+

Search Tips   |   Advanced Search

Configure local operating system registries

These steps set up security based on the local operating system user registry on which WAS is installed. For detailed information about using the local operating system user registry, see Local operating system registries.

For security purposes, the WAS provides and supports the implementation for Windows operating system registries, AIX, Solaris and multiple versions of Linux operating systems. The respective operating system API are called by the product processes (servers) for authenticating a user and other security-related tasks (for example, getting user or group information). Access to these APIs are restricted to users who have special privileges. These privileges depend on the operating system and are described later in this topic.

Consider the following issues:

Consider the following points:

The following steps are needed to perform this task initially when setting up security for the first time.


Tasks

  1. Click Security > Global security.

  2. Under User account repository, select Local operating system and click Configure.

  3. Enter a valid user name in the Primary administrative user name field. This value is the name of a user with administrative privileges defined in the registry. This user name is used to access the administrative console or used by wsadmin.

  4. Click Apply.

    Server user ID or administrative user

    Specify the short name of the account that is chosen in the second step.

    Server user password

    Password of the account that is chosen in the second step.

  5. Select either the Automatically generated server identity

For any changes in this panel to be effective, we need to save, stop, and start all the product servers, including deployment managers, nodes and application servers. If the server comes up without any problems, the setup is correct.

After completed these steps, we have configured WAS to use the local operating system registry to identify authorized users.


What to do next

Complete any remaining steps for enabling security. See Enable security.


Subtopics


Related:

  • Standalone LDAP registries
  • Select a registry or repository
  • Enable security
  • Authorizing access to administrative roles