User guide
Single Sign-on Operator's Guide - Table of Contents
ix
Setting the Service Dependency .............................................................................................5-16
Canceling the Service Dependency ........................................................................................5-17
Chapter 6 Troubleshooting
Error Handling.................................................................................................................................6-2
Error Investigation and Corrective Action ..................................................................................6-2
Log output destination ...............................................................................................................6-3
Examples of Errors .........................................................................................................................6-5
Errors that can be encountered while using the Smart Repository Replication Function .........6-5
Errors in Authentication..............................................................................................................6-5
Errors in Business Server Authentication ..................................................................................6-7
Errors in the Interstage Management Console..........................................................................6-7
Chapter 7 Developing Applications
Developing Java Applications .........................................................................................................7-2
Program Development Flow ......................................................................................................7-3
Servlet Application that Receives Authentication Information from a Client.........................7-3
Java Application that Receives User ID/Password from a Client for Authentication............7-5
Developing Programs ................................................................................................................7-7
Converting CallbackHandler to an Instance.......................................................................7-10
Converting LoginContext to an Instance ............................................................................7-11
Calling LoginContext Login Method....................................................................................7-11
Obtaining User Information.................................................................................................7-12
Executing Authorization ......................................................................................................7-14
Setting the Application Execution Environment.......................................................................7-16
Setting Environment Variables ...........................................................................................7-16
Obtaining Service ID File....................................................................................................7-19
Creating Login Configuration File.......................................................................................7-19
Creating a Security Policy File............................................................................................7-22
Creating a Trust Store File..................................................................................................7-27
Setting Access Permission for Operation Resources.........................................................7-29
Registering Protection Resources......................................................................................7-31
Exceptions and Exception Handling...................................................................................7-31
Executing Applications.............................................................................................................7-34
Sample Code ...........................................................................................................................7-38
Servlet Application ..............................................................................................................7-38
Application that Uses a User ID/Password for Authentication and Authorization ..............7-46
Setting User Information Report with Environment Variables.......................................................7-56