Migrating, coexisting, and interoperating – Security considerations
Use this topic to migrate the security configuration of previous WAS releases and its applications to the new installation of WAS.
This information addresses the need to migrate the security configurations from a previous release of IBM WAS to WAS 7.0 or later. Complete the following steps to migrate the security configurations:
- If security is enabled in the previous release, obtain the administrative server ID and password of the previous release. This information is needed in order to run certain migration jobs.
- We can optionally disable security in the previous release before migrating the installation. No logon is required during the installation.
Use the First steps wizard to access and run the Migration wizard.
- Start the First steps wizard by launching the firststeps.bat or the firststeps.sh file. The first steps file is located in the following directory:
- (Linux) [AIX] [HP-UX] [Solaris]
- (Windows) APP_ROOT\profiles\profile_name\firststeps\firststeps.bat
- On the First steps wizard panel, click Migration wizard.
- Follow the instructions provided in the First steps wizard to complete the migration.
The security configuration of previous WAS releases and its applications are migrated to the new installation of WAS V7.0.
If a custom user registry is used in the previous version, the migration process does not migrate the class files that are used by the standalone custom registry in the previous APP_ROOT/classes directory. Therefore, after migration, copy the custom user registry implementation classes to the APP_ROOT/classes directory.
If we upgrade from WAS, V5.x to WAS V7.0, the data that is associated with V5.x trust associations is not automatically migrated. To migrate trust associations, see Migrate trust association interceptors.
Interoperating with previous product versions
Interoperating with a C++ common object request broker architecture client
Migrate custom user registries
Migrate trust association interceptors
Migrate Common Object Request Broker Architecture programmatic login to (CORBA and JAAS)
Migrate from the CustomLoginServlet class to servlet filters
Migrate Java 2 security policy
Migrate with TAM for authentication enabled on a single node
Migrate with TAM for authentication enabled on multiple nodes
Java Authentication and Authorization Service
Web component security
J2EE connector security
Set inbound identity mapping