IBM WebSphere Application Server 8.0 Administration Guide
Table of Contents
Copyright
Credits
About the Author
Acknowledgement
About the Reviewers
www.PacktPub.com
Support files, eBooks, discount offers and more
Why Subscribe?
Free Access for Packt account holders
Instant Updates on New Packt Books
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Downloading the example code
Errata
Piracy
Questions
1. WebSphere Application Server 8.0: Product Overview
What is WebSphere Application Server?
Why choose IBM WebSphere Application Server?
Enhancements and capabilities
Support for industry standards
New features
Reference table for supported standards
Architecture and internals
JEE 6 Server architecture model
Java EE containers
Applet container
Web container
EJB container
Application client container
Inside WebSphere Application Server
JVM
Web container
EJB container
Virtual hosts
Environment settings
Resources
JNDI
Application file types
WebSphere Application Server terminology
Runtime binaries
Profiles
Cells
Nodes
Servers
WebSphere Application Server products
Product editions
Related Product editions
Supported OS
Summary
2. Installing WebSphere Application Server
Installation planning
Installation scenarios
Profile types
Preparation and prerequisites
Windows installation prerequisites
Linux installation prerequisites
Installing as root on Linux
Filesystem preparation for Linux
Graphical installation
Part 1âInstalling the base binaries
Downloading WAS 8
Downloading IBM Installation Manager
Installing IIM
Installing WAS using IBM Installation Manager
Verifying the installed binaries
Installation logs
Agent data location
Part 2âCreating a WAS profile
First steps console
Profile Manager Tools (PMT) logs and files
Logs
Files
Administrative console
Uninstalling WAS
Manually deleting profiles
Uninstalling WAS using IIM
Uninstalling WAS using command line
Silent installation
Installing packages silently using Installation Manager
Recording a response file
Command-line options for recording
Running a recording
Installing in silent mode using a response file
Command-line options for installing
Running the silent install
Silent profile creation
Summary
3. Deploying your Applications
Deploying an application
Starting and stopping your applications
Data access applications
Data sources
Preparing for Oracle
Installing Oracle XE
JDBC providers
Creating a JDBC provider
Creating a J2C alias
Creating a data source
Deploying a data access application
Mapping modules to servers
Providing JSP reloading options for web modules
Mapping shared libraries
Mapping resource references to resources
Mapping virtual hosts for web modules
Mapping context roots for web modules
Reviewing the deployment steps
Using the application
Overview of Derby
Derby JDBC
Managing Derby
Starting Derby
Stopping Derby
Creating tables in Derby
Adding a Derby JDBC data source
Creating a Derby JDBC provider
Creating a Derby JDBC data source
Creating a new JAAS for Derby data source
Changing an application's data source
Business-level applications
Importing assets
Creating a BLA
Monitored deployments
Uninstalling the DefaultApplication.ear file
Global deployment settings
The MonitoredDeployableApps folder structure
Drag and drop deploy
Controlling monitored deployments
Creating a template properties file
Summary
4. Security
JEE security
Global security
Global security registry types
Turning on global security
Local operating system
Creating a Linux user and group
Creating a Windows user
Completing the security wizard
Standalone LDAP
Sample directory tree
LDAP object classes
Configuring an LDAP registry in WebSphere
LDAP security settings
Security.xml
Administrative roles
Mapping users and groups to administrative roles
Federated repositories
Adding new users to a realm
Security domains
Security domain attributes
Creating a security domain
Preparing a local operating system registry
Creating a security domain
LTPA overview
LTPA configuration
Steps for importing and exporting LTPA keys
Managing SSL
Certificates and Certificate Authorities
Key stores and trust stores
Managing Key stores and certificates
Chained certificates
Monitoring certificate expiration
Creating certificate requests
Receiving a certificate request
Setting Cell or Node SSL aliases
Summary
5. Administrative Scripting
Automation
The ws_ant tool
Uninstalling the HR application
Deploying an application using ws_ant
Managing an application using ws_ant
The wsadmin tool
Interactive commands
Individual commands
Linux command-line example
Windows command-line exampl...