Determining the role of the user whose password has changed
About this task
Use the following procedure to determine which role or roles the user whose password has changed is playing.
Attention: A user might have more than one role, in which case
you must follow more than one procedure to change the password.
- 1. Check if the user is the HCL Workload Automation instance owner:
-
- Windows
- Check if the user whose password is to be changed is the user that owns the HCL Workload Automation for <TWS_user> service.
- UNIX
- Run the following command:
ps -ef | grep netman
- 2. Check if the user is the WebSphere Application Server user or the database user, or both:
-
- Log on to the computer where HCL Workload Automation is
installed as the following user:
- UNIX
- root
- Windows
- Any user in the Administrators group.
- Access the directory: <TWA_home>/wastools
- From that same directory run the following script:
- UNIX
- showSecurityProperties.sh > <output_file.txt>
- Windows
- showSecurityProperties.bat > <output_file.txt>
Note: This command might display a message from the application server (WASX7357I:) in the output file. You can ignore this message. - Open <output_file.txt> in a text editor.
- Run the showSecurityProperties script to check the ServerID associated with the value of the activeUserRegistry key. If the user whose password has changed is the same as the value of the ServerID listed in the Federated Repository Panel, then the user is the WebSphere Application Server user.
- Check the value of the key j2cUserid . If
the user whose password is to be changed matches this key, the user
is the database user. Note: If the user is the Oracle schema owner, the password must also be changed within Oracle (see the Oracle documentation).
- Log on to the computer where HCL Workload Automation is
installed as the following user:
- 3. Check if the user is a streamlogon user
- Using composer or the Dynamic Workload Console, check if the user is identified as a user. If so, the user is a streamlogon user.
When you have determined which roles the user plays, see Table 1 to determine if and where the password change must be implemented, and then Determining the actions to take.