Mapping security roles to users and groups in WebSphere Application Server
About this task
When the dynamic workload broker instance is installed on your master domain manager, corresponding roles are set up in WebSphere Application Server. By default, these roles are not used. However, if you enable global security in your environment, the authorization required to perform any tasks is always validated by WebSphere Application Server. Users are required to provide credentials for accessing dynamic scheduling tasks. These credentials correspond to existing users defined in the domain user registry or the LDAP server.
- Operator
- Monitors and controls the jobs submitted.
- Administrator
- Manages the scheduling infrastructure.
- Developer
- Defines the jobs to be run specifying the job parameters, resource requirements, and so on.
- Submitter
- Manages the submission of their own jobs and monitors and controls
the job lifecycle. This is the typical role for a HCL Workload Automation user.
HCL Workload Automation acts as submitter of jobs to the HCL Workload Automation dynamic agent.
- Configurator
- Is the entity responsible for running the jobs on a local environment.
To map security roles to users and groups on the WebSphere Application Server you must modify the BrokerSecurityProps.properties file using the changeBrokerSecurityProperties script.
- Log on to the computer where HCL Workload Automation is
installed as the following user:
- UNIX
- root
- Windows
- Any user in the Administrators group.
- Access the directory: <TWA_home>/wastools
- Stop the WebSphere Application Server using the conman stopappserver command (see Starting and stopping the application server and appservman)
- From that same directory run the following script
to create a file containing the current broker security properties:
- UNIX
- showBrokerSecurityProperties.sh > my_file_name
- Windows
- showBrokerSecurityProperties.bat > my_file_name
- Edit my_file_name with a text editor.
- Edit the properties as you require. For each
of the roles in the file, you can set the following properties:
- Everyone?
- Possible values:
- Yes: Every user is authorized to perform tasks for the role. No check is performed on the WebSphere Application Server user registry.
- No : Access is denied to users not defined in the WebSphere Application Server user registry.
- All authenticated?
- Possible values:
- Yes: All users belonging to the current WebSphere Application Server user registry who have been authenticated can access resources and tasks for the role. This is the default value.
- No : Access is granted only to those users and groups defined in the WebSphere Application Server user registry and listed in the mapped user and mapped group properties.
- Mapped users
- If specified, one or more users separated by the vertical bar symbol (|). This field can be left blank.
- Mapped groups
- If specified, one or more groups separated by the vertical bar symbol (|). This field can be left blank.
- Save the file my_file_name.
- Run the script:
- Windows
- changeBrokerSecurityProperties.bat my_file_name
- UNIX
- changeBrokerSecurityProperties.sh my_file_name
The properties are updated, according to the rules given in the descriptions of each property type.
- Start the WebSphere Application Server using the conman startappserver command (see Starting and stopping the application server and appservman)
- Check that the change has been implemented.
- If the mapped user or group names contain blanks, the entire user
or group list must be specified between double quotation marks (").
For example, if you want to add the users John Smith, MaryWhite and
DavidC to the developer role, you specify them as follows:
Role: Developer Everyone?: No All authenticated?: No Mapped users:"John Smith|MaryWhite|DavidC" Mapped groups:
- In the file there is an additional default role named WSClient which you must leave as is.