User and group registries

 

Before you perform this task:

Since the default active registry is LocalOS, it is not necessary, although it is recommended, that you enable security if you want to use the LocalOS registry to assign users and groups to roles. You can enable security once the users and groups are assigned in this case. The advantage of enabling security with the appropriate registry before proceeding with this task is that you can validate the security setup (which includes checking the user registry configuration) and avoid any problems using the registry. These steps are common for both installing an application and modifying an existing application. If the application contains roles, you see the Map security roles to users/groups link during application installation and also during application management, as a link in the Additional Properties section at the bottom.

  1. Access the administrative console by typing http://localhost:9090/admin in a Web browser.

  2. Click Map security roles to users/groups.A list of all the roles that belong to this application displays. If the roles already had users or special subjects (All Authenticated, Everyone) assigned, they display here.

  3. To assign the special subjects, select either the Everyone or the All Authenticated check box for the appropriate roles.

  4. Click Apply to save any changes and then continue working with user or group roles.

  5. To assign users or groups, select the role.You can select multiple roles at the same time, if the same users or groups are assigned to all the roles.

  6. Click Lookup Users or Lookup groups.

  7. Get the appropriate users and groups from the registry by completing the limit (number of items) and the Search String fields and clicking Search. The limit field limits the number of users that are obtained and displayed from the registry. The pattern is a searchable pattern matching one or more users and groups. For example, user* lists users like user1, user2. A pattern of asterisk (*) indicates all users or groups.

    Use the limit and the search strings cautiously so as not to overwhelm the registry. When using large registries (like LDAP) where information on thousands of users and groups resides, a search for a large number of users or groups can make the system very slow and can make it fail. When there are more entries than requests for entries, a message displays on top of the panel. You can refine your search until you have the required list.

  8. Select the users and groups to include as members of these roles from the Available box and click >> to add them to the roles.

  9. To remove existing users and groups, select them from the Selected box and click <<.When removing existing users and groups from roles use caution if those same roles are used as RunAs roles.

    For example, if user1 is assigned to RunAs role, role1, and you try to remove user1 from role1, the GUI validation does not delete the user since a user can only be a part of a RunAs role if the user is already in a role (User1 should be in role1 in this case) either directly or indirectly through a group. For more information on the validation checks that are performed between RunAs role mapping and user and group mapping to roles, see Mapping users to RunAs roles section.

  10. Click OK.If there are any validation problems between the role assignments and the RunAs role assignments the changes are not committed and an error message indicating the problem dispalys at the top of the panel. If there is a problem, make sure that the user in the RunAs role is also a member of the regular role. If the regular role contains a group which contains the user in the RunAs role, make sure that the group is assigned to the role using the administrative console GUI. Follow steps 4 and 5. Avoid using the Assembly Toolkit or any other manual process where the complete name of the group, host name, group name, or distinguished name (DN) is not used.

The user and group information is added to the binding file in the application. This information is used later for authorization purposes.

 

Usage Scenario

If you are installing an application, complete your installation. Once the application is installed and running you can access your resources according to the user and group mapping you did in this task. If you are managing applications and have modified the users and groups to role mapping, make sure you save, stop and restart the application so that the changes become effective. Try accessing the J2EE resources in the application to verify that the changes are effective.

 

See Also

Security role to user and group selections
Look up users and groups settings