Enable LTPA/LDAP security with a profile using wsadmin
The following example calls the procedures set up by the default profile to enable and disable LTPA/LDAP security, based on single sign-on using LDAP user registry.
Using Jacl
### Use help to find out what arguments you need to provide... LTPA_LDAPSecurityOn help ### Issue the call with the arguments provided to turn on LTPA/LDAP security... LTPA_LDAPSecurityOn ldpaServer1 user1 password1 660 ibm.com ### If you use the SOAP connector ### to connect to the server, you need to modify the soap.client.props file in your ### $WAS_HOME/properties directory. ### Update as below for SOAP connector: com.ibm.SOAP.securityEnabled=true com.ibm.SOAP.loginUserid=user1 com.ibm.SOAP.loginPassword=password1 ### If you use the RMI connector to connect to the server, you are prompted ### to enter the user ID and the password. If you want to bypass the login process, ### you can modify sas.client.props file in your $WAS_HOME/properties directory. ### Update as below for RMI connector: com.ibm.CORBA.loginSource=properties com.ibm.CORBA.loginUserid=user1 com.ibm.CORBA.loginPassword=password1 ### Issue the following call to turn off LTPA/LDAP global security LTPA_LDAPSecurityOff
Using Jython
LTPA_LDAPSecurityOn('help') LTPA_LDAPSecurityOn('ldpaServer1', 'user1', 'password1', '660', 'ibm.com') LTPA_LDAPSecurityOff()