beautypg.com

Security service commands, Table c–20, Security commands – Sun Microsystems GLASSFISH ENTERPRISE 820433510 User Manual

Page 249

background image

TABLE C–19

Web Service Commands

(Continued)

Command

Definition

delete-transformation-rule

Deletes an XSLT transformation rule of a given web service.

list-transformation-rules

Lists all the transformation rules of a given web service in the order
they are applied.

publish-to-registry

Publishes the web service artifacts to registries.

unpublish-from-registry

Unpublishes the web service artifacts from the registries.

list-registry-locations

Displays a list of configured web service registry access points.

Security Service Commands

These security commands are used to control the security mapping for the connector
connection pool. These commands are supported in remote mode only.

TABLE C–20

Security Commands

Command

Definition

create-connector-security-map

Creates a security map for the specified connector connection pool. If
the security map is not present, a new one is created. Also, use this
command to map the caller identity of the application (principal or
user group) to a suitable enterprise information system (EIS)
principal in container-managed transaction-based scenarios. One or
more named security maps may be associated with a connector
connection pool. The connector security map configuration supports
the use of the wild card asterisk (*) to indicate all users or all user
groups. For this command to succeed, you must have first created a
connector connection pool. The EIS is any system that holds the data
of an organization. It can be a mainframe, a messaging system, a
database system, or an application.

delete-connector-security-map

Deletes a security map for the specified connector connection pool.

update-connector-security-map

Modifies a security map for the specified connector connection pool.

list-connector-security-map

Lists the security maps belonging to the specified connector
connection pool.

create-message-security-provider

Enables administrators to create a provider-config sub-element for
the given message layer (message-security-config element of
domain.xml

, the file that specifies parameters and properties to the

Application Server).

Security Service Commands

Appendix C • The asadmin Utility

249