+

Search Tips   |   Advanced Search

Configure administrative authentication

An authentication mechanism defines rules about security information, such as whether a credential is forwardable to another Java process, and the format of how security information is stored in both credentials and tokens.

With RSA tokens we can submit administrative jobs through a job manager. We can manage applications, perform product maintenance, modify configurations, and control the application server runtime.

Avoid trouble: Administrative authentication is set to RSA by default for servers running in a Base or Express environment, and LTPA for servers running in a Network Deployment environment. gotcha

No manual steps are required with these keystores, and this allows uncommon trust establishment among processes not in the same administrative domain. We can also replace the RSA personal certificate with a personal certificate obtained from a certificate authority (CA) if desired. In this case, make sure the CA root certificate is placed in all RSA trust stores in the same administrative domain.

To administer and RSA keystore...

You can set description, path, read only and/or initialize at setup. Enter password to make these modifications. In cases where the process is back-level or a target RSA certificate cannot be obtained, the fallback mechanism is LTPA which is supported in all previous releases for administrative communications. The fallback occurs automatically. If the LTPA keys are not shared and a fallback occurs, LTPA will fail as well. However, this situation is typically an error case in the RSA mechanism and should occur infrequently.


Related concepts:

  • Job manager security
  • Authenticating users