Administrator Server Configuration: Edit Authentication Realm Settings

Administrator stores information about users and groups in an authentication realm. When you edit the Authentication realm, you can change the settings of the current realm, switch from a database to LDAP, or switch from LDAP to a database. TIBCO Configuration Tool will then prompt you for more information about the authentication realm.

Note: This screen is only displayed if you selected Edit Authentication Realm Settings on the Edit ActiveMatrix Administrator Server Configuration screen.

Changing from a Database Realm to LDAP

Before you can change from a database realm to the LDAP realm, you have to add a new user in the current DB realm and assign the user as superuser. This new user must already be a user in the LDAP realm you want to use. See the Administration document for more information.

If you are changing from a Database realm to an LDAP realm, super user credentials are displayed. You need to enter the super user credentials you just created.

Enter the information about the authentication realm in the wizard screen.

Changing from LDAP to a Database Realm

What happens when you change from LDAP to a database realm depends on whether the database realm is empty or not.
  • If the new database realm is empty that is if it does not have any users in it, Administrator creates a new user called tibco_user with a password 't'.

    For this case, use the tibco_user superuser to log in to TIBCO Administrator after you have changed to a database realm and change the password. Consider creating a new superuser and deleting the default tibco_user user.

  • If the new DB realm is not empty and does not contain any of the current superuser, a new user called tibco_user with password 't' is created.

    For this case, use the tibco_user superuser to log in to TIBCO Administrator after you have changed to a database realm and change the password. Consider creating a new superuser and deleting the default tibco_user user.

  • If the new DB realm already contains a superuser that is also a superuser in LDAP, you can use that superuser. Administrator does not create a new user.

Enter the information about the authentication realm in the wizard screen.

Field Description
Authentication Realm
Realm Type The type of the authentication realm: Database or LDAP. If Database, the Administrator Server Configuration: Database Authentication Realm screen displays. If LDAP, the Administrator Server Configuration: LDAP Authentication Realm screens display.
Superuser Credentials
Username The ID of the initial superuser.

Default: root.

Password The password of the superuser.

Default: t.

In the properties file, this value is obfuscated.