Network Deployment (Distributed operating systems), v8.0 > Reference > Commands (wsadmin scripting)
LTPA_LDAPSecurityOn and LTPA_LDAPSecurityOff command usage
Use the examples in this topic to enable and disable LTPA/LDAP security, based on single sign-on using the LDAP user registry.
Enable LTPA/LDAP global security:
- Use help to find out what arguments provide:
### Jacl
LTPA_LDAPSecurityOn helpExample output:
Syntax: LTPA_LDAPSecurityOn server user password port domain### Jython
LTPA_LDAPSecurityOn('help')Example output:
Syntax: LTPA_LDAPSecurityOn(server, user, password, port, domain)
- Issue the call with the arguments provided to turn on LTPA/LDAP security:
### Jacl
LTPA_LDAPSecurityOn ldpaServer1 user1 password1 660 ibm.com### Jython
LTPA_LDAPSecurityOn('ldpaServer1', 'user1', 'password1', '660', 'ibm.com')Example output:
PLEASE READ BELOW: Done with LTPA/LDAP security turning on process, now restart all the processes to make it affected. Then you can start using the client with SOAP or RMI connector.
- If you use the SOAP connector to connect to the server, modify the soap.client.props file in your WAS_HOME/properties directory. Update as below for SOAP connector:
com.ibm.SOAP.securityEnabled=true com.ibm.SOAP.loginUserid=user1 com.ibm.SOAP.loginPassword=password1
- the sas.client.props file in your WAS_HOME/properties directory. Update as below for RMI connector:
com.ibm.CORBA.loginUserid=user1 com.ibm.CORBA.loginPassword=password1
Disable LTPA/LDAP global security:
- Issue the following call to turn off LTPA/LDAP global security
### Jacl
LTPA_LDAPSecurityOff### Jython
LTPA_LDAPSecurityOff()Example output:
LTPA/LDAP security is off now but restart all the processes to make it affected.
Related