Use the create-connector-work-security-map subcommand in remote mode to map the caller identity of the work submitted by the connector module (resource adapter) EIS principal or EIS user group to a suitable principal or user group in the GlassFish Server security domain. One or more work security maps can be associated with a connector module.
The connector security map configuration supports the use of the wild card asterisk (*) to indicate all users or all user groups.
Before creating a connector work security map, you must first create a connector connection pool. For instructions, see To Create a Connector Connection Pool.
Ensure that the server is running.
Remote subcommands require a running server.
Create the connector work security map by using the create-connector-work-security-map(1) subcommand.
Information about properties for the subcommand is included in this help page.
(Optional) If needed, restart the server.
The following examples create workSecurityMap1 and workSecurityMap2 for my-resource-adapter-name.
asadmin> create-connector-work-security-map --raname my-resource-adapter-name --principalsmap eis-principal-1=server-principal-1,eis-principal-2=server-principal-2, eis-principal-3=server-principal-1 workSecurityMap1
asadmin> create-connector-work-security-map --raname my-resource-adapter-name --groupsmap eis-group-1=server-group-1,eis-group-2=server-group-2, eis-group-3=server-group-1 workSecurityMap2 Command create-connector-work-security-map executed successfully
You can also view the full syntax and options of the subcommand by typing asadmin help create-connector-work-security-map at the command line.