![]() |
Copyright © Cloud Software Group, Inc. All Rights Reserved |
• ASG_HOME/asg-configui.tra
• ASG_HOME/webapp/ASGConfig/WEB-INF/web.xmlThis section explains the configuration steps to authenticate a user on the LDAP server. LDAP Server Authentication can be defined either in the asg-configui file or web.xml file.
•
• To configure the authentication process type, the authentication property file and session timeout in the asg-configui.tra file, do the following:
1. Navigate to the ASG_HOME directory.
2. Open the asg-configui.tra file for editing.
3. Set the following properties. See Authentication Properties table for the description of properties.java.property.com.tibco.asg.designtime.configui.ASGPropFile=path of the property file for LDAP server detailsjava.property.com.tibco.asg.designtime.configui.ASGSessionTimeOut=Timeout value (An integer in minutes)To configure the authentication process type, the authentication property file and session timeout in the web.xml file, do the following:
1.
2.
3. Set the following properties. See Authentication Properties table for the description of properties.
a. Set the authentication process type to LDAP as follows:<param-value>Path to the property file for LDAP Server property file </param-value><session-timeout>An integer value in minutes</session-timeout>This section explains the configuration steps to authenticate a user with the credentials stored in a file on the file system. File-based authentication can be defined either in the asg-configui file or web.xml file.
•
• To configure the authentication process type as FILE, the authentication property file and session timeout in the asg-configui.tra file, do the following:
1. Navigate to the ASG_HOME directory.
2. Open the asg-configui.tra file for editing.
3. Set the following properties. See Authentication Properties table for the description of properties.java.property.com.tibco.asg.designtime.configui.ASGPropFile=Full path of the user credentials filejava.property.com.tibco.asg.designtime.configui.ASGSessionTimeOut=Timeout value (An integer in minutes)To configure the authentication process type as FILE, the authentication property file and session timeout in the web.xml file, do the following:
1.
2.
3. Set the following properties. See Authentication Properties table for the description of properties.
a. Set the authentication process type to FILE as follows:<param-value>Path to the user credentials file</param-value><session-timeout>An integer value in minutes</session-timeout>
• If the configuration is of the authentication type, the authentication property file and session timeout parameters are done in both the asg-configui.tra and web.xml files. The asg-configui.tra file has the precedence over the web.xml file.
• If you want to use the web.xml for configuring the session timeout, remove the ASGSessionTimeOut property from the asg-configui.tra file.If you are using the LDAP server authentication, you should define an LDAP search property file. See LDAP Server Property File for LDAP Server Authentication.If you are using the FILE-based authentication, define a user credentials file. The user credentials file is a text file containing the usernames and passwords required to login to the Config UI. See User Credentials File for File-Based Authentication.LDAP Server Properties Sample File: shows the example properties to be defined in the property file for the LDAP server authentication.Figure 8 LDAP Server Properties Sample File:In the file-based authentication, the credentials of the user are stored in a file. By default, the file is users.pwd file, which contains a list of user names, passwords, and roles. This file is referred as the password file. The user names, passwords, and roles are separated by colon (:) character and each pair must be present on a separate line. The user names are used to login the Config UI for file- based authentication.The Config UI does not use the role for authentication process. The role is required only by the Management and Monitoring server. It is mandatory to define the role in the users.pwd file. Use GUI_USER as the role in the file when defining the user to log in the Config UI for file- based authentication.
The password in the users.pwd file must be generated using MD5 (Message-Digest 5) hashing algorithm. For example, refer to http://www.md5hasher.net to generate the password using MD5 alogrithm.ASG_HOME/mm/config/users.pwdSample Property File for File Authentication shows the example file for file-based authentication.When the authentication process property (asgAuthProcess) is blank, the Config UI authenticates the credentials of the user with the values specified by the following parameters in the ASG_HOME/bin/asg-configui.tra file.
1.
2. Set the following property to blank as follows: java.property.com.tibco.asg.designtime.configui.ASGAuthProcess=(Example, asgadmin)(Example, asgadmin or an encrypted value)
• The password value for the tibco.env.ASG_ADMIN_PASSWORD property can be in plain text or in TIBCO obfuscated form. The password can be obfuscated using the asg-password-obfuscator utility in the ASG_HOME/bin directory.
• When the authentication process property (asgAuthProcess) is blank, the Config UI allows only one user for the login as specified by the tibco.env.ASG_ADMIN_USERNAME parameter. If you want multiple users to login to the Config UI, you must use the LDAP or FILE based authentication.
![]() |
Copyright © Cloud Software Group, Inc. All Rights Reserved |