TABLE C–19
Web Service Commands
(Continued)
Command
Definition
delete-transformation-rule
Deletes an XSLT transformation rule of a given web service.
list-transformation-rules
Lists all the transformation rules of a given web service in the order
they are applied.
publish-to-registry
Publishes the web service artifacts to registries.
unpublish-from-registry
Unpublishes the web service artifacts from the registries.
list-registry-locations
Displays a list of configured web service registry access points.
Security Service Commands
These security commands are used to control the security mapping for the connector
connection pool. These commands are supported in remote mode only.
TABLE C–20
Security Commands
Command
Definition
create-connector-security-map
Creates a security map for the specified connector connection pool. If
the security map is not present, a new one is created. Also, use this
command to map the caller identity of the application (principal or
user group) to a suitable enterprise information system (EIS)
principal in container-managed transaction-based scenarios. One or
more named security maps may be associated with a connector
connection pool. The connector security map configuration supports
the use of the wild card asterisk (
*
) to indicate all users or all user
groups. For this command to succeed, you must have first created a
connector connection pool. The EIS is any system that holds the data
of an organization. It can be a mainframe, a messaging system, a
database system, or an application.
delete-connector-security-map
Deletes a security map for the specified connector connection pool.
update-connector-security-map
Modifies a security map for the specified connector connection pool.
list-connector-security-map
Lists the security maps belonging to the specified connector
connection pool.
create-message-security-provider
Enables administrators to create a
provider-config
sub-element for
the given message layer (
message-security-config
element of
domain.xml
, the file that specifies parameters and properties to the
Application Server).
Security Service Commands
Appendix C • The
asadmin
Utility
249
Содержание Sun GlassFish Enterprise Server 2.1
Страница 12: ...12 ...
Страница 13: ...Figures FIGURE 1 1 Enterprise Server Instance 29 FIGURE 9 1 RoleMapping 105 13 ...
Страница 14: ...14 ...
Страница 18: ...18 ...
Страница 38: ...38 ...
Страница 62: ...62 ...
Страница 96: ...96 ...
Страница 126: ...126 ...
Страница 160: ...160 ...
Страница 214: ...214 ...
Страница 218: ...218 ...
Страница 230: ...230 ...