A system administrator needs to configure a JDBC provider and a data source for an application in a clustered environment. The administrator also needs to copy the JDBC drivers from the database server to the application server machines.
How can the administrator meet these requirements?
A web application has a configured session timeout of eight hours and a default LTPA token timeout of two hours. After every two hours, the users have to log in again from their HTTP browser. The system administrator is required to make configuration changed so users only have to log in once, while keeping the above mentioned timeouts the same. The authentication mechanism available is Kerberos.
How should the administrator do this?
In WebSphere Application Server Version 6.1, a trust association interceptor (TAI) that uses the Simple and Protected GSS-API Negotiation Mechanism (SPNEGO) to securely negotiate and authenticate HTTP requests for secured resources was introduced. This function was deprecated In WebSphere Application Server 7.0. SPNEGO web authentication has taken its place to provide dynamic reload of the SPNEGO filters and to enable fallback to the application login method.
A system administrator needs to configure a JDBC provider and a data source for an application in a clustered environment. The administrator also needs to copy the JDBC drivers from the database server to the application server machines.
How can the administrator meet these requirements?
The administrator needs to identify any security role references and security constraints in a web application.
How can the administrator identify these roles and constraints?
Securing web applications using an assembly tool.
You can use three types of web login authentication mechanisms to configure a web application: basic authentication, form-based authentication and client certificate-based authentication. Protect web resources in a web application by assigning security roles to those resources.
A system administrator needs to install WebSphere Application Server using response files, so that a silent install can be done. The administrator has ensured that all required prerequisites have already been installed and, has downloaded and expanded the required WebSphere Application Server installation files.
What can the administrator run to install the product?
Example of the use of the response files to install the product.
imcl.exe -acceptLicense
input C:\temp\keyring_response_file.xml
-log C:\temp\keyring_log.xml
References:
Arletta
12 days agoNana
19 days agoGeorgiann
25 days agoLorrine
1 months agoLucy
2 months agoRasheeda
2 months agoOdelia
2 months agoZachary
2 months agoLoreen
3 months agoEdda
3 months agoKindra
3 months agoKimi
3 months agoMaile
4 months agoGeoffrey
4 months agoLavonda
4 months agoRoyce
4 months agoCatherin
4 months agoDana
5 months agoOna
5 months agoMarilynn
5 months agoNaomi
5 months agoColeen
6 months agoFloyd
6 months agoMattie
6 months agoBritt
6 months agoMelissa
7 months agoAsha
7 months agoDaryl
8 months agoLoise
9 months agoTiera
9 months ago