File name: udat_mapdds2xcmp.html
Map data sources for all 2.x CMP beans
Use this page to set the default data source mapping for EJB modules
that contain 2.x container-managed persistence (CMP) beans. Unless you configure
individual data sources for your 2.x CMP beans, this default mapping applies
to all beans within the module.
To view this administrative console panel, click .
This panel displays a table that depicts the EJB modules in your application
that contain 2.x CMP beans. Each table row corresponds to a module. A row
shows the JNDI name of the data source mapping target of the EJB module only
if you bound them together during application assembly. For every data source
that is displayed, you see the corresponding security configuration.
Set Multiple JNDI Names
Specifies the JNDI name to bind to one or more modules. Select
one or more modules, click Set Multiple JNDI Names,
and select the JNDI name for the resource to which you would like to bind
the module.
Set Authorization Type
Specifies the authorization type that you to use for the modules.
Select one or more modules, click Set Authorization Type,
and select the authorization type.
You can choose:
- Per application - indicates that the enterprise bean code performs signon.
- Container - indicates that the application server performs signon to the
data source.
Modify Resource Authentication Method
Specifies the resource authentication method for the modules that
you have configured with container-managed authorization. Select one or more
modules, click Modify Resource Authentication Method,
and select the authentication method.
You can choose between the following authentication methods:
- None:
- Determine which data source configurations to designate with no authentication
method.
- Select the appropriate table rows.
- Select None from the list of authentication method options that
precede the table.
- Click Apply.
- Use default method (many-to-one mapping):
- Determine which data source configurations to designate with the WebSphere® Application
Server DefaultPrincipalMapping login configuration. Apply this option to each
data source individually if you want to designate different authentication
data aliases. See the information center topic on J2EE Connector security
for more information on the default mapping configuration.
- Select the appropriate table rows.
- Select Use default method (many-to-one mapping) from
the list of authentication method options that precede the table.
- Select an authentication data entry or alias from the list.
- Click Apply.
- Use Kerberos authentication: Specifies to use the
Kerberos authentication method.
- Ensure that you have configured the Kerberos authentication mechanism
in the application server.
- Select the appropriate table row.
- Select Use Kerberos authentication from the list
of authentication method options that precede the table.
- Select an application login configuration from the list.
- Click Apply.
- To edit the properties of the custom login configuration, click Mapping
Properties in the table cell.
The application server will attempt to verify that you are connecting
to the correct type of database when you select this option.
- Use trusted connections (one-to-one mapping):
- Determine which data source configurations to designate with a custom Java Authentication
and Authorization Service (JAAS) login configuration. See the information
center topic on J2EE Connector security for more information on custom JAAS
login configurations.
- Select the appropriate table row.
- Ensure that the database to which the modules will connect is configured
for trusted connections.
- Select Use trusted connections (one-to-one mapping) from
the list of authentication method options that precede the table.
- Select an application login configuration from the list.
- Click Apply.
The application server will attempt to verify that you are connecting
to the correct type of database when you select this option.
- Custom login configuration:
- Determine which data source configurations to designate with a custom Java Authentication
and Authorization Service (JAAS) login configuration. See the information
center topic on J2EE Connector security for more information on custom JAAS
login configurations.
- Select the appropriate table row.
- Select Use custom login configuration from the list of authentication
method options that precede the table.
- Select an application login configuration from the list.
- Click Apply.
- To edit the properties of the custom login configuration, click Mapping
Properties in the table cell.
Select
Select the check boxes of the rows you want to edit.
EJB Module
Specifies the name of the module that contains the 2.x enterprise
beans.
URI
Specifies location of the module relative to the root of the application
EAR file.
JNDI name
Specifies the Java Naming and Directory Interface (JNDI)
name of the default data source for the EJB module.
Resource authorization
Specifies the authorization type and the authentication method
for securing the data source.
Extended Datasource Properties
When selected, you will be directed to a panel on which you can
specify extended properties that the module can use for the DB2 data source.
The application server will attempt to verify that you are connecting to
the correct type of database when you select this option.
|
