Default Settings

Contents

Overview

The Default Settings dialog enables you to set several global configuration settings to optimize the behavior of the Enterprise Gateway for your environment. You can overwrite these settings at the Process level by right-clicking the Process node in the Policy Studio tree, and selecting Settings -> Custom.

To configure the Default Settings, in the Policy Studio main menu, select Settings -> Settings -> Default Settings. This displays the Default Settings dialog. Alternatively, in the toolbar, click the drop-down option on the Settings button, and select Default Settings.

After changing any of the settings, you must deploy to the Enterprise Gateway for the changes to be enforced. You can do this in the Policy Studio main menu by selecting Settings -> Deploy. Alternatively, click the Deploy button in the toolbar, or press F6.

Settings

You can configure the following settings in the Default Settings dialog:
Setting Purpose
Active Timeout When the Enterprise Gateway receives a large HTTP request, it reads the request off the network when it becomes available. If the time between reading successive blocks of data exceeds the Active Timeout, the Enterprise Gateway closes the connection. This guards against a host closing the connection in the middle of sending data. For example, if the host's network connection is pulled out of the machine while in the middle of sending data to the Enterprise Gateway. When the Enterprise Gateway has read all the available data off the network, it waits the Active Timeout period of time before closing the connection.
Note:
You can configure this setting on a per-host basis using the Remote Hosts interface.
Administrator Role Configures a special system administrator role that provides protection for the specified role (a user with this role cannot remove themselves from this role). This ensures that there is always at least one user in the system with this role. By default, the configured Administrator Role allows access to all management services. Defaults to the Administrators role. For more details, see the Configuring Role-Based Access Control topic.
Date Format Configures the format of the date for the purposes of tracing, logging, and reporting. For more information, see http://java.sun.com/j2se/1.4.2/docs/api/java/text/SimpleDateFormat.html
Cache Refresh Interval Configures the number of seconds that the server caches data loaded from an external source (external database, LDAP directory, and so on) before refreshing the data from that source. The default value is 5 seconds. If you do not wish any caching to occur, set this value to 0.
Idle Timeout The Enterprise Gateway supports HTTP 1.1 persistent connections. The Idle Timeout is the time that the Enterprise Gateway waits after sending a message over a persistent connection before it closes the connection. Typically, the host tells the Enterprise Gateway that it wants to use a persistent connection. The Enterprise Gateway acknowledges this instruction and decides to keep the connection open for a certain amount of time after sending the message to the host. If the connection is not reused within the Idle Timeout period, the Enterprise Gateway closes the connection.
Note:
You can configure this setting on a per-host basis using the Remote Hosts interface.
LDAP Service Provider Specifies the service provider used for looking up an LDAP server (for example, com.sun.jndi.ldap.LdapCtxFactory). The provider is typically used to connect to LDAP directories for certificate and attribute retrieval.
Maximum Memory per Request The maximum amount of memory allocated to each request.
Note:
You can configure this setting on a per-host basis using the Remote Hosts interface.
Policy Director Process Connect Timeout When the Policy Director connects to a process to deploy or retrieve configuration, the connection fails if no activity happens on that connection for the duration specified by this setting (in seconds). The default is 300 seconds (5 minutes). Increase this setting if very large configurations are being deployed to the process, or configurations that may stall the process on initialization (for example, due to database timeout).
Policy Director Process Ping Connect Timeout If an attempt to connect to a known process to ping it stalls for greater than this configured time in seconds, the attempt is aborted. This time should always be configured to be less than the process ping interval. Defaults to 30 seconds.
Policy Director Process Ping Interval Specifies the polling interval in seconds for contacting each known process to check it is alive and retrieve its configuration status. Defaults to 60 seconds.
Policy Director User Session Timeout This setting logs out a Policy Director user if there is no activity in the specified time period in seconds. Defaults to 1800 seconds (30 minutes).
Send desired servername to server during TLS negotiation Specifies whether to add a field to outbound TLS/SSL calls that shows the name that the client used to connect. For example, this can be useful if the server handles several different domains, and needs to present different certificates depending on the name that the client used to connect.
Realm Specifies the realm for authentication purposes.
Schema Pool Size Sets the size of the Schema Parser pool.
Server Brand Specifies the branding to be used in the Enterprise Gateway.
LDAP Time Out The timeout in milliseconds for the LDAP connection. If a connection has not been created in this time frame, the operation times out. Similarly, if a lookup operation has not succeeded in this time frame, the operation fails. If this setting is not configured, or set to zero, the TCP timeout for the platform is used, which defaults to 3 minutes.
Token Drift Time The number of seconds drift allowed for WS-Security tokens. This is important in cases where the Enterprise Gateway is checking the date on incoming WS-Security tokens. It is likely that the machine on which the token was created is out-of-sync with the machine on which the Enterprise Gateway is running. The drift time allows for differences in the respective machine clock times.
Server's SSL cert's name must match name of requested server Ensures that the certificate presented by the server matches the name of the host address being connected to. This prevents host spoofing and man-in-the-middle attacks. This setting is enabled by default.
Use Validation on SAX Parsers Disabled by default for performance reasons. However, to perform SAX validation when parsing XML messages, you can select this setting.
Super User Role Configures a special system administrator role that has special privileges in the system, for example:
  • Add, delete, and update other users.
  • Reset user passwords.
  • Add another superuser.
  • Perform actions only allowed by a Configuration Profile owner (for example, transfer ownership to another user).
  • Perform actions only allowed by a Process owner (for example, deploy a new Configuration Profile to a Process owned by another user).
Defaults to the Administrators role. This means that the default admin user has the PD superuser privilege, and it cannot delete itself. However, you can also separate the PD superuser privilege from the Administrators role. For more details, see the Configuring Role-Based Access Control topic.
Trace Level Enables you to set the trace level for the Enterprise Gateway at runtime. Select the appropriate option from the Trace Level drop-down list.