Use this page to set the default data source mapping for EJB modules that contain 2.x container-managed persistence (CMP) beans. Unless you configure individual data sources for your 2.x CMP beans, this default mapping applies to all beans within the module.
To view this administrative console panel, click
.This panel displays a table that depicts the EJB modules in your application that contain 2.x CMP beans. Each table row corresponds to a module. A row shows the JNDI name of the data source mapping target of the EJB module only if you bound them together during application assembly. For every data source that is displayed, you see the corresponding security configuration.
Specifies the JNDI name to bind to one or more modules. Select one or more modules, click Set Multiple JNDI Names, and select the JNDI name for the resource to which you would like to bind the module.
Specifies the authorization type that you to use for the modules. Select one or more modules, click Set Authorization Type, and select the authorization type.
Specifies the resource authentication method for the modules that you have configured with container-managed authorization. Select one or more modules, click Modify Resource Authentication Method, and select the authentication method.
When selected, you will be directed to a panel on which you can specify extended properties that the module can use for the DB2 data source.
The application server will attempt to verify that you are connecting to the correct type of database when you select this option.
Select the check boxes of the rows you want to edit.
Specifies the name of the module that contains the 2.x enterprise beans.
Specifies the name of an enterprise bean that is contained by the module
Specifies location of the module relative to the root of the application EAR file.
Specifies the Java Naming and Directory Interface (JNDI) name of the default data source for the EJB module.
Information | Value |
---|---|
Data type | String |
Specifies the authorization type and the authentication method for securing the data source.