TrustManagerCommands
Use the Jython or Jacl scripting languages to configure security with wsadmin. The commands and parameters in the TrustManagerCommands group can be used to create, delete, and query trust manager settings in the configuration. We can also use these commands to create a custom trust manager for a pure client.
The TrustManagerCommands includes the following commands:
deleteTrustManager
The deleteTrustManager command deletes the trust manager settings from the configuration.
Target object
None.
Required parameters
- -name
- Name that uniquely identifies the trust manager. (String, required)
Optional parameters
- -scopeName
- Name of the scope. (String, optional)
Examples
Batch mode example usage:
- Jacl...
$AdminTask deleteTrustManager {-name testTM}- Use Jython string:
AdminTask.deleteTrustManager('[-name testTM]')- Use Jython list:
AdminTask.deleteTrustManager(['-name', 'testTM'])
Interactive mode example usage:
- Jacl...
$AdminTask deleteTrustManager {-interactive}- Jython...
AdminTask.deleteTrustManager('-interactive')
getTrustManager
The getTrustManager command obtains the setting of a trust manager.
Target object
None.
Required parameters
- -name
- Name that uniquely identifies the trust manager. (String, required)
Optional parameters
- -scopeName
- Unique name that identifies the management scope. (String, optional)
Examples
Batch mode example usage:
- Jacl...
$AdminTask getTrustManager {-name testTM}- Use Jython string:
AdminTask.getTrustManager('[-name testTM]')- Use Jython list:
AdminTask.getTrustManager(['-name', 'testTM'])
Interactive mode example usage:
- Jacl...
$AdminTask getTrustManager {-interactive}- Jython...
AdminTask.getTrustManager('-interactive')
listTrustManagers
The listTrustManagers command lists the trust managers within a particular management scope.
Target object
None.
Required parameters
None.
Optional parameters
- -scopeName
- Unique name that identifies the management scope. (String, optional)
- -displayObjectName
- Set the value of this parameter to true to list the trust manager objects within a scope. Set the value of this parameter to false to list the strings that contain the trust manager name and management scope. (Boolean, optional)
- -all
- Specify the value of this parameter as true to list all trust managers. This parameter overrides the scopeName parameter. The default value is false. (Boolean, optional)
Examples
Batch mode example usage:
- Jacl...
$AdminTask listTrustManagers {-displayObjectName true}- Use Jython string:
AdminTask.listTrustManagers('[-displayObjectName true]')- Use Jython list:
AdminTask.listTrustManagers(['-displayObjectName', 'true'])
Interactive mode example usage:
- Jacl...
$AdminTask listTrustManagers {-interactive}- Jython...
AdminTask.listTrustManagers('-interactive')
modifyTrustManager
The modifyTrustManager command changes existing trust manager settings.
Target object
None.
Required parameters
- -name
- Name that uniquely identifies the trust manager. (String, required)
Optional parameters
- -scopeName
- Unique name that identifies the management scope. (String, optional)
- -provider
- Provider name of the trust manager. (String, optional)
- -algorithm
- Algorithm name of the trust manager. (String, optional)
- -trustManagerClass
- class that implements the javax.net.sslX509TrustManager interface. We cannot use this parameter with the provider or algorithm parameters. (String, optional)
Examples
Batch mode example usage:
- Jacl...
$AdminTask modifyTrustManager {-name testTM -trustManagerClass test.trust.manager}- Use Jython string:
AdminTask.modifyTrustManager('[-name testTM -trustManagerClass test.trust.manager]')- Use Jython list:
AdminTask.modifyTrustManager(['-name', 'testTM', '-trustManagerClass', 'test.trust.manager'])
Interactive mode example usage:
- Jacl...
$AdminTask modifyTrustManager {-interactive}- Jython...
AdminTask.modifyTrustManager('-interactive')
Related concepts
Key management for cryptographic uses
Related tasks
Use AdminTask for scripted administration
Automating SSL configurations using scripting
Create a custom trust manager configuration for SSL