You can use the Jython or Jacl scripting language to delete a custom application or system policy set binding from your configuration. You cannot delete cell-level default bindings.
Before you use the commands in this topic, verify that you are using the most recent version of the wsadmin tool. The policy set management commands that accept a properties object as the value for the attributes or bindingLocation parameters are not supported on previous versions of the wsadmin tool. For example, the commands do not run on a Version 6.1.0.x node.
Administrative role | Authorization |
---|---|
Administrator | The Administrator role must have cell-wide access to modify bindings. If you have access to a specific resource only, you can modify bindings for the resource for which you have access. |
Configurator | The Configurator role cannot modify bindings. |
Deployer | The Deployer role cannot modify bindings. |
Operator | The Operator role cannot modify bindings. |
Monitor | The Monitor role cannot modify bindings. |
Policy set bindings specify the details about how your quality of service (QoS) is configured. For example, a policy set attachment determines that sign, encrypt, or reliable messaging is enabled. The policy set binding specifies how the protection is configured, for example, the path of the keystore file, the class name of the token generator, or the Java Authentication and Authorization Service (JAAS) configuration name.
For application policy sets, policy set bindings exist at the cell-level and server-level using default binding configurations, or at the application level using application-specific binding configurations. You can also specify cell-level general bindings. For system policy sets, bindings exist at the cell level and server level, or you can create application-specific bindings.
Use the following procedure to delete application-specific bindings for trust policy sets and application level bindings for application policy sets:
The application-specific binding of interest is removed from your configuration.
In this information ...Related tasks
Related reference
| IBM Redbooks, demos, education, and more(Index) |