Enable LTPA/LDAP security with a profile using wsadmin

The following example calls the procedures set up by the default profile to enable and disable LTPA/LDAP security, based on single sign-on using LDAP user registry.

 

Using Jacl

### Use help to find out what arguments you need to provide...
LTPA_LDAPSecurityOn help


### Issue the call with the arguments provided to turn on LTPA/LDAP security...

LTPA_LDAPSecurityOn ldpaServer1 user1 password1 660 ibm.com


### If you use the SOAP connector 
### to connect to the server, you need to modify the soap.client.props file in your 
### $WAS_HOME/properties directory.
### Update as below for SOAP connector:  

com.ibm.SOAP.securityEnabled=true
com.ibm.SOAP.loginUserid=user1
com.ibm.SOAP.loginPassword=password1 

### If you use the RMI connector to connect to the server, you are prompted
### to enter the user ID and the password. If you want to bypass the login process,
### you can modify sas.client.props file in your $WAS_HOME/properties directory.
###   Update as below for RMI connector: 

com.ibm.CORBA.loginSource=properties
com.ibm.CORBA.loginUserid=user1
com.ibm.CORBA.loginPassword=password1


### Issue the following call to turn off LTPA/LDAP global security

LTPA_LDAPSecurityOff

 

Using Jython

LTPA_LDAPSecurityOn('help')

LTPA_LDAPSecurityOn('ldpaServer1', 'user1', 'password1', '660', 'ibm.com')
LTPA_LDAPSecurityOff()