wkplc_comp.properties
The Workplace Component Configuration File (wkplc_comp.properties):
- Do NOT enclose any value in quotes. This will cause a failure in the ConfigEngine tasks.
- Windows paths must use a forward slash (/) instead of a backward slash. A backward slash is an escaped character.
- Windows long paths are acceptable.
- Property values can be defined in three ways:
- Command line
- This property file
- Build file
The ConfigEngine task uses the following order to determine the property value:
- Check command line values. Specifying -DMyNode=somenode takes precedence.
- Check the property file
- Check the build file
##### WP.EAR PROPERTIES # WP.EAR loaded from: # # /opt/WAS_HOME/PortalServer/installer/wp.ear/wp.ear.properties # Property: WpsDefaultHome # # Create the HCL WebSphere Portal default home URL. # # Default: portal # Examples: # If you specify "portal" as the value for this property, the following is the URL for # the HCL WebSphere Portal server: http://localhost:80/wps/portal. In this example # localhost is the Websphere Portal host name (WpsHostName), # 80 is the Websphere Portal host port (WpsHostPort), and # wps is the context root (WpsContextRoot). WpsDefaultHome=portal # Property: WpsPersonalizedHome # # The personalized home is for users that have already logged in to the portal and # cannot be accessed by anonymous users. The value specified is used to create the # HCL WebSphere Portal URL for logged in users. # # Default: myportal # Examples: # If you specify "myportal" as the value for this property, the following URL is the page that logged # in users are directed to: http://localhost:80/wps/myportal. In this example # localhost is the Websphere Portal host name (WpsHostName), # 80 is the Websphere Portal host port (WpsHostPort), and # wps is the context root (WpsContextRoot). WpsPersonalizedHome=myportal ##### WP.PROCESSINTEGRATION.CONFIG PROPERTIES # WP.PROCESSINTEGRATION.CONFIG loaded from: # # /opt/WAS_HOME/PortalServer/installer/wp.processintegration.config/wp.processintegration.config.properties # 1) Properties for HCL WebSphere Portal integration with IBM Process Server # # Provide information about the already installed WebSphere Process Server. # # Property: pi.IsCrossCell # # Default: true # Examples: None available pi.IsCrossCell=true # Property: pi.ProcessServerHostAddress # # Used only if the pi.IsCrossCell value is set to true. The server # host name address of the WebSphere Process Server installation located in another cell. # # Default: No default value # Examples: None available pi.ProcessServerHostAddress= # Property: pi.ProcessServerBootstrapPort # # Used only if the pi.IsCrossCell value is set to true. The # bootstrap port of the WebSphere Process Server installation located in another # cell. # # Default: No default value # Examples: None available pi.ProcessServerBootstrapPort= # Property: pi.ProcessArtifactsLocation # # Used only if the pi.IsCrossCell value is set to true. The # directory in which the process artifacts are located. # # Default: ${USER_INSTALL_ROOT}/processArtifacts # Examples: None available pi.ProcessArtifactsLocation=${USER_INSTALL_ROOT}/processArtifacts # Property: pi.IsWPSCluster # # Used only if the pi.IsCrossCell value is set to false. # # Default: No default value # Examples: None available pi.IsWPSCluster= # Property: pi.ClusterName # # Used only if the pi.IsCrossCell value is set to false AND # pi.IsWPSCluster value is set to true. The name of the WebSphere Process Server # cluster. # # Default: No default value # Examples: None available pi.ClusterName= # Property: pi.NodeName # # Used only if the pi.IsCrossCell value is set to false AND # pi.IsWPSCluster value is set to false. The name of the node of the WebSphere # Process Server server. # # Default: No default value # Examples: None available pi.NodeName= # Property: pi.ServerName # # Used only if the pi.IsCrossCell value is set to false AND # pi.IsWPSCluster value is set to false. This value is the name of the WebSphere # Process Server server. # # Default: No default value # Examples: None available pi.ServerName= ##### WP.XML.CLIENT PROPERTIES # WP.XML.CLIENT loaded from: # # /opt/WAS_HOME/PortalServer/base/wp.xml.client/wp.xml.client.properties # 1) XMLAccess properties # Property: XmlAccessHost # # The local host name of HCL WebSphere Portal. We do not need to modify this value. # # Default: localhost # # Examples: None available XmlAccessHost=localhost # Property: XmlAccessPort # # The port used by XML Access ConfigEngine tasks to connect to the XMLAccess server # Do not use this parameter to reconfigure the XmlAccessPort port. The value is set # by the basic HCL WebSphere Portal configuration task. # # Default: 10040 # # Example: 10040 XmlAccessPort=10039 # Property: XmlAccessProtocol # # The protocol used to connect to the XMLAccess server. # # Default: http # # Examples: None available XmlAccessProtocol=http ##### WP.AC.IMPL PROPERTIES # WP.AC.IMPL loaded from: # # /opt/WAS_HOME/PortalServer/base/wp.ac.impl/wp.ac.impl.properties # 1. Advanced Security Configuration using External Security Managers # 2. Security Access Manager: AMJRTE connection parameters # 3. Security Access Manager: PDJrteCfg command and filesystem parameters # 4. Security Access Manager: SvrSslCfg command parameters # 5. Security Access Manager: WebSphere Application Server WebSEAL TAI parameters # 6. Security Access Manager: Portal authorization parameters # 7. Security Access Manager: Portal vault parameters # 8. Netegrity SiteMinder: Portal/SiteMinder authorization parameters # # 1) Advanced Security Configuration using External Security Managers # # The following parameters are used for advanced security configuration using external security # managers. Use the properties to specify namespace management parameters that are common to ISAM # and SiteMinder # # Property: wp.ac.impl.EACserverName # # (Optional) We can set different "contexts" to further distinguish externalized # role names from other role names in the Security Access Manager namespace. This # context information will be added to the namespace entry created upon role # externalization. If any of the three context values (EACserverName, EACcellName, or # EACappName) are null, none will be used. # # Default: WebSphere_Portal # # Examples: None available wp.ac.impl.EACserverName=WebSphere_Portal # Property: wp.ac.impl.EACcellName # # One of the three context values used to set a different context to further # distinguish the externalized role name # # Default: No default value # # Examples: None available wp.ac.impl.EACcellName= # Property: wp.ac.impl.EACappName # # One of the three context values used to set a different context to further # distinguish the externalized role name # # Default: wps # # Example: wps wp.ac.impl.EACappName=wps # Property: wp.ac.impl.reorderRoles # # Allows us to either have your externalized Portal rolenames displayed with the # resource type first, or the role types first. # # Default: false # # Examples: # 1) true example: /WPv80/wps.CONTENT_NODE/Welcome_Page/10_2E@Aministrator/app/server/cell # 2) true example: /WPv80/wps.CONTENT_NODE/Welcome_Page/10_2E@Editor/app/server/cell # 3) true example: /WPv80/wps.CONTENT_NODE/Administration/15_AF@Aministrator/app/server/cell # 4) true example: /WPv80/wps.PORTLET_APPLICATION/Welcome_Portlet/09_2Q@Aministrator/app/server/cell # 5) true example: /WPv80/wps.PORTLET_APPLICATION/Welcome_Portlet/09_2Q@User/app/server/cell # 6) false example: /WPv80/Aministrator@wps.CONTENT_NODE/Welcome_Page/10_2E/app/server/cell # 7) false example: /WPv80/Administrator@wps.CONTENT_NODE/Administration/15_AF/app/server/cell # 8) false example: /WPv80/Administrator@wps.PORTLET_APPLICATION/Welcome_Portlet/09_2Q/app/server/cell # 9) false example: /WPv80/Editor@wps.CONTENT_NODE/Welcome_Page/10_2E/app/server/cell # 10) false example: /WPv80/User@wps.PORTLET_APPLICATION/Welcome_Portlet/09_2Q/app/server/cell wp.ac.impl.reorderRoles=false # # 2) Security Access Manager: AMJRTE connection parameters # # Provide authentication information to enable HCL WebSphere Portal to connect with ISAM. # # Property: wp.ac.impl.PDAdminId # # An administrative user ID for Security Access Manager (ISAM) that has access to create # new ISAM servers, new Tivoli protected objectspaces, and new Tivoli protected # objects. # # Default: sec_master # Example: sec_master wp.ac.impl.PDAdminId=sec_master # Property: wp.ac.impl.PDAdminPwd # # This value is the password for the administrative ISAM user ID. # # Default: ReplaceWithYourISAMAdminPwd # Examples: None available wp.ac.impl.PDAdminPwd=ReplaceWithYourPwd # Property: wp.ac.impl.PDPermPath # # This value is the location of the ISAM AMJRTE properties file. This properties file # is created by the ISAM SvrSslCfg command and contains information such as: Policy # Server host name, ports vemycoon of AMJRTE path to encryption keys. # # Default: ${WasHome}/tivoli/tam/PdPerm.properties # Examples: None available wp.ac.impl.PDPermPath=${WasHome}/tivoli/tam/PdPerm.properties # # 3) Security Access Manager: PDJrteCfg command and filesystem parameters # # The following parameter locations depend on the WebSphere Application Server installation # structure. For more information or detail on the individual parameters, refer to: # http://publib.boulder.ibm.com/infocenter/wasinfo/v6r1/topic/com.ibm.websphere.nd.doc/info/ae/ae/ # rsec_tampdjrtecfg.html # # Property: wp.ac.impl.PDClasspath # # The location of the ISAM PD.jar file, which contains the classes required to # establish a connection to the policy server and is passed into the classpath of the # command. # # Default: ${WasHome}/tivoli/tam/PD.jar # Example: No examples are available. wp.ac.impl.PDClasspath=${WasHome}/tivoli/tam/PD.jar # Property: wp.ac.impl.PDHome # # This value is the location of the ISAM AMJRTE, which is the same as the pd.home # system property in a manual execution. # # Default: ${WasHome}/tivoli/tam/PolicyDirector # Examples: None available wp.ac.impl.PDHome=${WasHome}/tivoli/tam/PolicyDirector # Property: wp.ac.impl.JavaHome # # This value is the location of the Java runtime in which to configure, which is the # same as the -java_home command line argument in a manual execution. # # Default: ${WasHome}/java/jre/ # Examples: None available wp.ac.impl.JavaHome=${WasHome}/java/jre/ # Property: wp.ac.impl.CfgFilesPath # # This value is the required filesystem directory location of the generated ISAM # AMJRTE properties. The properties files are created by the ISAM PdjrteCfg command, # which is the same as the -cfgfiles_path command line argument in a manual # execution. # # Default: ${WasHome}/tivoli/tam # Example: No examples are available. wp.ac.impl.CfgFilesPath=${WasHome}/tivoli/tam # Property: wp.ac.impl.TamHost # # This value defines the ISAM Policy Server used when running PDJrteCfg. # # Default: your.ISAM.Policy.Server.hostname # Examples: None available wp.ac.impl.TamHost=your.ISAM.Policy.Server.hostname # # 4) Security Access Manager: SvrSslCfg command parameters # # HCL WebSphere Portal requires the following information to run the SvrSslCfg command # # Property: wp.ac.impl.PDServerName # # The unique application name and will be used to create a new Tivoli server in the # Access Manager Policy Server. This server will appear in the pdadmin server list # after running the SvrSslCfg command. If a server with the same name appears in the # server list command, the SvrSslCfg command will fail. # # Default: amwp80 # Example: No examples are available. wp.ac.impl.PDServerName=amwp80 # Property: wp.ac.impl.SvrSslCfgPort # # This value is the configuration port for the application name. This parameter is # currently ignored by the SvrSslCfg command. # # Default: 7223 # Example: No examples are available. wp.ac.impl.SvrSslCfgPort=7223 # Property: wp.ac.impl.SvrSslCfgMode # # This value is the configuration mode of the SvrSslCfg command. Currently, the only # valid value is remote. # # Default: remote # Examples: None available wp.ac.impl.SvrSslCfgMode=remote # Property: wp.ac.impl.PDPolicyServerList # # This value defines host name, port, and priority combinations for your ISAM Policy # servers used when running SvrSslCfg. # # Default: your.ISAM.Policy.Server.hostname:7135:1 # Example: hosta.ibm.com:7135:1 or host1.ibm.com:7135:1, hostb.7135:2 wp.ac.impl.PDPolicyServerList=your.ISAM.Policy.Server.hostname:7135:1 # Property: wp.ac.impl.PDAuthzServerList # # This value defines host name, port, and priority combination for your ISAM # authorization servers. # # Default: your.ISAM.Authorization.Server.hostname:7136:1 # Example: hosta.ibm.com:7136:1 wp.ac.impl.PDAuthzServerList=your.ISAM.Authorization.Server.hostname:7136:1 # Property: wp.ac.impl.PDKeyPath # # This value is the file used to store encryption keys used for the SSL communication # between AMJRTE and Tivoli Access manager. This file is generated as a result of the # SvrSslCfg command. # # Default: ${WasHome}/tivoli/tam/pdperm.ks # Examples: None available wp.ac.impl.PDKeyPath=${WasHome}/tivoli/tam/pdperm.ks # # 5) Security Access Manager: WebSphere Application Server WebSEAL TAI parameters # # HCL WebSphere Portal uses the following information for WebSEAL. # # Property: wp.ac.impl.hostnames # # (Optional) This value sets the WebSEAL TAI's hostnames parameter. You should # include the host name you provided when configuring the WebSEAL instance. The # default behavior when configuring a WebSEAL instance is to use the network short # name. For example, hosta.mycompany.com may be represented as hosta. When the # WebSEAL instance is configured and if any additional proxies are included, their # host names must be added as well. Presence of this parameter will cause the TAI to # evaluate the VIA header and only handle those requests that contain one of the # provided host name, and port combinations. # # Default: No default value # Example: hosta.mycompany.com or hosta wp.ac.impl.hostnames= # Property: wp.ac.impl.ports # # (Optional) This value sets the WebSEAL TAI's ports parameter. You should include # the WebSEAL ports in this comma-delimited list. The default WebSEAL port is 443. # Presence of this parameter will cause the TAI to evaluate the VIA header and only # handle those requests that contain one of the provided host name and port # combinations. # # Default: No default value # Example: 443 wp.ac.impl.ports= # Property: wp.ac.impl.loginId # # When you create a TCP junction, this value is WebSEAL identity representing the # reverse proxy on every request. WebSphere Application Server will use this identity # to establish the "trust" that is required to validate the WebSEAL iv-* headers. The # password for this user should be set in the WebSEAL instance's webseald.conf on the # basicauth-dummy-passwd property. # # Default: wpsadmin # Example: No examples are available. wp.ac.impl.loginId=wpsadmin # Property: wp.ac.impl.TAICreds # # This value is the headers inserted by WebSEAL that the TAI uses to identify the # request as originating from WebSEAL. Inclusion of these headers is associated with # the headers used by the WebSphere Application Server TAI to identify the request as # one from WebSEAL. If you are configuring Portal to use ISAM as an external # authorization engine, we must include at least the iv-user and iv-creds headers. # # Default: iv-user,iv-creds # Example: No examples are available. wp.ac.impl.TAICreds=iv-user,iv-creds # Property: wp.ac.impl.checkViaHeader # # We can configure TAI so that the VIA header can be ignored when validating trust # for a request. Set this property to false if none of the hosts in the VIA header # need to be evaluated. When this value is false, you do not need to set the # wp.ac.impl.hostnames and wp.ac.impl.ports properties. The only mandatory property # to set when this value is false is wp.ac.impl.loginId. # # Default: false # Examples: None available wp.ac.impl.checkViaHeader=false # Property: wp.ac.impl.viaDepth # # This value is a positive integer that specifies the number of source hosts in the # VIA header to check for trust. By default, every host in the VIA header is checked, # and if any host is not trusted, trust cannot be established. The VIA depth property # is used when only some of the hosts in the VIA header have to be trusted. The # setting indicates the number of hosts that are required to be trusted. # # Default: 0 # Example: No examples are available. wp.ac.impl.viaDepth=0 # Property: wp.ac.impl.ssoPwdExpiry # # After trust is established for a request, the single sign-on user password is # cached, eliminating the need to have the TAI re-authenticate the single sign-on # user with Security Access Manager for every request. We can modify the cache timeout # period by setting the single sign-on password expiry property to the required time # in seconds. If the password expiry property is set to 0, the cached password never # expires. # # Default: 600 # Examples: None available wp.ac.impl.ssoPwdExpiry=600 # Property: wp.ac.impl.ignoreProxy # # This property can be used to tell the TAI to ignore proxies as trusted hosts. If # set to true the comments field of the hosts entry in the VIA header is checked to # determine if a host is a proxy. Remember that not all proxies insert comments in # the via header indicating that they are proxies. If the checkViaHeader property is # set to false, then the ignoreProxy property has no influence in establishing trust. # # Default: false # Example: No examples are available. wp.ac.impl.ignoreProxy=false # # 6) Security Access Manager: Portal authorization parameters # # The following information is used to authenticate with ISAM. # # Property: wp.ac.impl.PDRoot # # This value is the root objectspace entry in the ISAM namespace. All Portal roles # will be installed under this objectspace entry. # # Default: /WPv80 # Examples: None available wp.ac.impl.PDRoot=/WPv80 # Property: wp.ac.impl.PDAction # # When the Security Access Manager external authorization plugin is started, it will # detect and, if necessary, create a custom action in Security Access Manager. The # combination of the action group and the action determines the ISAM permission string # required to assign membership to externalized Portal roles. # # Default: m # Example: No examples are available. wp.ac.impl.PDAction=m # Property: wp.ac.impl.PDActionGroup # # When the Security Access Manager external authorization plugin is started, it will # detect and, if necessary, create a custom action group in Security Access Manager. # The combination of the action group and the action determines the ISAM permission # string required to assign membership to externalized Portal roles. # # Default: [WP80] # Example: No examples are available. wp.ac.impl.PDActionGroup=[WP80] # Property: wp.ac.impl.PDCreateAcl # # When Portal externalizes a role, it can automatically create and attach a ISAM ACL # granting membership to the user doing the role. If we select false, the ISAM # administrator will be responsible for creating ISAM ACLs to allow access to Portal # roles. # # Default: true # Examples: None available wp.ac.impl.PDCreateAcl=true # # 7) Security Access Manager: Portal vault parameters # # The following information is used to confgure a vault for Security Access Manager. # # Property: wp.ac.impl.vaultType # # This value is the new vault type identifier representing the Tivoli GSO lockbox # vault. # # Default: AccessManager # Examples: None available wp.ac.impl.vaultType=AccessManager # Property: wp.ac.impl.vaultProperties # # This value defines a properties file used to configure the vault with ISAM specific # user and SSL connection information. This file will automatically be created in the # wp_profile/shared/app/config subdirectory and populated by the ant task based on # previous task execution. # # Default: accessmanagervault.properties # Example: No examples are available. wp.ac.impl.vaultProperties=accessmanagervault.properties # Property: wp.ac.impl.manageResources # # This value determines if the portal credential vault or any custom portlet is # allowed to create new resource objects in ISAM. If you set this value to false, your # Tivoli administrator must define the accessible resources to associate users with # using the Tivoli command line or GUI. # # Default: true # Example: No examples are available. wp.ac.impl.manageResources=true # Property: wp.ac.impl.readOnly # # This value determines if the portal credential vault or any custom portlet is # allowed to modify the secrets stored in ISAM. If you set this value to true ("Read # Only"), the Tivoli administrator must change the credentials associated with # resources using the Tivoli command line or GUI. # # Default: false # Examples: None available wp.ac.impl.readOnly=false # # 8) Netegrity SiteMinder: Portal/SiteMinder authorization parameters # # The following parameters enables HCL WebSphere Portal to authenticate wit Netegrity SiteMinder. # # Property: wp.ac.impl.SMDomain # # This value is the SiteMinder Domain containing all externalized portal resources. # # Default: HCL WebSphere Portal v80 # Examples: None available wp.ac.impl.SMDomain=HCL WebSphere Portal v80 # Property: wp.ac.impl.SMScheme # # This value is the SiteMinder Authentication scheme object name to use when creating # realms. # # Default: Basic # Examples: None available wp.ac.impl.SMScheme=Basic # Property: wp.ac.impl.SMAgent # # This value is the SiteMinder custom or 4.x web agent created to allow communication # between HCL WebSphere Portal and SiteMinder. # # Default: ReplaceWithYourSiteMinderAgentName # Examples: None available wp.ac.impl.SMAgent=ReplaceWithYourSiteMinderAgentName # Property: wp.ac.impl.SMAgentPwd # # This value is the SiteMinder custom or 4.x agent password. # # Default: ReplaceWithYourSiteMinderAgentPwd # Examples: None available wp.ac.impl.SMAgentPwd=ReplaceWithYourPwd # Property: wp.ac.impl.SMAgentGroup # # An externalized portal resource is assigned to a SiteMinder custom agent for # SiteMinder isProtected and isAuthorized calls. In a non-cluster, the agent # specified in the wp.ac.impl.SMAgent parameter is used. However, in a cluster, you # must specify a common SiteMinder Agent Group to be assigned to the resource. # # Default: No default value # Examples: None available wp.ac.impl.SMAgentGroup= # Property: wp.ac.impl.SMAdminId # # This value is the SiteMinder administrator who must have a scope of System because # new SiteMinder domains and realms will be created, as well as the realms # representing Portal roles and reference to the webagent. # # Default: siteminder # Examples: None available wp.ac.impl.SMAdminId=siteminder # Property: wp.ac.impl.SMAdminPwd # # This value is the password for the SiteMinder administrative user. # # Default: ReplaceWithYourSiteMinderAdminPwd # Examples: None available wp.ac.impl.SMAdminPwd=ReplaceWithYourPwd # Property: wp.ac.impl.SMUserDir # # This value is the SiteMinder User Directory object referencing the LDAP server used # for Portal users and groups. # # Default: ReplaceWithYourSiteMinderUserDirectoryObject # Examples: None available wp.ac.impl.SMUserDir=ReplaceWithYourSiteMinderUserDirectoryObject # Property: wp.ac.impl.SMFailover # # This value is the failover mode for the Siteminder Policy Server. SMFailover must # be set to true if more than 1 policy server is listed in the SMServers property # below. # # Default: false # Examples: None available wp.ac.impl.SMFailover=false # Property: wp.ac.impl.SMServers # # This value is a comma delimited list of server for the SiteMinder agent. Important: # If your Policy Servers are listening on non-default ports (for example: not # 44441,44442,44443), we must add the port property for each policy server manually # in the ExternalAccessControlService.properties file. # # Default: your.Policy.Server.ipaddress # Examples: None available wp.ac.impl.SMServers=your.Policy.Server.ipaddress ##### WP.WSRP.COMMON PROPERTIES # WP.WSRP.COMMON loaded from: # # /opt/WAS_HOME/PortalServer/base/wp.wsrp.common/wp.wsrp.common.properties # Property: WsrpContextRoot # # The context root for web services for remote portlets. In the following # URL,wps/wsrp; is the context root: http://localhost:80/wps/wsrp # # Default: wps/wsrp # Examples: None available WsrpContextRoot=wps/wsrp ##### WP.AUTH.TAI PROPERTIES # WP.AUTH.TAI loaded from: # # /opt/WAS_HOME/PortalServer/base/wp.auth.tai/wp.auth.tai.properties # 1. Advanced Security Configuration using External Security Managers # 2. HTTP Basic Authentication Trust Association Interceptor (TAI) settings # # # 1) Advanced Security Configuration using External Security Managers # # The following parameters are used for advanced security configuration using external security # managers. Use the properties to specify namespace management parameters that are common to ISAM # and SiteMinder # # Property: wp.auth.tai.facebook_app_secret_alias # # Do not change the value of this attribute unless specifically directed to do so by # IBM Support. # # Default: facebook_app_secret # Examples: None available wp.auth.tai.facebook_app_secret_alias=facebook_app_secret # # 2) HTTP Basic Authentication Trust Association Interceptor (TAI) settings # # HCL WebSphere Portal uses the following information to configure an HTTP Basic Authentication # Trust Association Interceptor (TAI) to authenticate incoming requests using the HTTP Basic # Authentication Protocol described in RFC 2617. # # Property: wp.auth.tai.BasicAuthEnabled # # Defines whether the basic authentication TAI is active (authenticates requests) or # not. # # Default: true # Examples: None available wp.auth.tai.BasicAuthEnabled=true # Property: wp.auth.tai.BasicAuthRealm # # The name of an authentication realm as defined in RFC 2617. The TAI # challenges the client to authenticate against this realm. The default value for # this property is the same authentication realm name as the one that is used by # portal HTTP form based login. # # Default: WPS # Examples: None available wp.auth.tai.BasicAuthRealm=WPS # Property: wp.auth.tai.BasicAuthUseRegExp # # This value determines whether or not the patterns that you specified for the black # list and white list properties are to be interpreted as Java regular expressions. # For more information see: # http://java.sun.com/j2se/1.4.2/docs/api/java/util/regex/Pattern.html. If Java # regular expressions are not used, then only astericks are supported as wild cards. # The following applies to astericks: # # The asterisk ( * ) wildcard can appear anywhere in the pattern. # We can use multiple asterisk ( * ) wildcards within the same pattern. # If you want to represent an asterisk as an actual character for matches in the # pattern instead of using it as a wildcard, prefix it with a backslash like this: # \* . # To represent the backslash as a character for matching, code it using a double # backslash: \\ . # # Default: false # # Examples: # 1) Java regular expressions examples: # 2) * [^X]* will match every user agent that does not contain an uppercase X in its product name. # 3) * .*my_browser.* will match every user agent that contains my_browser in its product name. # 4) * .*%5bX%5d is URL encoded for .*[X] and will match every URL that ends with X. # 5) Examples using astericks: # 6) * *my_browser* will match every user agent that contains my_browser in its product name. # 7) * /myprefix*mysuffix will match every URL that starts with /myprefix and ends with mysuffix. # 8) * Fun\* Ag\\ent will only match a user agent hat has Fun* Ag\ent as product name. wp.auth.tai.BasicAuthUseRegExp=false # Property: wp.auth.tai.BasicAuthLoginTarget # # This value is the alias of the JAAS login configuration that is used by the TAI. # The default value is the same JAAS login configuration as the one that is used by # portal HTTP form based login. The value is the target to execute to populate the # Subject with portal specific Principals when logging on using the TAI. # # Default: Portal_LTPA # Examples: None available wp.auth.tai.BasicAuthLoginTarget=Portal_LTPA # Property: wp.auth.tai.BasicAuthUserAgentBlackList # # The list of patterns for which you do not want the TAI to handle the # requests. Separate the patterns using a whitespaces. Every product name in the HTTP # header field User-Agent of incoming requests is compared with each of the patterns # specified for this property. If the TAI is enabled and the URL matches at least one # of the patterns specified for the userAgentBlackList property, the TAI will not # handle the request. To use Java regular expressions, we must set the property # wp.auth.tai.BasicAuthUseRegExp = true. # # Default: AllAgentsAllowed # Examples: None available wp.auth.tai.BasicAuthUserAgentBlackList=AllAgentsAllowed # Property: wp.auth.tai.BasicAuthUserAgentWhiteList # # The list of patterns for which you want the TAI to handle the requests. # Separate the patterns by whitespaces. Every product name in the HTTP header field # User-Agent of the incoming request is compared with each of the patterns specified # for this property.If the TAI is enabled and the pattern specified for this property # has at least one match and neither of the userAgentBlackList or the urlBlackList # have a match, then the TAI handles the request. To use Java regular expressions, # we must set the property wp.auth.tai.BasicAuthUseRegExp = true We can specify the # patterns with an asterisk ( * ) as a wild card character. We can also define the # patterns as Java regular expressions. # # Default: NoAgentSpecified # Examples: None available wp.auth.tai.BasicAuthUserAgentWhiteList=NoAgentSpecified # Property: wp.auth.tai.BasicAuthUrlBlackList # # The list of URI patterns this TAI will never handle. Separate the patterns # by whitespaces. The full path information of the URL of the incoming request is # compared with each of the patterns specified for this parameter. Before comparing # the URL to the patterns, the protocol, server, port, and query information is # removed from the URL. If the TAI is enabled and the URL matches at least one of the # patterns specified for the urlBlackList property, the TAI will not handle the # request. To use Java regular expressions, we must set the property # wp.auth.tai.BasicAuthUseRegExp = true. # # Default: /${WpsContextRoot}/myportal* # Examples: None available wp.auth.tai.BasicAuthUrlBlackList=/${WpsContextRoot}/myportal* # Property: wp.auth.tai.BasicAuthUrlWhiteList # # The list of patterns for which you want the TAI to handle the requests. # Separate the patterns by whitespaces. The full path information of the URL of the # incoming request is compared with each of the patterns specified for this # parameter. Before comparing the URL to the patterns, the protocol, server, port, # and query information is removed from the URL. If the TAI is enabled and the # pattern specified for this property has at least one match and neither of the # userAgentBlackList or the urlBlackList have a match, then the TAI handles the # request. To use Java regular expressions, we must set the property # wp.auth.tai.BasicAuthUseRegExp = true. # # Default: /${WpsContextRoot}/mycontenthandler* # Examples: None available wp.auth.tai.BasicAuthUrlWhiteList=/${WpsContextRoot}/mycontenthandler* ##### WP.SI PROPERTIES # WP.SI loaded from: # # /opt/WAS_HOME/PortalServer/solutionInstaller/wp.si/wp.si.properties # # 1) Solution Installer settings # # HCL WebSphere Portal using the following information to configure the Solution Installer # # Property: wp.si.offeringName # # Defines the name of paa offering directory # # Default: paa # # Examples: # 1) C:/PaaLocation # 2) /opt/IBM/WebSphere # 3) paa wp.si.offeringName=paa # Property: wp.si.configInstallExtensionList # # Defines extension for applying SI feature pack # # Default: -applySIFeaturePack # Example: -applySIFeaturePack wp.si.configInstallExtensionList=-applySIFeaturePack # Property: wp.si.configRemoveExtensionList # # Defines extension for removing SI feature pack # # Default: -removeSIFeaturePack # Example: -removeSIFeaturePack wp.si.configRemoveExtensionList=-removeSIFeaturePack # Property: wp.si.FunctionalArea # # Defines SI feature pack function area # # Default: featurepackSI # Example: featurepackSI wp.si.FunctionalArea=featurepackSI # Property: wp.si.deleteIntermediateFileOnExit # # Defines if you want to delete the intermediate xml file generated for XSLT # # Default: true # Examples: None available wp.si.deleteIntermediateFileOnExit=true # Property: wp.si.offlineMode # # Set wp.si.offlineMode to true if you are running solution installer on a machine # that does not have an internet connection Otherwise, set it to false # # Default: true # Examples: None available wp.si.offlineMode=true