Creating a Security Map
A security map for a connector connection pool maps application users and groups (principals) to EIS principals. Use a security map when an application user needs to execute EIS operations that require a specific identity in the EIS.
To create a security map for a given connector connection pool, follow these steps.
- Expand the Resources node.
- Expand the Connectors node.
- Select the Connector Connection Pools node.
- Select a Connector Connection Pool by selecting its name from the list of current pools or create a new connector connection pool by selecting New from the list of current pools and following the instructions in "Creating a Connector Connection Pool".
- Select the Security Maps page.
- Click New to create a new Security Map.
- On the Create Security Map page, enter the following properties.
- Name – Enter a name to be used to reference this particular security map.
- User Groups – The caller identity of the application to be mapped to a suitable EIS principal. Enter a comma-separated list of application-specific user groups, or enter the wild card asterisk (*) to indicate all users or all user groups. Specify either the Principals or User Groups options, but not both.
- Principals – The caller identity of the application to be mapped to a suitable EIS principal. Enter a comma-separated list of application-specific principals, or enter the wild card asterisk (*) to indicate all principals. Specify either the Principals or User Groups options, but not both.
- In the Backend Principal section, enter the following properties.
- Username – Enter the EIS user name. The enterprise information system (EIS) is any system that holds the information. It can be a mainframe, a messaging system, a database system, or an application.
- Password – Enter the password for the EIS user.
- Click OK to create the security map or Cancel to quit without saving.
Equivalent asadmin
command: create-connector-security-map
See also:
Legal Notices