ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzatz_5.4.0.1/51/admin/qshsecurity.htm

32 lines
1.8 KiB
HTML
Raw Permalink Normal View History

2024-04-02 14:02:31 +00:00
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<META http-equiv="Content-Type" content="text/html; charset=utf-8">
<LINK rel="stylesheet" type="text/css" href="../../../rzahg/ic.css">
<title>Security and Qshell scripts</title>
</head>
<BODY>
<!-- Java sync-link -->
<SCRIPT LANGUAGE="Javascript" SRC="../../../rzahg/synch.js" TYPE="text/javascript"></SCRIPT>
<h4><a name="qshsecurity"></a>Security and Qshell scripts</h4>
<p>If security is enabled for your application server, you must provide authentication information to the scripts. If security is enabled and you do not provide authentication information, the scripts receive an AccessDenied exception. You can provide authentication data in any of these ways:</p>
<ul>
<li><p>Most command line tools support -username and -password options that you can use to provide basic authentication data. The userid and password that you specify should be an administrative user. For example, you can use a member of the WebSphere administrative console users with operator or administrator privileges, or the administrative userid configured in the user registry. In this example, the stopServer script specifies the required command line parameters:</p>
<pre>stopServer -username adminuser -password adminpw</pre></li>
<li><p>You can place the authentication data in a properties file that the command line tools read.</p>
<ul>
<li>If you use the SOAP connector, the default file for this data is the soap.client.props.</li>
<li>If you use the RMI connector, use the sas.client.props file.</li>
</ul>
<p>The script uses the properties files in the /QIBM/UserData/WebASE51/ASE/<em>instance</em>/properties directory.</p>
<p>where <em>instance</em> is the instance name specified by the -instance parameter for the command.</p></li>
</ul>
</body>
</html>