Daemon Security
C-6 Oracle Application Server Adapter for IMS/TM User’s Guide
7. Right-click the daemon and select End Unused Servers. Any servers in the
connection pool are closed and new servers start with the new configuration.
The Daemon Security tab is shown in the following figure:
Figure 6–16 The Daemon Security tab
The Daemon Security tab comprises fields, as listed in the following table:
Note: You can also change daemon settings using the
Configuration Explorer, by selecting a computer and scrolling the
list to the required daemon. Right-click the daemon and select Edit
Daemon.
Changes made to the daemon configuration are not implemented.
They are only implemented after the configuration is reloaded
using the Reload Configuration option in the Runtime Manager.
Table 6–20 Daemon Security tab Components
Field Description
Administrators
privileges
Identifies the users (accounts) allowed to perform
administrative tasks (tasks that require administrative
login).
All users Enables all users to access the daemon and change the
settings.