WAS v8.5 > Reference > Commands (wsadmin scripting)LTPA_LDAPSecurityOn and LTPA_LDAPSecurityOff command usage
Use the examples in this topic to enable and disable LTPA/LDAP security, based on single sign-on using the LDAP user registry.
Enabling LTPA/LDAP global security:
- Use help to find out what arguments provide:
Jacl:
LTPA_LDAPSecurityOn help
Example output:
Syntax: LTPA_LDAPSecurityOn server user password port domain
Jython:
LTPA_LDAPSecurityOn('help')
Example output:
Syntax: LTPA_LDAPSecurityOn(server, user, password, port, domain)
- Issue the call with the arguments provided to turn on LTPA/LDAP security:
Jacl:
LTPA_LDAPSecurityOn ldpaServer1 user1 password1 660 ibm.com
Jython:
LTPA_LDAPSecurityOn('ldpaServer1', 'user1', 'password1', '660', 'ibm.com')
Example output:
PLEASE READ BELOW: Done with LTPA/LDAP security turning on process, now you need to restart all the processes to make it affected. Then we can start using the client with SOAP or RMI connector.
- If we use the SOAP connector to connect to the server, you need to modify the soap.client.props file in your app_server_root/properties directory. Update as below for SOAP connector:
com.ibm.SOAP.securityEnabled=true com.ibm.SOAP.loginUserid=user1 com.ibm.SOAP.loginPassword=password1- If we use the RMI connector to connect to the server, you are prompted to enter the user ID and the password to modify the sas.client.props file in your app_server_root/properties directory. Update as below for RMI connector:
com.ibm.CORBA.loginSource=properties
com.ibm.CORBA.loginUserid=user1 com.ibm.CORBA.loginPassword=password1
Disabling LTPA/LDAP global security:
- Issue the following call to turn off LTPA/LDAP global security
Jacl:
LTPA_LDAPSecurityOff
Jython:
LTPA_LDAPSecurityOff()
Example output:
LTPA/LDAP security is off now but you need to restart all the processes to make it affected.
Reference:
AdminTask SecurityConfigurationCommands