Manage the runtime component

To manage configuration files with the local management interface, use the Runtime Component management page. When you first install the appliance, configure the runtime component. At any time after configuration, we can either edit the configuration settings, or unconfigure the runtime component.

Steps

  1. Select Web > Manage > Runtime Component.

  2. Select one of the following actions.

    • Configure

      1. On the Main tab, select the User Registry type of LDAP.

        The runtime component does not communicate with the user registry, but we must select a registry type. It does not matter what user registry the system uses. Selection of the user registry type has no effect on the runtime component. Select LDAP in order to minimize the configuration steps.

      2. On the Policy Server tab, provide settings.

          Host name Host that hosts the policy server.
          Port The port over which communication with the policy server takes place.
          Management Domain The IBM ISAM domain name.

      3. Provide settings on the LDAP tab.

        Enter a Host name and accept the default value for Port. The host name and port values are just placeholders. The runtime component does not use the values, but the configuration wizard requires that values must be set.

      4. Click Finish to save the settings.

    • Unconfigure the remote policy server

      1. To have the unconfigure operation to forcefully remove all of the configuration data select the Force check box

        By default, this check box is not selected. Select the Force check box only if the unconfiguration fails repeatedly. Use this option only as a last resort.

      2. Click Submit to confirm operation.

    • Edit

      1. Select the runtime configuration file of interest.

      2. Edit the configuration file and then click Save to save the changes.

        To not save the changes, click Cancel. To revert to the previous version of the configuration file, click Revert.

    For the changes to take effect, they must be deployed.

Parent topic: Advanced Access Control configuration

Related information