Documentation Home
> Sun GlassFish Enterprise Server v2.1.1 Administration Guide
Sun GlassFish Enterprise Server v2.1.1 Administration Guide
Book Information
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
V
Preface
Chapter 1 Enterprise Server Overview
Enterprise Server Overview and Concepts
Enterprise Server Overview
Tools for Administration
Admin Console
Command-line Interface (asadmin Utility)
JConsole
Enterprise Server Concepts
Domain
Domain Administration Server (DAS)
Usage Profiles
Cluster
Node Agent
Server Instance
Ports in the Enterprise Server
Basic Enterprise Server Commands
Creating a Domain
Deleting a Domain
Listing Domains
Starting the Domain
Starting the Default Domain on Windows
Stopping the Domain
Stopping the Default Domain on Windows
Restarting the Domain
Creating a Cluster
Starting a Cluster
Stopping a Cluster
Creating a Node Agent
Starting a Node Agent
Stopping a Node Agent
Starting an Instance
Stopping an Instance
Restarting an Instance
Recreating the Domain Administration Server
To migrate the DAS
Chapter 2 Java Business Integration
JBI Environment
JBI Components
Service Engines
Binding Components
JBI Component Loggers
Service Assemblies
Shared Libraries
JBI Descriptors
Chapter 3 JDBC Resources
JDBC Resources
JDBC Connection Pools
How JDBC Resources and Connection Pools Work Together
Setting Up Database Access
Working with JDBC Connection Pools
Creating a JDBC Connection Pool
Creating a JDBC Connection Pool and JDBC Resource Using the Admin Console
Creating a JDBC Connection Pool and JDBC Resource Using the CLI
Editing a JDBC Connection Pool
Editing JDBC Connection Pool Advanced Attributes
Configurations for Specific JDBC Drivers
Java DB Type 4 Driver
Sun GlassFish JDBC Driver for DB2 Databases
Sun GlassFish JDBC Driver for Oracle 8.1.7 and 9.x Databases
Sun GlassFish JDBC Driver for Microsoft SQL Server Databases
Sun GlassFish JDBC Driver for Sybase Databases
IBM DB2 8.1 Type 2 Driver
JConnect Type 4 Driver for Sybase ASE 12.5 Databases
MySQL Type 4 Driver
Inet Oraxo JDBC Driver for Oracle 8.1.7 and 9.x Databases
Inet Merlia JDBC Driver for Microsoft SQL Server Databases
Inet Sybelux JDBC Driver for Sybase Databases
Oracle Thin Type 4 Driver for Oracle 8.1.7 and 9.x Databases
OCI Oracle Type 2 Driver for Oracle 8.1.7 and 9.x Databases
IBM Informix Type 4 Driver
CloudScape 5.1 Type 4 Driver
Chapter 4 Configuring Java Message Service Resources
JMS Resources
The Relationship Between JMS Resources and Connector Resources
JMS Connection Factories
JMS Destination Resources
JMS Physical Destinations
Configuring JMS Provider Properties
Accessing Remote Servers
Foreign JMS Providers
Configuring the Generic Resource Adapter for JMS
Configuring the Generic Resource Adapter
Resource Adapter Properties
ManagedConnectionFactory Properties
Administered Object Resource Properties
Activation Spec Properties
Chapter 5 Configuring JavaMail Resources
Creating a JavaMail Session
Chapter 6 JNDI Resources
Java EE Naming Services
Naming References and Binding Information
Using Custom Resources
Using External JNDI Repositories and Resources
Chapter 7 Connector Resources
An Overview of Connectors
Managing Connector Connection Pools
To Create a Connector Connection Pool
To Edit a Connector Connection Pool
To Edit Connector Connection Pool Advanced Attributes
To Edit Connection Pool Properties
Managing Security Maps
To create security maps for connector connection pools
To Edit Security Maps for Connector Connection Pools
To Delete a Connector Connection Pool
To Set Up EIS Access
Managing Connector Resources
To Create a Connector Resource
To Edit a Connector Resource
To Delete a Connector Resource
To Configure the Connector Service
Managing Administered Object Resources
To Create an Administered Object Resource
To Edit an Administered Object Resource
To Delete an Administered Object Resource
Chapter 8 SIP, Web, and EJB Containers
The SIP Servlet Container
Editing the Properties of the SIP Container
Editing SIP Container Session Properties
Editing SIP Container Session Manager Properties
The Web Container
The EJB Container
Chapter 9 Configuring Security
Understanding Application and System Security
Tools for Managing Security
Managing Security of Passwords
Encrypting a Password in the domain.xml File
Protecting Files with Encoded Passwords
Changing the Master Password
Working with the Master Password and Keystores
Changing the Admin Password
About Authentication and Authorization
Authenticating Entities
Verifying Single Sign-On
Authorizing Users
Specifying JACC Providers
Auditing Authentication and Authorization Decisions
Configuring Message Security
Understanding Users, Groups, Roles, and Realms
Users
Groups
Roles
Realms
To Configure a JDBC Realm for a Web, EJB Application
Introduction to Certificates and SSL
About Digital Certificates
About Certificate Chains
About Secure Sockets Layer
About Ciphers
Using Name-based Virtual Hosts
About Firewalls
About Certificate Files
Changing the Location of Certificate Files
Using Java Secure Socket Extension (JSSE) Tools
Using the keytool Utility
Generating a Certificate Using the keytool Utility
Signing a Digital Certificate Using the keytool Utility
Deleting a Certificate Using the keytool Utility
Using Network Security Services (NSS) Tools
Using the certutil Utility
Importing and Exporting Certificates Using the pk12util Utility
Adding and Deleting PKCS11 Modules using modutil
Using Hardware Crypto Accelerator With Enterprise Server
About Configuring Hardware Crypto Accelerators
Configuring PKCS#11 Tokens
Passing Additional Passwords for a PKCS#11 Crypto Device
Managing Keys And Certificates
Listing Keys and Certificates
Working With Private Keys and Certificates
Configuring J2SE 5.0 PKCS#11 Providers
Chapter 10 Configuring Message Security
Overview of Message Security
Understanding Message Security in the Enterprise Server
Assigning Message Security Responsibilities
System Administrator
Application Deployer
Application Developer
About Security Tokens and Security Mechanisms
About Username Tokens
About Digital Signatures
About Encryption
About Message Protection Policies
Glossary of Message Security Terminology
Securing a Web Service
Configuring Application-Specific Web Services Security
Securing the Sample Application
Configuring the Enterprise Server for Message Security
Actions of Request and Response Policy Configurations
Configuring Other Security Facilities
After You Finish
Configuring a JCE Provider
Message Security Setup
Enabling Providers for Message Security
Configuring the Message Security Provider
Creating a Message Security Provider
Enabling Message Security for Application Clients
Setting the Request and Response Policy for the Application Client Configuration
Further Information
Chapter 11 Configuring the Diagnostic Service
What is the Diagnostic Framework?
Diagnostic Service Framework
Generating a Diagnostic Report
Chapter 12 Transactions
About Transactions
What is a Transaction?
Transactions in Java EE Technology
Workarounds for Specific Databases
Admin Console Tasks for Transactions
Configuring Transactions
To configure how the Enterprise Server recovers from transactions
To set a transaction timeout value
To set the location of the transaction logs
To set the keypoint interval
Chapter 13 Configuring the HTTP Service
Virtual Servers
HTTP Listeners
Chapter 14 Managing Web Services
Overview of Web Services
Web Services Standards
Java EE Web Service Standards
Deploying and Testing Web Services
Deploying Web Services
Viewing Deployed Web Services
Testing Web Services
Web Services Security
Using Web Services Registries
Adding a Registry
Publishing a Web Service to a Registry
Transforming Messages with XSLT Filters
Monitoring Web Services
Viewing Web Service Statistics
Monitoring Web Service Messages
Chapter 15 Configuring the Object Request Broker
An Overview of the Object Request Broker
CORBA
What is the ORB?
IIOP Listeners
Configuring the ORB
Managing IIOP Listeners
Chapter 16 Thread Pools
Working with Thread Pools
Chapter 17 Configuring Logging
About Logging
Log Records
Module Log Levels
Configuring Logging
Configuring General Logging Settings
Configuring Log Levels
Viewing Server Logs
Chapter 18 Monitoring Components and Services
About Monitoring
Monitoring in the Enterprise Server
Overview of Monitoring
The Tree Structure of Monitorable Objects
The Applications Tree
The HTTP Service Tree
The Resources Tree
The Connector Service Tree
The JMS Service Tree
The ORB Tree
The Thread Pool Tree
Statistics for Monitored Components and Services
EJB Container Statistics
Web Container Statistics
HTTP Service Statistics
JDBC Connection Pools Statistics
JMS/Connector Service Statistics
Statistics for Connection Managers in an ORB
Thread Pools Statistics
Transaction Service Statistics
Java Virtual Machine (JVM) Statistics
JVM Statistics in Java SE
Enabling and Disabling Monitoring
Configuring Monitoring Levels Using the Admin Console
To Configure Monitoring Levels Using asadmin
Viewing Monitoring Data
Viewing Monitoring Data in the Admin Console
Viewing Monitoring Data With the asadmin Tool
To Use the asadmin monitor Command to View Monitoring Data
To Use the asadmin get and list Commands to View Monitoring Data
Understanding and Specifying Dotted Names
Examples of the list and get Commands
Examples for the list --user admin-user --monitor Command
Example 1
Example 2
Examples for the get --user admin-user --monitor Command
Example 1
Example 2
Example 3
Example 4
To Use the PetStore Example
Expected Output for list and get Commands at All Levels
Using JConsole
Securing JConsole to Application Server Connection
Prerequisites for Connecting JConsole to Application Server
Connecting JConsole to Application Server
Connecting JConsole Securely to Application Server
Chapter 19 Configuring Management Rules
About Management Rules
Configuring Management Rules
Chapter 20 Java Virtual Machine and Advanced Settings
Tuning the JVM Settings
Configuring Advanced Settings
Appendix A Automatically Restarting a Domain or Node Agent
Restarting Automatically on Solaris 10
Restarting Automatically Using inittab on Solaris 9 and Linux Platforms
Restarting Automatically on the Microsoft Windows Platform
Creating a Windows Service
Preventing the Service From Shutting Down When a User Logs Out
Security for Automatic Restarts
Appendix B Dotted Name Attributes for domain.xml
Top Level Elements
Elements Not Aliased
Appendix C The asadmin Utility
The asadmin Utility
Common Options for Remote Commands
The Multimode Command
The Get, Set, and List Commands
Server Lifecycle Commands
List and Status Commands
Deployment Commands
Version Commands
Message Queue Administration Commands
Resource Management Commands
Configuration Commands
HTTP and IIOP Listener Commands
Lifecycle and Audit Module Commands
Profiler and SSL Commands
JVM Options and Virtual Server Commands
Threadpool and Auth-Realm Commands
Transaction and Timer Commands
Registry Commands
User Management Commands
Rules and Monitoring Commands
Database Commands
Diagnostic and Logging Commands
Web Service Commands
Security Service Commands
Password Commands
Verify Command
Custom MBean Commands
Service Command
Property Command
© 2010, Oracle Corporation and/or its affiliates