Direkt zum Hauptbereich

Posts

Es werden Posts vom 2010 angezeigt.

HPDAZ0602E Corrupted file: Insufficient information to contact a Policy Server.

Problem [root@srv1234 PolicyDirector]# java com.tivoli.pd.jcfg.SvrSslCfg -action config -admin_id sec_master -admin_pwd ******** -appsvr_id tim2tam -appsvr_pwd secret -host srv1234 -mode remote -port 999 -policysvr srv1235.mycompany.com:7135:1 -authzsvr srv1235.mycompany.com:7136:1 -cfg_file /opt/PolicyDirector/conf/srv1235.conf -key_file /opt/PolicyDirector/conf/keystore_srv1235.ks -domain Default -cfg_action create Exception in thread "main" [java.lang.IllegalStateException: HPDAZ0602E   Corrupted file: Insufficient information to contact a Policy Server. ] Wrappered Exception: java.lang.IllegalStateException: HPDAZ0602E   Corrupted file: Insufficient information to contact a Policy Server.         at com.tivoli.pd.jadmin.PDAppSvrConfig.configureAppSvr(PDAppSvrConfig.java:195)         at com.tivoli.pd.jcfg.SvrSslCfg.config(SvrSslCfg.java:179)         at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)         at sun.reflect.NativeMethodAccessorImpl.in

com.tivoli.pd.jcfg.SvrSslCfg

[root@srvapp sbin]# java com.tivoli.pd.jcfg.SvrSslCfg -action config -admin_id sec_master -admin_pwd ********* -appsvr_id tim2tam -appsvr_pwd ******** -host srvapp -mode remote -port 999 -policysvr srvtam.mycompany.com:7135:1 -authzsvr srvtam.mycompany.com:7136:1 -cfg_file /opt/PolicyDirector/conf/srvtam.conf -key_file /opt/PolicyDirector/conf/keystore_srvtam.ks -cfg_action create Problem : Exception in thread "main" [java.io.IOException: No such file or directory ] Wrappered Exception: java.io.IOException: No such file or directory at com.tivoli.pd.jadmin.PDAppSvrConfig.configureAppSvr(PDAppSvrConfig.java:528) at com.tivoli.pd.jcfg.SvrSslCfg.config(SvrSslCfg.java:335) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:64) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:615) at com.tivo

removing my old ACLs from an obsolete WebSphere Portal Server's external authorization

Problem I want to delete the old WPS... ACLs from the old WebSphere Portal Server external authorization, which are not needed anymore. (Note: It was no problem to delete the object /WPS.) But I cannot modify/delete or even show the ACLs in pdadmin or WPM. In pdadmin I cannot see any ACL Entry on the object or on the ACL, but in a pdacld_dump I can see ACL entries for Groups and Users (Principals). I'm getting always: Could not perform the administration request Error: HPDAC1050E Operation is not authorized. (status 0x1005b41a) pdadmin sec_master> acl show WPS_PORTLET_DEFINITION_MCO-directory-Search_3_0_1O9-User ACL Name: WPS_PORTLET_DEFINITION_MCO-directory-Search_3_0_1O9-User Description: ACL for WP rolePORTLET_DEFINITION/MCO directory Search/3_0_1O9@User Entries: ---------> no ACLEntry can be seen I did a pdacld_dump on the PD from the PolicyDirector/db/master_authzn.db: /opt/PolicyDirector/sbin/pdacld_dump -f /var/PolicyDirector/db/master_authzn.db > /opt/install/

DPWWA1203E Permission denied // DPWAD0312E Object list failed: Forbidden

cmd> server task cnt-1a-webseald-hst7127 create -f -t tcp -h -v hst7105 -p 80 -w /ICB DPWWA1203E Permission denied pdadmin sec_master> object list /WebSEAL/hst7127-cnt-1a DPWAD0312E Object list failed: Forbidden The reason for this behaviour was that somehow my container /WebSEAL in the object space got the ACL default-root instead of default-webseal by the installation. pdadmin sec_master> object listandshow /WebSEAL Name: /WebSEAL/hst7127-cnt-1a Description: WebSEAL Server Object Type: 5 (Junction) Is Policy Attachable: Yes Extended Attributes: Attached ACL: Attached POP: Attached AuthzRule: Effective Extended Attributes: Effective ACL: default-root Effective POP: Effective AuthzRule: Name: /WebSEAL/hst7127-mas-01 Description: WebSEAL Server Object Type: 5 (Junction) Is Policy Attachable: Yes Extended Attributes: Attached ACL:

LDAP: no mechanism available: No worthy mechs found

[root@SRV7127 V6.1]# ldapsearch -h localhost -p 389 -b "" -s base objectclass=* ldap_sasl_interactive_bind_s: Unknown authentication method (-6) additional info: SASL(-4): no mechanism available: No worthy mechs found [root@SRV7127 V6.1]# which ldapsearch /usr/bin/ldapsearch Use other ldapsearch: # /opt/ibm/ldap/V6.1/bin/ldapsearch -h localhost -p 389 -b "" -s base objectclass=*