Remove Security Access Manager | HCL Digital Experience
After you install and use IBM Security Access Manager, you might find that you no longer require its use. We can then remove it from the HCL Digital Experience environment and restore authentication capabilities to IBM WebSphere Application Server and authorization capabilities to HCL Digital Experience.
Complete the following steps to remove Security Access Manager from the HCL Digital Experience environment:
Procedure
- Complete the following steps, from the WebSphere Integrated Solutions Console, if you configured Security Access Manager for authentication:
- Select Security > Global security > Web and SIP security > Trust association > Interceptors.
- Delete com.ibm.sec.authn.tai.TAMETai or if you are still using the deprecated Trust Association Interceptors (TAIs) implementation, delete com.ibm.ws.security.web.TAMTrustAssociationInterceptorPlus.
- Click OK then Save.
- Optional: Complete the following steps, from the WebSphere Integrated Solutions Console (WAS), if you configured Security Access Manager for authorization:
- Login to the WAS console/DMGR.
- Navigate to Resources > Resource Environment > Resource Environment Providers . Then, click on All Scopes.
- Navigate to WP ExternalAccessControlService, then select Custom Properties.
- Delete all custom properties in this section, then save changes.
- Navigate to WP AccessControlService, then select Custom Properties.
- Update the property accessControlConfig.enableExternalization from TRUE to FALSE.
- Navigate to Resources > Resource Environment > Resource Environment Providers one more time.
- Select WP AccessControlDataManagementService, then select Custom Properties.
- Delete the accessControlDataManagement.cacheTimeout and accessControlDataManagement.reorderRoleNames custom properties.
- Save all changes and sync the nodes, if cluster
- On the Portal server itself, edit the services.properties file that is found in the wp_profile_root/PortalServer/config/config directory.
- Find the value com.ibm.wps.services.ac.ExternalAccessControlService and change it to com.ibm.wps.ac.impl.ExternalAccessControlDefaultImpl.
- Restart the Portal server(s).
- Optional: Complete the following steps to remove the credential vault adapter and its associated segments if you configured it for Security Access Manager:
- Use the Credential Vault portlet to remove any segments that are added since installation.
Do not remove DefaultAdminSegment.
- Remove the Vault.AccessManager Credential Vault adapter implementation properties; including class, config, manager, and read-only; from the portal Credential Vault Service configuration.
The systemcred.dn property cannot be removed.
- Remove the accessmanagervault.properties file from the wp_profile_root/PortalServer/config/config directory.
Complete step 3.c. on all nodes.
- Optional: If you enabled user provisioning, go to Disable user provisioning.
- Optional: Restore the backup copy of the theme so that the login and logout pages restore to the default before Security Access Manager was enabled.
- Optional: Remove all junction points, access control lists (ACLs), protected objectspace entries (POS entries), custom actions, and custom action groups.
- Optional: Run the following task to remove the connection to Security Access Manager:
- AIX HP-UX Linux Solaris: ./ConfigEngine.sh run-svrssl-unconfig -DWasPassword=foo -Dwp.ac.impl.PDAdminPwd=foo from the wp_profile_root/ConfigEngine
- IBM i: ConfigEngine.sh run-svrssl-unconfig -DWasPassword=foo -Dwp.ac.impl.PDAdminPwd=foo from the wp_profile_root/ConfigEngine
- Windows ConfigEngine.bat run-svrssl-unconfig -DWasPassword=foo -Dwp.ac.impl.PDAdminPwd=foo from the wp_profile_root\ConfigEngine
- z/OS : ./ConfigEngine.sh run-svrssl-unconfig -DWasPassword=foo -Dwp.ac.impl.PDAdminPwd=foo from the wp_profile_root/ConfigEngine
Clustered environments:
- Complete this step on all nodes.
- WasPassword is the dmgr administrative password.
If the connection still shows up after you run this task, go to Invalid or Stale Server Definitions for more information.
- If necessary, uninstall any Security Access Manager components.
- Stop and restart the appropriate servers to propagate the changes. For specific instructions, see Start and stop servers, deployment managers, and node agents.