ManagingSecurity Maps ............................................................................................................. 87
ToDelete a Connector Connection Pool ..................................................................................87
ToSet Up EIS Access ...................................................................................................................88
ManagingConnector Resources ....................................................................................................... 88
ToCreate a Connector Resource ............................................................................................... 88
ToEdit a Connector Resource .................................................................................................... 89
ToDelete a Connector Resource ................................................................................................ 89
ToCongure the Connector Service .........................................................................................90
ManagingAdministered Object Resources ...................................................................................... 90
ToCreate an Administered Object Resource ...........................................................................91
ToEdit an Administered Object Resource ...............................................................................92
ToDelete an Administered Object Resource ........................................................................... 92
8 Weband EJB Containers ..................................................................................................................... 93
TheSIP Servlet Container .................................................................................................................. 93
Editingthe Properties of the SIP Container .............................................................................. 94
TheWeb Container ............................................................................................................................. 95
TheEJB Container .............................................................................................................................. 95
9 ConguringSecurity ...........................................................................................................................97
UnderstandingApplication and System Security ............................................................................ 97
Toolsfor Managing Security ..............................................................................................................98
ManagingSecurity of Passwords .......................................................................................................99
Encryptinga Password in the domain.xml File ........................................................................99
ProtectingFiles with Encoded Passwords ............................................................................... 100
Changingthe Master Password ................................................................................................ 100
Workingwith the Master Password and Keystores ...............................................................101
Changingthe Admin Password ................................................................................................ 101
AboutAuthentication and Authorization ...................................................................................... 102
AuthenticatingEntities .............................................................................................................102
AuthorizingUsers ...................................................................................................................... 103
SpecifyingJACC Providers .......................................................................................................103
AuditingAuthentication and AuthorizationDecisions ........................................................103
ConguringMessage Security .................................................................................................. 104
UnderstandingUsers, Groups, Roles, and Realms ........................................................................ 104
Contents
SunGlassFishEnterprise Ser ver2.1 Administration Guide December20086