytool -delete-alias keyAlias-keystore keystore-name-storepass passwordUsing Network Security Services (NSS) ToolsIn the Clusters and Enterprise Pro

Página 21 - Symbol Conventions

Using the certutil UtilityBefore running certutil, make sure that LD_LIBRARY_PATH points to the location of thelibraries required for this utility to

Página 22 - Sun WelcomesYour Comments

Import an RFC text-formatted certicate into an NSS certicate database.certutil -A -a -n ${cert.nickname} -t ${cert.trust.options}-f ${pass.file} -i

Página 23 - Enterprise Server Overview

pk12util -o -n ${cert.nickname} -h ${token.name} -k ${pass.file}-w ${cert.pass.file} -d ${admin.domain.dir}/${admin.domain}/config Convert a PKCS12 ce

Página 25 - JConsole

Using Hardware Crypto Accelerator With Enterprise ServerYou can use hardware accelerator tokens to improve the cryptographic performance and tofurnish

Página 26 - Enterprise Server Concepts

For the Microsoft Windows environment, add the location of NSS libraries AS_NSS and theNSS tools directory, AS_NSS_BIN to the PATH environment variabl

Página 27 - Usage Proles

Using database directory /var/opt/SUNWappserver/domains/domain1/config ...Listing of PKCS#11 Modules--------------------------------------------------

Página 28 - Node Agent

Listing Keys and Certicates To list the keys and certicates in the congured PKCS#11 tokens, run the followingcommand:certutil -L -d AS_NSS_DB [-h t

Página 29 - Server Instance

Working With Private Keys and CerticatesUse certutil to create self-signed certicates and to import or export certicates. To import orexport privat

Página 30

To create a custom conguration le:1. Create a conguration le called as-install/mypkcs11.cfg with the following code and savethe le.name=HW1000lib

Página 32 - Starting the Domain

Conguring Message SecuritySome of the material in this chapter assumes a basic understanding of security and web servicesconcepts. This chapter descr

Página 33 - Creating a Cluster

Understanding Message Security in the Enterprise ServerThe Enterprise Server oers integrated support for the WS-Security standard in its web services

Página 34 - Starting a Node Agent

Application DeployerThe application deployer is responsible for: Specifying (at application assembly) any required application-specic message protect

Página 35 - Restarting an Instance

FiguresFIGURE 1–1 Enterprise Server Instance ... 29FIGURE 9–1 Rol

Página 36 - To migrate the DAS

About Digital SignaturesThe Enterprise Server uses XML Digital signatures to bind an authentication identity tomessage content. Clients use digital si

Página 37

Glossary of Message Security TerminologyThe terminology used in this document is described below. The concepts are also discussed in“Conguring the En

Página 38

The response policy denes the authentication policy requirements associated with responseprocessing performed by the authentication provider. Policie

Página 39 - Java Business Integration

Conguring Application-Specic Web ServicesSecurityApplication-specic web services security functionality is congured (at application assembly)by de

Página 40 - JBI Component Loggers

Actions of Request and Response PolicyCongurationsThe following table shows message protection policy congurations and the resulting messagesecurity

Página 41 - Service Assemblies

TABLE 10–1 Message protection policy to WS-Security SOAP message security operation mapping(Continued)Message Protection Policy ResultingWS-Security S

Página 42 - JBI Descriptors

If you are running the Enterprise Server on version 1.5 of the Java SDK, the JCE provider isalready congured properly. If you are running the Enterpr

Página 43 - JDBC Resources

6. Restart the Enterprise Server.Message Security SetupMost of the steps for setting up the Enterprise Server for using message security can beaccompl

Página 44 - JDBC Connection Pools

To specify the default server provider:asadmin set --user admin-user --port admin-portserver-config.security-service.message-security-config.SOAP.def

Página 45 - Setting Up Database Access

Creating a Message Security ProviderTo congure an existing provider using the Admin Console, select Conguration node > theinstance to Congure>

Página 47 - Chapter 3 • JDBC Resources 47

<log-service file="" level="WARNING"/><message-security-config auth-layer="SOAP"default-client-provider="C

Página 48 - Parameter Description

Conguring the Diagnostic ServiceThe Diagnostic Service provides more visibility into and control of the runtime performance ofa server and its applic

Página 49 - Chapter 3 • JDBC Resources 49

Installation specic details are collected only for le-based installations. Capture System Information: The following system information is collected

Página 50

TransactionsBy enclosing one or more steps in an indivisible unit of work, a transaction ensures dataintegrity and consistency. This chapter contains

Página 51 - Chapter 3 • JDBC Resources 51

See Also: “Transactions in Java EE Technology” on page 144 “Conguring Transactions” on page 145Transactions in Java EETechnologyTransaction processin

Página 52

Workarounds for Specic DatabasesThe Enterprise Server provides workarounds for some known issues with the recoveryimplementations of the following JD

Página 53 - Java DB Type 4 Driver

When the transaction spans across servers, the server that started the transaction can contactthe other servers to get the outcome of the transactions

Página 54 - Databases

Select the instance to congure: To congure a particular instance, select the instance’s cong node. For example, the defaultinstance, server , selec

Página 55

Restart the Enterprise Server.▼To set the keypoint intervalKeypoint operations compress the transaction log le. The keypoint interval is the number o

Página 56 - IBM DB2 8.1 Type 2 Driver

Conguring the HTTP ServiceThe HTTP service is the component of the Enterprise Server that provides facilities fordeploying web applications and for m

Página 57 - MySQL Type 4 Driver

TablesTABLE 1–1 Features Available for Each Prole ... 27TABLE 1–2 Enterprise S

Página 58

http://www.aaa.com:8080/web1http://www.bbb.com:8080/web2http://www.ccc.com:8080/web3The rst URL is mapped to virtual host www.aaa.com , the second UR

Página 59

However, if an HTTP listener uses the 0.0.0.0 IP address, which listens on all IP addresses on aport, you cannot create HTTP listeners for additional

Página 60

The Keep-Alive subsystem periodically polls such idle connections and queues thoseconnections with activity into the connection queue for future proce

Página 61 - CloudScape 5.1 Type 4 Driver

Managing Web ServicesThis chapter describes web services management with Enterprise Server. Admin Console andthe asadmin tool enable you deploy, test,

Página 62

simple, exible, text-based markup language. XML data is marked using tags enclosed in angledbrackets. The tags contain the meaning of the data they m

Página 63 - JMS Resources

service endpoints, along with corresponding WSDL descriptions, and clients. A JAX-RPCbased web service can interact with clients that are not based on

Página 64 - Resources

Viewing Deployed Web ServicesTo test a web service with Admin Console, select Applications > Web Services >web-service-name | General. Admin Con

Página 65 - JMS Physical Destinations

Adding a RegistryAdd or remove a web services registry with Admin Console at Application Server > WebServices | Registry. Use this page to create a

Página 66

Transforming Messages with XSLT FiltersYou can apply XSLT transformation rules to a web service end point. This enables ne-grainedcontrol of web serv

Página 67 - Foreign JMS Providers

OFF- Disables monitoring.Enter a value for the Message History. The default is 25. Click the Reset button to clear allstatistics and the running aver

Página 68 - Resource Adapter Properties

TABLE 18–23 JVM Statistics for Java SE - Thread Info ...190TABLE 18–24 JVM Statistics for

Página 70

Conguring the Object Request BrokerThis chapter describes how to congure the Object Request Broker (ORB) and IIOP listeners. Ithas the following sec

Página 71

What is the ORB?The Object Request Broker (ORB) is the central component of CORBA. The ORB provides therequired infrastructure to identify and locate

Página 72 - Activation Spec Properties

Thread PoolsThe Java Virtual Machine (JVM) can support many threads of execution at once. To helpperformance, the Enterprise Server maintains one or m

Página 73

Working with Thread PoolsTo create a thread pool using the Admin Console, go to Conguration > Thread Pools >Current Pools > New. Enter the n

Página 74

Conguring LoggingThis chapter briey describes how to congure logging and view the server log. It contains thefollowing sections: “About Logging” on

Página 75 - Conguring JavaMail Resources

[#|2006-10-21T13:25:53.852-0400|INFO|sun-appserver9.1|javax.enterprise.system.core|_ThreadID=13;|CORE5004: Resource Deployed:[cr:jms/DurableConnection

Página 76 - Creating a JavaMail Session

TABLE 17–1 Enterprise Server Logger Namespaces (Continued)Module Name NamespaceGroup Management Service (cluster andenterprise proles only)javax.ee.e

Página 77 - JNDI Resources

Conguring LoggingThis section contains the following topics: “Conguring General Logging Settings” on page 168 “Conguring Log Levels” on page 168 “V

Página 78

Viewing Server LogsTo view the log les: In the developer prole, go to Applications Server → Logging → View Log Files. In the cluster and enterprise

Página 79 - Using Custom Resources

ExamplesEXAMPLE 18–1 Applications Node Tree Structure ...173EXAMPLE 18–2 HTTP Se

Página 80

A window labeled Log Entry Detail appears, with a formatted version of the message.At the end of the list of entries, click the buttons to view earlie

Página 81 - Connector Resources

Monitoring Components and ServicesThis chapter contains information about monitoring components using the Enterprise ServerAdmin Console. This chapter

Página 82

Overview of MonitoringTo monitor the Enterprise Server, perform these steps:1. Enable the monitoring of specic services and components using either t

Página 83 - Equivalent asadmin command

EXAMPLE 18–1 Applications Node Tree Structureapplications|--- application1| |--- ejb-module-1| | |--- ejb1 *| | |--- cache (for entity/sfsb) *| | |---

Página 84 - Click Save

EXAMPLE 18–3 HTTP Service Schematic (Cluster and Enterprise Prole Version)http-service *|---connection-queue *|---dns *|---file-cache *|---keep-alive

Página 85 - Attributes

EXAMPLE 18–6 JMS Service Schematicjms-service|-- connection-factories [AKA conn. pools in the RA world]| |-- connection-factory-1 (All CF stats for th

Página 86 - More Information

“Thread Pools Statistics” on page 186 “Transaction Service Statistics” on page 186 “Java Virtual Machine (JVM) Statistics” on page 187 “JVM Statistic

Página 87 - Managing Security Maps

TABLE 18–2 EJB Method StatisticsAttribute Name DataType Descriptionmethodstatistic TimeStatistic Number of times an operation iscalled; the total time

Página 88 - Managing Connector Resources

TABLE 18–3 EJB Session Store Statistics (Continued)Attribute Name DataType DescriptionactivationErrorCount CountStatistic Time (ms) spent executing th

Página 89 - To Edit a Connector Resource

TABLE 18–4 EJB Pool StatisticsAttribute Name DataType Descriptionnumbeansinpool BoundedRangeStatistic Number of EJB’s in the associated pool,providing

Página 91

TABLE 18–5 EJB Cache Statistics (Continued)Attribute Name DataType Descriptionnumpassivationsuccess CountStatistic Number of times passivation complet

Página 92

TABLE 18–8 Web Container (Web Module) StatisticsStatistic DataType Commentsjspcount CountStatistic Number of JSP pages that havebeen loaded in the web

Página 93 - Web and EJB Containers

TABLE 18–9 HTTP Service Statistics (Developer Prole)Statistic Units Data Type Commentsbytesreceived Bytes CountStatistic The cumulative value of the

Página 94 - The SIP Servlet Container

The statistics available for the JDBC connection pool are shown in the following table.TABLE 18–10 JDBC Connection Pool StatisticsStatistic Units Data

Página 95 - The EJB Container

TABLE 18–10 JDBC Connection Pool Statistics (Continued)Statistic Units DataType Descriptionnumconnacquired Number CountStatistic Number of logical con

Página 96

TABLE 18–11 Connector Connection Pool Statistics (Continued)Statistic Units DataType Descriptionnumconndestroyed Number CountStatistic Number of physi

Página 97 - Conguring Security

TABLE 18–13 Connection Manager (in an ORB) Statistics (Continued)Statistic Units DataType Descriptiontotalconnections Number BoundedRangeStatistic Tot

Página 98 - Tools for Managing Security

TABLE 18–15 Transaction Service Statistics (Continued)Statistic DataType Descriptioncommittedcount CountStatistic Number of transactions that have bee

Página 99

TABLE 18–17 JVM Statistics for Java SE- Class Loading (Continued)Statistic DataType Descriptiontotalloadedclasscount CountStatistic Total number of cl

Página 100 - Changing the Master Password

TABLE 18–20 JVM Statistics for Java SE- Memory (Continued)Statistic DataType Descriptioncommittedheapsize CountStatistic Amount of memory (in bytes) t

Página 101 - Changing the Admin Password

PrefaceThe Administration guide describes the administrative tasks of the Enterprise Server.This preface contains information about and conventions fo

Página 102 - Authenticating Entities

TABLE 18–22 JVM Statistics for Java SE - Runtime (Continued)Statistic DataType Descriptionmanagementspecversion StringStatistic Management spec. versi

Página 103 - Specifying JACC Providers

TABLE 18–23 JVM Statistics for Java SE - Thread Info (Continued)Statistic DataType Descriptionlockownerid CountStatistic ID of the thread that holds t

Página 104 - Conguring Message Security

Conguring Monitoring Levels Using the AdminConsoleTo congure monitoring in the Admin Console: For the developer prole, go to Conguration → Monitor

Página 105 - Role Mapping

Viewing Monitoring Data “Viewing Monitoring Data in the Admin Console” on page 193 “Viewing Monitoring Data With the asadmin Tool” on page 193Viewing

Página 106

servlet, connection, connectorpool, endpoint, entitybean, messagedriven,statefulsession, statelesssession, httpservice,orwebmodule.For example, to vie

Página 107

To display monitoring statistics for an application component or subsystem for whichmonitoring has been enabled, use the asadmin get command.To get th

Página 108 - About Digital Certicates

Another example, application, is a valid monitorable object type and is not a singleton. Toaddress a non-singleton child node representing, for exampl

Página 109 - About Secure Sockets Layer

Examples for the list --user admin-user --monitor CommandThe list command provides information about the application components and subsystemscurrentl

Página 110 - About Ciphers

When an attribute is requested that does not exist for a particular component or subsystem,an error is returned. Similarly, when a specic attribute i

Página 111 - About Certicate Files

Example 3Attempt to get a specic attribute from a subsystem:asadmin> get --user admin-user --monitor server.jvm.uptime-lastsampletimeReturns:serve

Página 112 - Using the keytool Utility

Copyright 2008 Sun Microsystems, Inc. 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved.Sun Microsystems, Inc. has intellectual pr

Página 113

TABLE P–1 Books in the Enterprise Server Documentation Set (Continued)Book Title DescriptionHigh Availability AdministrationGuideSetting up clusters,

Página 114

server.http-serviceserver.resourcesserver.thread-poolsThe list of monitorable components includes thread-pools, http-service, resources, and alldeploy

Página 115

Returns:Nothing to list at server.applications.petstore.signon-ejb_jar.UserEJB.bean-methods.getUserName. To get the valid names beginning with astring

Página 116 - -storepass password

server.applications.petstore.signon-ejb_jar.UserEJB.bean-methods.getUserName.totalnumerrors-count = 0server.applications.petstore.signon-ejb_jar.UserE

Página 117 - Using the certutil Utility

TABLE 18–25 Top LevelCommand Dotted Name Outputlist -m server server.applicationsserver.thread-poolsserver.resourcesserver.http-serviceserver.transact

Página 118

TABLE 18–27 Applications - Enterprise Applications and Standalone ModulesCommand Dotted Name Outputlist -m server.applications.app1or*app1Note: this l

Página 119

TABLE 18–27 Applications - Enterprise Applications and Standalone Modules (Continued)Command Dotted Name Outputlist -m server.applications.app1.ejb-mo

Página 120

TABLE 18–27 Applications - Enterprise Applications and Standalone Modules (Continued)Command Dotted Name Outputlist -m server.applications.app1.ejb-mo

Página 121 - Conguring PKCS#11 Tokens

TABLE 18–28 HTTP-Service LevelCommand Dotted Name Outputlist -m server.http-service List of virtual servers.get -m server.http-service.* No output exc

Página 122 - Managing Keys And Certicates

TABLE 18–30 Resources LevelCommand Dotted Name Outputlist -m server.resources List of pool names.get -m server.resources.* No output except message sa

Página 123 - Listing Keys and Certicates

TABLE 18–32 ORB Level (Continued)Command Dotted Name Outputget -m server.orb.connection-managers.* No output except message saying there are noattribu

Página 124

Typographic ConventionsThe following table describes the typographic changes that are used in this book.TABLE P–3 TypographicConventionsTypeface Meani

Página 125

To view all the MBeans, Enterprise Server provides a conguration of the Standard JMXConnector Server called System JMX Connector Server. As part of E

Página 126

The security-enabled ag for the JMX Connector is false. If you are running the cluster orenterprise prole, or if you have turned on security for the

Página 127

In the Connect to Agent tab of JConsole, enter user name, password, host name and port (8686,by default).The user name refers to the administration us

Página 128 - System Administrator

Start JConsole by running JDK_HOME/bin/jconsoleIn the Connect to Agent tab of JConsole, enter user name, password, host name and port (8686,by default

Página 130 - About Encryption

Conguring Management RulesThis section contains information about setting administration policies to automate routineadministration tasks, congure s

Página 131

notications and take appropriate action. For details on developing a custom MBean anddeploying it, see Chapter 14, “Developing Custom MBeans,” in Sun

Página 132 - Securing aWeb Service

In addition, to enable a individual management rule, you must enable the rule on this page byclicking the box next to the rule and clicking Enable.A r

Página 134 - Congurations

JavaVirtual Machine and Advanced SettingsThe Java Virtual Machine (JVM) is an interpretive computing engine responsible for runningthe byte codes in a

Página 135 - Conguring a JCE Provider

TABLE P–4 Symbol Conventions (Continued)Symbol Description Example Meaning→ Indicates menu itemselection in a graphical userinterface.File → New → Tem

Página 136

Debug Options: Specify the JPDA options passed to the JVM when the debugging isenabled. RMI Compile Options: Enter the command-line options for the r

Página 137 - Message Security Setup

Automatically Restarting a Domain or NodeAgentIf your domain or node agent is stopped unexpectedly (for example, if you need to restart yourmachine),

Página 138

To determine if a user has the net_privaddr privilege, log in as that user and type the commandppriv -l | grep net_privaddr.To run the asadmin create-

Página 139 - <client-container>

Restarting Automatically Using inittab on Solaris 9 and LinuxPlatformsTo restart your domain on the Solaris 9 or Linux platform, add a line of text to

Página 140 - Further Information

C:\winnt\system32\sc.exe create service-name binPath= \"fully-qualied-path-to-appservService.exe\"fully-qualied-path-to-asadmin.bat start-

Página 141 - Diagnostic Service Framework

Preventing the Service From Shutting Down When aUser Logs OutBy default, the Java VM catches signals from Windows that indicate that the operating sys

Página 142

If the “interact with desktop” option is not set, the service stays in a “start-pending” stateand appears to hang. Kill the service process to recover

Página 143 - Transactions

Dotted Name Attributes for domain.xmlThis appendix describes the dotted name attributes that can be used to address the MBean andits attributes. Every

Página 144 - About Transactions

Element Name Dotted Name Prexclusters domain.clustersEvery cluster contained in this element is accessible as cluster-name. Wherecluster-name is the

Página 145 - Conguring Transactions

Dotted Name Aliased totarget.admin-service cong-name.admin-servicetarget.web-container cong-name.web-containertarget.sip-container cong-name.sip-co

Página 146

Enterprise Server OverviewSun GlassFish Enterprise Server administration includes many tasks such as deployingapplications, creating and conguring do

Página 148 - To set the keypoint interval

The asadmin UtilityThe Application Server includes a command-line administration utility known as asadmin.Theasadmin utility is used to start and stop

Página 149 - Conguring the HTTP Service

The asadmin UtilityUse the asadmin utility to perform any administrative tasks for the Application Server. You canuse this asadmin utility in place of

Página 150 - HTTP Listeners

-s --secure if true, uses SSL/TLS to communicate with the domain application server. -t --terse indicates that any output data must be very concise,

Página 151

To use the --secure option, you must use the set command to enable the security --enabledag in the admin http-listener in the domain.xml. When you us

Página 152

TABLE C–1 Remote Commands Required Options (Continued)Option Denition--passwordfile The --passwordfile option species the name of a le containing t

Página 153 - Managing Web Services

invokemultimode from within a multimodesession; once you exit the second multimodeenvironment, you return to your original multimode environment.The G

Página 154 - Java EE Web Service Standards

The list command treats this complete dotted name as the complete name of a parentnode in the abstract hierarchy. Upon providing this name to list co

Página 155 - DeployingWeb Services

TABLE C–2 Server Lifecycle Commands (Continued)Command Denitionstart-domain Starts a domain. If the domain directory is not specied, the domain in t

Página 156 - UsingWeb Services Registries

TABLE C–3 List and Status Commands (Continued)list-components Lists all deployed Java EE 5 components. If the --typeoption is not specied,all compone

Página 157 - Adding a Registry

Enterprise Server includes the Metro web services stack (http://metro.dev.java.net). Metroimplements important WS-* standards and WS-I standardized in

Página 158 - MonitoringWeb Services

Version CommandsThe version commands return the version string, display a list of all the asadmin commands,and allow you to install the license le.TA

Página 159

Resource Management CommandsThe resource commands allow you to manage the various resources used in your application.TABLE C–7 Resource Management Com

Página 160

TABLE C–7 Resource Management Commands (Continued)Command Denitiondelete-custom-resource Removes a custom resource.list-custom-resources Lists the cu

Página 161 - CHAPTER 15

Conguration CommandsThe conguration commands allow you to construct IIOP listeners, lifecycle modules, HTTPand IIOP listeners, prolers, and other s

Página 162 - Managing IIOP Listeners

TABLE C–9 Lifecycle Module CommandsCommand Denitioncreate-lifecycle-module Creates a lifecycle module. The lifecycle modules provide a means of runni

Página 163 - Thread Pools

TABLE C–11 JVM Options and Virtual Server CommandsCommand Denitioncreate-jvm-option Creates JVM options in the Java conguration or proler elements

Página 164 - Working with Thread Pools

TABLE C–13 Transaction CommandsCommand Denitionfreeze-transaction Freezes the transaction subsystem during which time all the inighttransactions are

Página 165 - Conguring Logging

TABLE C–15 User Management Commands (Continued)Command Denitionupdate-file-user Updates an existing entry in the keyle using the specied user_name,

Página 166 - About Logging

TABLE C–17 Database CommandsCommand Denitionstart-database Starts the Java DB server that is available with the Application Server. Use thiscommand o

Página 167

TABLE C–19 Web Service Commands (Continued)Command Denitiondelete-transformation-rule Deletes an XSLT transformation rule of a given web service.list

Página 168

If your conguration includes remote server instances, create node agents to manage andfacilitate remote server instances. It is the responsibility of

Página 169 - Viewing Server Logs

TABLE C–20 Security Commands (Continued)Command Denitiondelete-message-security-provide Enables administrators to delete a provider-config sub-elemen

Página 170 - _ThreadID=13

Verify CommandThe XML verier command veries the content of the domain.xml le.TABLE C–22 Verify CommandCommand Denitionverify-domain-xml Veries th

Página 171 - About Monitoring

Property CommandShared server instances will often need to override attributes dened in their referencedconguration. Any conguration attribute in a

Página 172 - Overview of Monitoring

IndexAACCSee containersapplication client, 93acceptor threads, in HTTP listeners, 151Admin Console, 24applets, 93asadmin utility, 25Bbean-cache, monit

Página 173 - The HTTP ServiceTree

external repositories, accessing, 79FForeign Providers, JMS, 67-74Gget command, monitoring data, 197Hhigh availability, 28HTTP listenersacceptor threa

Página 174 - The JMS ServiceTree

logging (Continued)viewing the server log, 169-170Mman pages, 25monitoringbean-cache attributes, 179-180container subsystems, 172-173ORB service, 185-

Página 175 - Services

Tthread pools, 163performance, 163thread starvation, 163threads, See thread pools, 163topics, JMS, 63-64total-beans-created, 179totalbeansdestroyed, 1

Página 176 - EJB Container Statistics

Enterprise Server ConceptsThe Enterprise Server consists of one or more domains. A domain is an administrativeboundary or context. Each domain has an

Página 177 - EJB Session Store Statistics

carry out the requests. The DAS is sometimes referred to as the admin server or default server. Itis referred to as the default server because it is t

Página 178

TABLE 1–1 Features Available for Each Prole (Continued)Feature Developer Prole Cluster ProleEnterprise Prole (notavailable with Sun GlassFishCommu

Página 179 - EJB Cache Statistics

Server InstanceThe server instance is a single Java EE compatible Java Virtual Machine hosting an EnterpriseServer on a single node. Each server insta

Página 181 - HTTP Service Statistics

names, IP Addresses, and some administration capabilities. For the users, it is almost as if theyhave their own web server, without the hardware and b

Página 182

Basic Enterprise Server CommandsAdministration of the Enterprise Server includes tasks such as creation, conguration, controland management of domain

Página 183

Caution – Do not create an enterprise domain unless you have HADB and the Network SecurityServices (NSS) keystore. You will not be able to start an en

Página 184 - Table 18–12

Starting the Default Domain on WindowsFrom the Windows Start Menu, select Programs -> Sun Microsystems -> Enterprise Server ->Start Admin Ser

Página 185

For the full syntax, type asadmin help create-cluster.Starting a ClusterA cluster is started using the start-cluster command. The following example st

Página 186 - Thread Pools Statistics

For the full syntax, type asadmin help start-node-agent.Stopping a Node AgentA node agent is stopped using the stop-node-agent command and specifying

Página 187 - JVM Statistics in Java SE

Recreating the Domain Administration ServerFor mirroring purposes, and to provide a working copy of the Domain Administration Server(DAS), you must ha

Página 188

Change domain-root-dir/domain1/generated/tmp directory permissions on the third machineto match the permissions of the same directory on rst machine.

Página 190

Java Business IntegrationJava Business Integration (JBI) is an implementation of the JSR 208 specication(http://www.jcp.org/en/jsr/detail?id=208)for

Página 191

Starting an Instance ... 35Stopping

Página 192

Binding ComponentsBinding Components are proxies for consumers or providers that are outside the JBIenvironment. Binding components typically are base

Página 193 - Viewing Monitoring Data

Note – The logging levels for JBI Components are often inherited from a parent logger such asthe JBI logger. To view and set parent logging levels, in

Página 194

Shared LibrariesA Shared Library provides Java classes that are not private to a single component and is typicallyshared by more than one JBI Componen

Página 195

JDBC ResourcesThis chapter explains how to congure JDBC resources, which are required by applications thataccess databases. This chapter contains the

Página 196

When creating a JDBC resource, you must identify:1. The JNDI Name. By convention, the name begins with the jdbc/ string. For example:jdbc/payrolldb. D

Página 197 - Example 2

Behind the scenes, the application server retrieves a physical connection from theconnection pool that corresponds to the database. The pool denes co

Página 198

Working with JDBC Connection PoolsA JDBC connection pool is a group of reusable connections for a particular database. Whencreating the pool with the

Página 199 - To Use the PetStore Example

Click OK.▼Creating a JDBC Connection Pool and JDBC Resource Using the CLIUse the asadmin create-jdbc-connection-pool command to create a JDBC connecti

Página 200

Editing a JDBC Connection PoolThe Edit JDBC Connection Pool page provides the means to change all of the settings for anexisting pool except its name.

Página 201 - Returns:

Optionally, the application server can validate connections before they are passed toapplications. This validation allows the application server to au

Página 202

IBM Informix Type 4 Driver ... 61CloudScape 5.1 Typ

Página 203 - Applications Level

Parameter DescriptionNon-transactional Connections Click the check box if you want Application Server to return allnon-transactional connections.Trans

Página 204

Attribute DescriptionValidate Atmost Once Amount of time, in seconds, after which aconnection is validated at most once. This will helpreduce the numb

Página 205

Match Connections Use this option to switch on/o connectionmatching for the pool. It can be set to false if theadministrator knows that the connectio

Página 206 - HTTP Service level

Note – An Oracle database user running the capture-schema command needs ANALYZE ANYTABLE privileges if that user does not own the schema. These privil

Página 207 - Thread-Pools Level

Sun GlassFish JDBC Driver for DB2 DatabasesThe JAR les for this driver are smbase.jar, smdb2.jar, and smutil.jar. Congure theconnection pool using t

Página 208 - ORBLevel

Sun GlassFish JDBC Driver for Microsoft SQL ServerDatabasesThe JAR les for this driver are smbase.jar, smsqlserver.jar, and smutil.jar. Congure thec

Página 209 - Using JConsole

IBM DB2 8.1 Type 2 DriverThe JAR les for the DB2 driver are db2jcc.jar, db2jcc_license_cu.jar, and db2java.zip.Set environment variables as follows:L

Página 210

password - Set as appropriate. databaseName - Set as appropriate. Do not specify the complete URL, only the databasename. BE_AS_JDBC_COMPLIANT_AS_POS

Página 211

DataSource Classname: com.inet.ora.OraDataSource Properties: user - Specify the database user. password - Specify the database password. serviceName

Página 212

password - Set as appropriate.Inet Sybelux JDBC Driver for Sybase DatabasesThe JAR le for the Inet Sybase driver is Sybelux.jar. Congure the connec

Página 213

Managing Security Maps ... 87▼ To Delete a C

Página 214

For example:jdbc:oracle:thin:@localhost:1521:customer_db xa-driver-does-not-support-non-tx-operations - Set to the value true. Optional:only needed if

Página 215 - Conguring Management Rules

xa-driver-does-not-support-non-tx-operations - Set to the value true. Optional:only needed if both non-XA and XA connections are retrieved from the s

Página 217

Conguring Java Message Service ResourcesThe Enterprise Server implements the Java Message Service (JMS) API by integrating theMessage Queue software

Página 218

TopicConnectionFactory objects, used for publish-subscribe communication ConnectionFactory objects, which can be used for both point-to-point andpubl

Página 219 - Tuning the JVM Settings

JMS Connection FactoriesJMS connection factories are objects that allow an application to create other JMS objectsprogrammatically. These administered

Página 220 - Conguring Advanced Settings

To create a physical destination from the Admin Console, select Conguration >PhysicalDestinations. In the Create Physical Destinations page, speci

Página 221 - APPENDIX A

In the MQ Scheme and MQ Service elds, type the Message Queue address scheme nameand the Message Queue connection service name if a non-default schem

Página 222

Conguring the Generic Resource AdapterPrior to deploying the resource adapter, JMS client libraries should be made available to theEnterprise Server.

Página 223 - Platforms

Property Name Valid Values Default Value DescriptionTopicConnectionFactoryClassNameName of the class availablein the application serverclasspath , for

Página 224

Users ... 105

Página 225 - User Logs Out

Property Name Valid Values Default Value DescriptionJndiProperties Name value pairs separatedby commaNone Species the JNDI provider propertiesto be u

Página 226

Property Name Valid Values Default Value DescriptionRMPolicy ProviderManaged orOnePerPhysicalConnectionProviderManagedThe isSameRM method on anXAResou

Página 227 - Top Level Elements

Property Name Valid Value Default Value DescriptionClientId A valid client ID None ClientID as specied by JMS 1.1specication.ConnectionFactoryJndiNa

Página 228

Property Name Valid Value Default Value DescriptionMaxPoolSize An integer 8 Maximum size of server session poolinternally created by the resourceadapt

Página 229 - Elements Not Aliased

Property Name Valid Value Default Value DescriptionRedeliveryAttempts integer Number of times a message will bedelivered if a message causes aruntime

Página 230

Conguring JavaMail ResourcesThe Enterprise Server includes the JavaMail API. The JavaMail API is a set of abstract APIs thatmodel a mail system. The

Página 231 - The asadmin Utility

To create a JavaMail session using the Admin Console, select Resources —> JavaMail Sessions.Specify the JavaMail settings as follows: JNDI Name: Th

Página 232

JNDI ResourcesThe Java Naming and Directory Interface (JNDI) is an application programming interface(API) for accessing dierent kinds of naming and d

Página 233 - AS_ADMIN_MASTERPASSWORD=value

application component's environment allows the application component to be customizedwithout the need to access or change the application compone

Página 234 - Option Denition

TABLE 6–1 JNDI Lookups and Their Associated ReferencesJNDI Lookup Name Associated Referencejava:comp/env Application environment entriesjava:comp/env/

Página 235 - The Multimode Command

Actions of Request and Response Policy Congurations ... 134Conguring Other Security Facilities ..

Página 236

-- and jndi-lookup-name refers to the JNDI name to lookup to fetch the-- designated (in this case the java) object.--><external-jndi-resource jn

Página 237 - Server Lifecycle Commands

Connector ResourcesThis chapter explains how to congure connectors, which are used to access enterpriseinformation systems (EISs). This chapter conta

Página 238 - List and Status Commands

Managing Connector Connection Pools “To Create a Connector Connection Pool” on page 82 “To Edit a Connector Connection Pool” on page 83 “To Edit Conne

Página 239 - Deployment Commands

c. In the Additional Properties table, add any required properties.In the previous Create Connector Connection Pool page, you selected a class in theC

Página 240 - Version Commands

On Any Failure If you select the checkbox labelled Close AllConnections, if a single connection fails, then theapplication server will close all conne

Página 241 - Resource Management Commands

Using the asadmin commands to change connection pool properties.You can use the asadmin get and set commands to view and change the values of theconne

Página 242

Lazy Association Connections are lazily associated when an operation is performed on them. Also,they are disassociated when the transaction is complet

Página 243 - Conguration Commands

▼To Edit Connection Pool PropertiesUse the Additional Properties tab to modify the properties of an existing pool.The properties specied depend on th

Página 244 - Proler and SSL Commands

Equivalent asadmin commanddelete-connector-connection-pool▼To Set Up EIS AccessDeploy (install) a connector.Create a connection pool for the connector

Página 245 - Transaction andTimer Commands

d. Do one of the following: If you are using the cluster prole, you will see the Targets section of the page. in theTargets section of the page, sele

Página 246 - User Management Commands

Viewing Deployed Web Services ... 156Testing Web Services ..

Página 247 - Database Commands

On the Connector Resources page, select the checkbox for the resource to be deleted.Click Delete.Equivalent asadmin commanddelete-connector-resource▼T

Página 248 - Web Service Commands

To create, edit, and delete Connector Connection Pools, click Resources —> AdministeredObject Resources in the Admin Console. Consult the Admin Con

Página 249 - Security Service Commands

g. Click Finish.Equivalent asadmin commandcreate-admin-object▼To Edit an Administered Object ResourceIn the tree component, expand the Resource node a

Página 250 - Password Commands

Web and EJB ContainersContainers provide runtime support for application components. Application components usethe protocols and methods of the contai

Página 251 - Service Command

Editing the Properties of the SIP ContainerThe sub-elements of the SIP container are session-managerand session-properties.store-properties, manager-p

Página 252 - Property Command

Editing SIP Container Session Manager PropertiesTo view the sub-elements of the SIP container session manager properties, use the followingcommand: li

Página 254

Conguring SecuritySecurity is about protecting data: how to prevent unauthorized access or damage to it in storageor transit. The Enterprise Server;

Página 255

In declarative security, the container (the Enterprise Server) handles security through anapplication's deployment descriptors. You can control

Página 256

For more information on using certutil, pk12util, and other NSS security tools, see NSSSecurity Tools athttp://www.mozilla.org/projects/security/pki/n

Comentários a estes Manuais

Sem comentários