8 Configuring Different URL’s on the Basis of Enterprise Roles
This topic provides information on Configuring Different URL’s on the Basis of Enterprise Roles.
To enable URL separation based on enterprise roles using custom
header name and value, the following queries needs to be executed in
DIGX_CFG_CONFIG_ALL_B table
INSERT INTO digx_cfg_config_all_b(PROP_ID, PROFILE, PROP_VALUE, ENTITY_SPECIFIC, EDITABLE, MANDATORY_OVERRIDE, PROPERTY_GROUP, CREATED_BY, CREATION_DATE, LAST_UPDATED_BY, LAST_UPDATED_DATE, OBJECT_VERSION_NUMBER, MODULE, SEQUENCE, VALIDATION, IS_ENUMERATED) VALUES ('SecurityConstants.IS_LOGIN_SEPARATION_ENABLED', 'DEV', 'true', 'N', 'N', 'N', null, 'SYSTEM', sysdate, 'SYS', sysdate, 1, 'sms', -1, '.*', 'N');This query enables the URL separation mechanism. By default the URL separation mechanism is not enabled.
INSERT INTO digx_cfg_config_all_b(PROP_ID, PROFILE, PROP_VALUE, ENTITY_SPECIFIC, EDITABLE, MANDATORY_OVERRIDE, PROPERTY_GROUP, CREATED_BY, CREATION_DATE, LAST_UPDATED_BY, LAST_UPDATED_DATE, OBJECT_VERSION_NUMBER, MODULE, SEQUENCE, VALIDATION, IS_ENUMERATED) VALUES ('SecurityConstants.LOGIN_HEADER_NAME', 'DEV', '<HEADER_NAME>', 'N', 'N', 'N', null, 'SYSTEM', sysdate, 'SYS', sysdate, 1, 'sms', -1, '.*', 'N');This query is used to provide entry for the custom header name.
INSERT INTO digx_cfg_config_all_b(PROP_ID, PROFILE, PROP_VALUE, ENTITY_SPECIFIC, EDITABLE, MANDATORY_OVERRIDE, PROPERTY_GROUP, CREATED_BY, CREATION_DATE, LAST_UPDATED_BY, LAST_UPDATED_DATE, OBJECT_VERSION_NUMBER, MODULE, SEQUENCE, VALIDATION, IS_ENUMERATED) VALUES ('SecurityConstants.<HEADER_NAME>', 'DEV', '<HEADER_VALUE>', 'N', 'N', 'N', null, 'SYSTEM', sysdate, 'SYS', sysdate, 1, 'sms', -1, '.*', 'N');This query is used for mapping the custom header name with its corresponding value.
INSERT INTO digx_cfg_config_all_b(PROP_ID, PROFILE, PROP_VALUE, ENTITY_SPECIFIC, EDITABLE, MANDATORY_OVERRIDE, PROPERTY_GROUP, CREATED_BY, CREATION_DATE, LAST_UPDATED_BY, LAST_UPDATED_DATE, OBJECT_VERSION_NUMBER, MODULE, SEQUENCE, VALIDATION, IS_ENUMERATED) VALUES ('SecurityConstants.<HEADER_VALUE>', 'DEV', '<ENTERPRISE_ROLE>', 'N', 'N', 'N', null, 'SYSTEM', sysdate, 'SYS', sysdate, 1, 'sms', -1, '.*', 'N');This query is used for mapping the custom header value with the enterprise role for which the URL separation has be to achieve.
In the above queries, <HEADER_NAME> field denotes the custom
header name, <HEADER_VALUE> denotes the custom header
value, and <ENTERPRISE_ROLE> field denotes the
enterprise role. These fields need to be replaced with own custom values
before executing the queries.
OHS Configuration:
To support it OHS need to send an additional header to Weblogic server. To enable this Implementer need to configure a new port and create a virtual host where that custom header is added in the request.
Sample snippet is below
Listen PORT_NO<VirtualHost *:PORT_NO >
RequestHeader add <HEADER_NAME> "<HEADER_VALUE> "
<Location /digx>
SetHandler weblogic-handler
WebLogicCluster WEBLOGIC_HOST:WEBLOGIC_PORT
</Location>
</VirtualHost>