User guide
Single Sign-on Operator's Guide: Table of Contents
viii
Stopping an Authentication Server.............................................................................................4-6
Stopping a Repository Server....................................................................................................4-6
Stopping a Repository Server...............................................................................................4-6
Stopping an SSO Repository................................................................................................4-6
Changing Environment Settings .....................................................................................................4-7
Changing the Environment Settings of Repository Server, Authentication Server and Business
Server.........................................................................................................................................4-7
Changing Effective User for Web Server...................................................................................4-8
User Related Operation ................................................................................................................4-10
Adding a User ..........................................................................................................................4-10
Deleting a User ........................................................................................................................4-10
Amending the Role of a User...................................................................................................4-11
Changing User Passwords ......................................................................................................4-11
Taking Corrective Action if the User Password is Forgotten....................................................4-11
Canceling Lockout ...................................................................................................................4-11
Checking User Lock Status......................................................................................................4-12
Checking and Changing User Validity Period..........................................................................4-12
Authorization-related Operation....................................................................................................4-13
Amending Role Configurations................................................................................................4-13
Amending Protection Resource...............................................................................................4-14
Maintenance Using Access Logs..................................................................................................4-16
Access Log of Repository server.............................................................................................4-16
Access Log of Authentication Server.......................................................................................4-18
Access Log of Business Server...............................................................................................4-20
Operating Notes for Large Systems .............................................................................................4-22
Chapter 5 Single Sign-on Customization
Customizing Messages Displayed on a Web Browser...................................................................5-2
Messages that Can be Customized...........................................................................................5-2
Messages Displayed for Form Authentication ......................................................................5-2
Authentication Error Messages ............................................................................................5-5
Authorization Error Messages ..............................................................................................5-7
Customizing a Message ............................................................................................................5-8
Setting Access Authority for a Message File ...........................................................................5-11
Access Authorization for the Message File Output at Form Authentication .......................5-12
Access Authority for the Authentication Error Message File...............................................5-12
Access Authority for the Authorization Error Message File ................................................5-12
Authentication Form Tag Specifications...................................................................................5-14
Service Linkage with SSO Repository ..........................................................................................5-16