Package com.sun.enterprise.security.cli


package com.sun.enterprise.security.cli
  • Classes
    Class
    Description
    Change Admin Password Command Usage: change-admin-password [--user admin_user] [--terse=false] [--echo=false] [--host localhost] [--port 4848|4849] [--secure | -s]
     
    Create Audit Module Command Usage: create-audit-module --classname classnme [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] [--property (name=value) [:name=value]*] [--target target(Default server)] audit_module_name domain.xml element example invalid input: '<'audit-module classname="com.foo.security.Audit" name="AM"> invalid input: '<'/audit-module>
    CLI command to create JACC Provider Usage: create-auth-realm --classname realm_class [--terse=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] [--property (name=value)[:name=value]*] [--echo=false] [--target target(Default server)] auth_realm_name domain.xml element example invalid input: '<'auth-realm name="file" classname="com.sun.enterprise.security.auth.realm.file.FileRealm"> invalid input: '<'/auth-realm> Or invalid input: '<'auth-realm name="certificate" classname="com.sun.enterprise.security.auth.realm.certificate.CertificateRealm"> invalid input: '<'/auth-realm>
    Create File User Command Usage: create-file-user [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--userpassword admin_passwd] [--passwordfile file_name] [--groups user_groups[:user_groups]*] [--authrealmname authrealm_name] [--target target(Default server)] username
    Create Jacc Provider Command Usage: create-jacc-provider --policyconfigfactoryclass pc_factory_class --policyproviderclass pol_provider_class [--help] [--user admin_user] [--passwordfile file_name] [ --property (name=value)[:name=value]*] [ --target target_name] jacc_provider_name domain.xml element example invalid input: '<'jacc-provider policy-provider="org.glassfish.exousia.modules.locked.SimplePolicyProvider" name="default" policy-configuration-factory-provider="org.glassfish.exousia.modules.locked.SimplePolicyConfigurationFactory"> invalid input: '<'/jacc-provider>
    Create Message Security Provider Command Usage: create-message-security-provider [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] [--target target(Default server)] [--layer message_layer=SOAP] [--providertype provider_type] [--requestauthsource request_auth_source] [--requestauthrecipient request_auth_recipient] [--responseauthsource response_auth_source] [--responseauthrecipient response_auth_recipient] [--isdefaultprovider] [--property (name=value)[:name=value]*] --classname provider_class provider_name domain.xml element example invalid input: '<'message-security-config auth-layer="SOAP"> invalid input: '<'provider-config class-name="com.sun.wss.provider.ClientSecAuthModule" provider-id="XWS_ClientProvider" provider-type= "client"> invalid input: '<'request-policy auth-source="content"/> invalid input: '<'response-policy auth-source="content"/> invalid input: '<'/provider-config> invalid input: '<'/message-security-config>
    Create Password Alias Command Usage: create-password-alias [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] aliasname Result of the command is that: invalid input: '<'domain-dir>/invalid input: '<'domain-name>/config/domain-passwords file gets appended with the entry of the form: aliasname= A user can use this aliased password now in setting passwords in domain.xml.
    Delete Audit Module Command Usage: delete-audit-module [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] [--target target(Default server)] auth_realm_name
    Delete Auth Realm Command Usage: delete-auth-realm [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] [--target target(Default server)] auth_realm_name
    Delete File User Command Usage: delete-file-user [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] [--authrealmname authrealm_name] [--target target(Default server)] username
    Usage: delete-jacc-provider [--help] [--user admin_user] [--passwordfile file_name] [ --target target_name] jacc_provider_name
    Delete Message Security Provider Command Usage: delete-message-security-provider --layer message_layer [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] [--target target(Defaultserver)] provider_name
    Delete Password Alias Command Usage: delete-password-alias [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] aliasname Result of the command is that: The entry of the form: aliasname=invalid input: '<'password-encrypted-with-masterpassword> in invalid input: '<'domain-dir>/invalid input: '<'domain-name>/config/domain-passwords file is removed domain.xml example entry is: invalid input: '<'provider-config class-name="com.sun.xml.wss.provider.ClientSecurityAuthModule" provider-id="XWS_ClientProvider" provider-type ="client"> invalid input: '<'property name="password" value="${ALIAS=myalias}/> invalid input: '<'/provider-config>
    List Audit Modules Command Usage: list-audit-modules [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] [target(Default server)]
    List Auth Realms Command Usage: list-auth-realms [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] [target(Default server)]
    List File GroupsCommand Usage: list-file-groups [--terse={true|false}][ --echo={true|false} ] [ --interactive={true|false} ] [--host host] [--port port] [--secure| -s ] [--user admin_user] [--passwordfile filename] [--help] [--name username] [--authrealmname auth_realm_name] [ target]
    List File Users Command Usage: list-file-users [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] [--authrealmname authrealm_name] [target(Default server)]
    Usage: list-jacc-providers [--help] [--user admin_user] [--passwordfile file_name] [target(Default server)]
    List Message Security Providers Command Usage: list-message-security-providers [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] [--layer message_layer] [target(Default server)]
    List Password Aliases Command Usage: list-password-aliases [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] Result of the command is that: invalid input: '<'domain-dir>/invalid input: '<'domain-name>/config/domain-passwords file gets appended with the entry of the form: aliasname= A user can use this aliased password now in setting passwords in domin.xml.
    author - Nithya Subramanian Usage: list-supported-cipher-suites [--help] [--user admin_user] [--passwordfile file_name] [target_name(default server)]
    Update File User Command Usage: update-file-user [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] [--userpassword admin_passwd] [--groups user_groups[:user_groups]*] [--authrealmname authrealm_name] [--target target(Default server)] username
    Update Password Alias Command Usage: update-password-alias [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] aliasname Result of the command is that: the entry of the form: aliasname=invalid input: '<'password-encrypted-with-masterpassword> in invalid input: '<'domain-dir>/invalid input: '<'domain-name>/config/domain-passwords file gets updated with the new alias password domain.xml example entry is: invalid input: '<'provider-config class-name="com.sun.xml.wss.provider.ClientSecurityAuthModule" provider-id="XWS_ClientProvider" provider-type ="client"> invalid input: '<'property name="password" value="${ALIAS=myalias}/> invalid input: '<'/provider-config>