User guide

Single Sign-on Operator’s Guide - Index
Index-3
authentication, 1-15
authentication form tag specifications, 5-14
authentication infrastructure, 1-7
authentication server access log, 4-18
authorization, 1-35
authorization-related operation, 4-13
basic system configuration, 1-6
business server access log, 4-20
business system, 1-11
canceling lockout, 4-11
cancelling service dependency, 5-17
changing environment settings, 4-7
changing user passwords, 4-11
checking and changing user validity period, 4-12
checking user lock status, 4-12
choosing URLs, 1-57
client, 1-13
customization, 5-1
customizing authentication error messages, 5-5
customizing authorization error messages, 5-7
customizing messages, 5-8
customizing messages displayed for form
authentication, 5-2
customizing messages displayed on web browser,
5-2
deleting users, 4-10
effects of, 1-4
high-performance and high-reliability system, 1-42
implementation method, 1-5
increased system availability, 1-44
installing a business server in Microsoft Internet
Information Services, 3-18
integrating into InfoProvider Pro, 3-12
integrating into Interstage HTTP Server, 3-12
integrating into Sun ONE Web Server Enterprise
Edition 4.1, 3-13
integrating into Sun ONE Web Server Enterprise
Edition 6.0, 3-15
linkage with Interstage Security Director, 1-49
linkage with SSL Accelerator, 1-47
linkage with Web applications, 1-56
load balancing, 1-42
maintenance using access logs, 4-16
operating notes for large systems, 4-22
operation and maintenance, 4-1
overview, 1-1
repository server access log, 4-16
secure operation, 2-89
service linkage with SSO repository, 5-16
setting access authority for message files, 5-11
setting service dependency, 5-16
starting, 4-2
stopping, 4-5
user related operation, 4-10
using a firewall, 2-91
using IPsec, 2-89
IPsec
using, 2-89
Java applications
calling LoginContext login method, 7-11
converting CallbackHandler to an instance, 7-10
converting LoginContext to an instance, 7-11
creating login configuration file, 7-19
creating security policy file, 7-22
creating trust store file, 7-27
developing, 7-2
developing programs, 7-7
exceptions and exception handling, 7-31
executing, 7-34
executing authorization, 7-14
obtaining service ID file, 7-19
obtaining user information, 7-12
program development flow, 7-3
registering protection resources, 7-31
sample code, 7-38
setting access permission for operation resources,
7-29
setting environment variables, 7-16
setting execution environment, 7-16
setting user information report, 7-56
supported JAAS functions, 7-2
large systems
operating notes for, 4-22
LDIF file
using, 2-28
load balancing, 1-42
setting up business servers for, 3-10
load distribution
adding authentication server for, 2-76