Labels
- Apache (10)
- Articles (4)
- BPM Tools (5)
- Glassfish (16)
- Hadoop (10)
- HP ALM (6)
- HP SOA Systinet (14)
- Issues (19)
- JAVA (85)
- JBoss (16)
- jQuery (4)
- Load Runner (37)
- Quality Center (49)
- Testing (24)
- Tips and Tricks (16)
- Tomcat (4)
- Usefull Links (18)
- Weblogic (41)
- WebSphere (2)
Wednesday, March 27, 2013
How to Increasing the heap size (virtual memory) for JBoss in Quality Center
For Windows, you can increase the heap size by uninstalling/reinstalling the Quality Center Service and modifying the InstallJbossService.bat file. For Linux/Unix, you need to modify the run.sh file.
Tuesday, March 12, 2013
step by step how to Configure Apache Webserver with Weblogic Server
Step 1) Make
sure the Apache server runs on port 8080.( This is because sometimes
IIS, or some antivirus s/w runs on that port).This can be done by
modifying the httpd.conf present at
D:\Program Files\Apache Group\Apache2\conf
Modify the Listen port to 8080
D:\Program Files\Apache Group\Apache2\conf
Modify the Listen port to 8080
Listen 8080
Step 2) Copy the mod_wl_20.so from <bea_home>\wlserver_10.3\server\plugin\win\32 to
D:\Program Files\Apache Group\Apache2\modules
D:\Program Files\Apache Group\Apache2\modules
Step 3) Add these lines in the httpd.conf file
LoadModule weblogic_module modules/mod_wl_20.so
<Location />
SetHandler weblogic-handler
</Location>
SetHandler weblogic-handler
</Location>
<IfModule mod_weblogic.c>
WebLogicCluster localhost:7003,localhost:7005
Debug ON
WLLogFile c:/temp/wlproxy.log
WLTempDir c:/temp
</IfModule>
WebLogicCluster localhost:7003,localhost:7005
Debug ON
WLLogFile c:/temp/wlproxy.log
WLTempDir c:/temp
</IfModule>
Step 4) Restart Apache and access the application deployed on the Cluster using
http://localhost:8080/YourApp
This will forward the request to the Weblogic Cluster
Saturday, March 9, 2013
How to upgrade Java version from 1.6 to 1.7
Step 1: First download the tar file of java ( jre-7u5-linux-i586.tar.gz) using below URL
Step 3: Move extracted folder to /usr/lib/jvm
Step 5: Now choose the upgraded java version from :-
We have to select 4 for my system.. choose :- /usr/lib/jvm/jdk1.7.0_04/bin/java
Step 6: Now create a soft link:-
Step 7: Now check java version with the below command
Step 2: tar -zxvf /Path to 'jre-7u5-linux-i586.tar.gz'/
Step 3: Move extracted folder to /usr/lib/jvm
#sudo cp -r jre1.7.0_05 /usr/lib/jvm/
Step 4: Install java now
#sudo update-alternatives –install /usr/bin/java java /usr/lib/jvm/jre1.7.0_05/bin/java 3
#sudo update-alternatives –config java
We have to select 4 for my system.. choose :- /usr/lib/jvm/jdk1.7.0_04/bin/java
#sudo ln -s /usr/lib/jvm/jre1.7.0_05/lib/i386/libnpjp2.so ~/.mozilla/plugins/
Step 7: Now check java version with the below command
#sudo java -version
you should get 1.7 java version in the output.Tuesday, March 5, 2013
LDAP and how is it used by Weblogic server?
Lightweight Directory
Access Protocol (LDAP) is a protocol that programs use to look up
contact information from a server. Much like a relational database,
every LDAP database (or directory) has a schema. An LDAP schema is
implemented as a set of object class definitions and attribute
definitions.
Some common terms used in LDAP are:
For example:
This will return all the attributes of the user who has uid=fred as specified in the filter:
This entry is seen in the LDAP tree as the following:
dc=beasys,dc=com
/ (root) \
/ \
/ \
ou=people ou=otherusers
/
uid=fred
WLS can read and search information from an external directory server, giving it the right configuration information to connect, bind, search (base and filter), etc.
For this you need to configure the following fields in WLS:
When WLS needs to verify that a user exists and has privilege/role to access a resource, it connects to LDAP using the principal defined and then does a search on the user, verifies that it exists, and authenticates using its password. After that, it searches the groups the user belongs to.
Following is some concise pseudocode for the membership check algorithm:
Once this is done, WLS verifies if the user that belongs to the groups found has the privilege/role to access the resource requested, and based on that either permits the access or denies it.
Some common terms used in LDAP are:
- dc= domain component
- o = organization
- ou= organizational unit
- cn= common name
- dn= distinguished name
- uid= user id
For example:
ldapsearch -b "dc=beasys,dc=com" uid=fred
This will return all the attributes of the user who has uid=fred as specified in the filter:
uid=fred,ou=People, dc=beasys,dc=com //this is what is referred to as Full DN
objectClass=top
objectClass=person
objectClass=organizationalPerson
objectClass=inetorgperson
givenName=Fred
cn=Fred A
uid=fred
sn=A
creatorsName=uid=admin,ou=administrators,ou=topologymanagement,o=netscaperoot
modifiersName=uid=admin,ou=administrators,ou=topologymanagement,o=netscaperoot
createTimestamp=20040108160418Z
modifyTimestamp=20040108162837Z
This entry is seen in the LDAP tree as the following:
dc=beasys,dc=com
/ (root) \
/ \
/ \
ou=people ou=otherusers
/
uid=fred
WLS can read and search information from an external directory server, giving it the right configuration information to connect, bind, search (base and filter), etc.
For this you need to configure the following fields in WLS:
- LDAP server host and port
- Principal/password used to connect and make the search
- User Base DN: used as a base when making a user search
- User filter: used as a filter when making a user search
- Group Base DN: used as a base when making a group search
- Group filter: used as a filter when making a group search
- Group membership filter: used as a filter when doing a search to find groups a user belongs to
%u
is replaced by the user id%g
is replaced by the group%M
is replaced by the Full DN of the userWhen WLS needs to verify that a user exists and has privilege/role to access a resource, it connects to LDAP using the principal defined and then does a search on the user, verifies that it exists, and authenticates using its password. After that, it searches the groups the user belongs to.
Following is some concise pseudocode for the membership check algorithm:
check_membership(group g, principal p):
for each group g1 that contains p directly:
if g1 == g or check_membership(g, g1)
then return success
return failure
Once this is done, WLS verifies if the user that belongs to the groups found has the privilege/role to access the resource requested, and based on that either permits the access or denies it.
Common LDAP servers used in WLS
The common LDAP servers used in WLS (as authentication providers) are:- Default Authenticator (Embedded LDAP)
- IPlanet
- Active Directory
- OpenLDAP
- Novell
Subscribe to:
Posts (Atom)