File name: udat_map2xcmp.html
Map data sources for all 2.x CMP beans settings
Use this page to map container-managed persistence (CMP)
2.x beans of an application to data sources that are available to
the application.
To view this administrative console page, click .
Each table row corresponds to a CMP bean within a specific enterprise JavaBeans™ (EJB) module. A row
shows the JNDI name of the data source mapping target of the bean
only if you bound them together during application assembly. For every
data source that is displayed, you see the corresponding security
configuration.
Set Multiple JNDI names
Specify the Java™ Naming
and Directory Interface (JNDI) name for multiple EJB modules. Select
one or more EJB modules from the table, and select a JNDI name from
this list to configure the EJB modules with that JNDI name.
Set Authorization Type
Specify the authorization type for securing the data source.
Select one or more EJB modules from the table to set the authorization
type.
Select either Container or Application from the displayed
list. Container-managed authorization indicates that WebSphere® Application Server performs signon
to the data source. Application-managed authorization indicates that
the enterprise bean code performs signon.
Modify Resource Authentication Method
Specify the authorization type and the authentication method
for securing the data source. Select one or more EJB modules from
the table to modify the resource authentication method.
You can choose between the following authentication methods:
- None:
- Determine which data source configurations to designate with no
authentication method.
- Select the appropriate table rows.
- Select None from the list of authentication method options
that precede the table.
- Click Apply.
- Use default method (many-to-one mapping):
- Determine which data source configurations to designate with the WebSphere Application Server
DefaultPrincipalMapping login configuration. Apply this option to
each data source individually if you want to designate different authentication
data aliases. See the information center topic on J2EE Connector security
for more information on the default mapping configuration.
- Select the appropriate table rows.
- Select Use default method (many-to-one mapping) from
the list of authentication method options that precede the table.
- Select an authentication data entry or alias from the list.
- Click Apply.
- Use Kerberos authentication: Specifies
to use the Kerberos authentication method.
- Ensure that you have configured the Kerberos authentication mechanism
in the application server.
- Select the appropriate table row.
- Select Use Kerberos authentication from
the list of authentication method options that precede the table.
- Select an application login configuration from the list.
- Click Apply.
- To edit the properties of the custom login configuration, click Mapping
Properties in the table cell.
The application server will attempt to verify that you are connecting
to the correct type of database when you select this option.
- Use trusted connections (one-to-one mapping):
- Determine which data source configurations to designate with a
custom Java Authentication and
Authorization Service (JAAS) login configuration. See the information
center topic on J2EE Connector security for more information on custom
JAAS login configurations.
- Select the appropriate table row.
- Ensure that the database to which the modules will connect is
configured for trusted connections.
- Select Use trusted connections (one-to-one mapping) from
the list of authentication method options that precede the table.
- Select an application login configuration from the list.
- Click Apply.
The application server will attempt to verify that you are connecting
to the correct type of database when you select this option.
- Custom login configuration:
- Determine which data source configurations to designate with a
custom Java Authentication and
Authorization Service (JAAS) login configuration. See the information
center topic on J2EE Connector security for more information on custom
JAAS login configurations.
- Select the appropriate table row.
- Select Use custom login configuration from the list of
authentication method options that precede the table.
- Select an application login configuration from the list.
- Click Apply.
- To edit the properties of the custom login configuration, click Mapping
Properties in the table cell.
Select
Select the check boxes of the rows that you want to edit.
EJB
The name of an enterprise bean in the application.
EJB Module
The name of the module that contains the enterprise bean.
URI
Specifies location of the module relative to the root of
the application EAR file.
Target resource JNDI name
Specifies the resource to which the CMP bean is bound.
Resource authorization
Specifies the current setting for the resource authorization
type.
Modify this setting with Set authorization type.
|
