Security

Use the Security page to provide the security settings for the resource adapter. First, specify the to be used by the resource adapter. If any Security Permissions are required other than the default set specified in the Connector Specification, list them and provide a description explaining why they are required.
  1. Select the authentication mechanism(s) to be used with the resource adapter in the Authentication Mechanisms pane. One or more of the following may be checked: If you do not select one, no standard security authentication is supported as part of the security contract.
  2. Select Reauthentication Supported if the resource adapter supports performing reauthentication on an existing physical connection. Reauthentication is performed when an application server calls getConnection with a new .
  3. In the Security Permissions panel, Click Add to enter a security permission that your resource adapter needs to access system resources in your operational environment. You need to specify only those permissions that are not included in the default set (see section 11.2 of the Connector specification). For example, this security permission allows the resource adapter to look up the name of any remote host:
    permission java.net.SocketPermission *, "resolve";
  4. You can click the folded paper icon to enter a description for the permission.
  5. To delete a security permission, select the permission in the table and click Delete.


Legal Notices