web server - Borland Technical Publications

web server - Borland Technical Publications web server - Borland Technical Publications

techpubs.borland.com
from techpubs.borland.com More from this publisher
12.11.2014 Views

Connection management Configuring connection properties The following connection pool properties can be set: Property Value type Description Default wait-timeout Integer The number of seconds to wait for a free connection when maximumcapacity connections are already opened. When using the maximumcapacity property and the pool is at its max and can't serve any more connections, the threads looking for connections end up waiting for the connection(s) to become available for a long time if the wait time is unbounded (set to 0 seconds). You can set the wait-timeout period to suit your needs. 30 busy-timeout Integer The number of seconds to wait before a busy connection is released. If a connection is busy for a long time, the application using it may have hung and be unable to release the connection. This timeout will ensure that connections will be timed out when they have been busy for much longer than necessary. idle-timeout Integer A pooled connection remaining in an idle state for a period of time longer than this timeout value should be closed to conserve resources. All idle connections are checked for idle-timeout expiration every 60 seconds. The value of the idletimeout is given in seconds. A value of 0 (zero) indicates that connection cleanup is disabled. maximum-capacity Integer Identifies the maximum number of managed connections which VisiConnect will allow. Throws ResourceAllocationException when requests for newly allocated managed connections go beyond this limit. The following properties are no longer used and are now ignored by VisiConnect. They are replaced in BES 6.5 by the pool properties busy-timeout, idle-timeout, and waittimeout, listed in the table above. You do not have to delete the old-style properties from ra-borland.xml, but they will no longer have any effect. Unused Pool properties 600 (ten minutes) 600 (ten minutes) 10 Table 27.1 Unused pool properties Property Default Description initial-capacity 1 Identifies the initial number of managed connections which VisiConnect will attempt to obtain during deployment. capacity-delta 1 Identifies the number of additional managed connections which the VisiConnect will attempt to obtain during resizing of the maintained connection pool. Chapter 27: Using VisiConnect 259

Security management with the Security Map Table 27.1 Unused pool properties (continued) Property Default Description cleanup-enabled true Indicates whether or not the Connection Pool should have unused Managed Connections reclaimed as a means to control system resources. cleanup-delta 1 Identifies the amount of time the Connection Pool Management will wait between attempts to reclaim unused Managed Connections. Security management with the Security Map The Security Map enables the definition of user roles that can be 1 Used directly with the EIS for container-managed sign-on (use-caller-identity). 2 Mapped to an appropriate resource role for container-managed sign-on (run-as). In the first case, when the user role identified at run time is found in the mapping, the user role itself is used to provide security information for interacting with an EIS. In the second case, when the user role identified at run time is found in the mapping, the associated resource role is used to provide security information for interacting with an EIS. The use-caller-identity option is used when user identities in the user role identified at run time are available to the EIS as well. For example, a user identity, “borland”/ ”borland”, belonging to role “Borland”, is available to the Borland Enterprise Server, and the available EIS, a JDataStore database, has an identity of “borland”/”borland” available to it. When a Resource Adapter serving JDataStore is deployed with a Security Map specifying: Borland Applications on this server instance which use this JDataStore database can use usecaller-identity to access it. Note: Due to a limitation currently in VisiSecure, you must define the caller identity in the resource vault as well as the user vault. The run-as option is used when it makes sense to map user identities in the user role identified at run time to identities in the EIS. For example, a user identity, “demo”/ ”demo”, belonging to role “Demo”, is available to the Borland Enterprise Server, and the available EIS, an Oracle database, has an identity of “scott”/”tiger”, which is ideal for a demo user. When a Resource Adapter serving Oracle is deployed with a Security Map specifying: Demo oracle_demo Oracle demo role The role oracle_demo is defined in the resource vault (see below), applications on this server instance which use this Oracle database can use run-as to access it. When run-as is used, the vault must be provided for VisiConnect to use to extract the security information for the resource role. A resource role name and a set of credentials are written to this vault. When VisiConnect loads a Resource Adapter with a defined Security Map using run-as, it will read in the credentials for the defined role name(s) from the vault. 260 BES Developer’s Guide

Security management with the Security Map<br />

Table 27.1<br />

Unused pool properties (continued)<br />

Property Default Description<br />

cleanup-enabled true Indicates whether or not the Connection Pool<br />

should have unused Managed Connections<br />

reclaimed as a means to control system resources.<br />

cleanup-delta 1 Identifies the amount of time the Connection Pool<br />

Management will wait between attempts to reclaim<br />

unused Managed Connections.<br />

Security management with the Security Map<br />

The Security Map enables the definition of user roles that can be<br />

1 Used directly with the EIS for container-managed sign-on (use-caller-identity).<br />

2 Mapped to an appropriate resource role for container-managed sign-on (run-as).<br />

In the first case, when the user role identified at run time is found in the mapping, the<br />

user role itself is used to provide security information for interacting with an EIS. In the<br />

second case, when the user role identified at run time is found in the mapping, the<br />

associated resource role is used to provide security information for interacting with an<br />

EIS.<br />

The use-caller-identity option is used when user identities in the user role identified at<br />

run time are available to the EIS as well. For example, a user identity, “borland”/<br />

”borland”, belonging to role “<strong>Borland</strong>”, is available to the <strong>Borland</strong> Enterprise Server,<br />

and the available EIS, a JDataStore database, has an identity of “borland”/”borland”<br />

available to it. When a Resource Adapter serving JDataStore is deployed with a<br />

Security Map specifying:<br />

<br />

<strong>Borland</strong><br />

<br />

<br />

Applications on this <strong>server</strong> instance which use this JDataStore database can use usecaller-identity<br />

to access it. Note: Due to a limitation currently in VisiSecure, you must<br />

define the caller identity in the resource vault as well as the user vault.<br />

The run-as option is used when it makes sense to map user identities in the user role<br />

identified at run time to identities in the EIS. For example, a user identity, “demo”/<br />

”demo”, belonging to role “Demo”, is available to the <strong>Borland</strong> Enterprise Server, and<br />

the available EIS, an Oracle database, has an identity of “scott”/”tiger”, which is ideal<br />

for a demo user. When a Resource Adapter serving Oracle is deployed with a Security<br />

Map specifying:<br />

<br />

Demo<br />

<br />

oracle_demo<br />

Oracle demo role<br />

<br />

<br />

The role oracle_demo is defined in the resource vault (see below), applications on this<br />

<strong>server</strong> instance which use this Oracle database can use run-as to access it.<br />

When run-as is used, the vault must be provided for VisiConnect to use to extract the<br />

security information for the resource role. A resource role name and a set of credentials<br />

are written to this vault. When VisiConnect loads a Resource Adapter with a defined<br />

Security Map using run-as, it will read in the credentials for the defined role name(s)<br />

from the vault.<br />

260 BES Developer’s Guide

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!