wpconfig.properties

 

#
#
# WebSphere Portal configuration file
#
# key = value
#
# NOTE: Do NOT enclose any value in quotes!
# NOTE: Windows paths must use '/', not '\'.
# NOTE: Windows long paths are OK.
# NOTE: Properties are immutable. Once set, they cannot be overriden.
#       Precedence is as follows, in decending order:
#           Properties set on command line are read first (-DMyNode=somenode)
#           Properties set in properties file are read next,
#           Properties set in buildfile file are read last.
#
#

#
# Save Parent Properties
#
# The SaveParentProperties property indicates that upon successful task 
# execution using properties from a parent file specified by the 
# parentProperties property, those properties should be copied into the
# main configuration properties file so that it will reflect the current 
# state.  The default value (if the property is not defined) is True.
#
SaveParentProperties=True

#
# WebSphere Application Server Properties - BEGIN
#

# VirtualHostName: The name of the WebSphere Application Server virtual host
VirtualHostName=default_host

# WasAdminServer: The name of the WebSphere Application Server administration server (server1)
WasAdminServer=server1

# WasHome: The directory where WebSphere Application Server product files are installed
WasHome=C:/IBM/APPSER~1

# WasUserHome: The directory where WebSphere Application Server user data is created
WasUserHome=C:/IBM/APPSER~1

# WasUserid: The user ID for WebSphere Application Server security authentication
# WMMUR DB:   WasUserid=<wasuserid>
# See LDAP examples below:
# IBM Directory Server: { uid=<wasuserid>,cn=users,dc=yourco,dc=com }
# Domino:               { cn=<wasuserid>,o=yourco.com }
# Active Directory:     { cn=<wasuserid>,cn=users,dc=yourco,dc=com }
# Active Directory AM:  { cn=<wasuserid>,cn=users,dc=yourco,dc=com }
# SunOne:		{ uid=<wasuserid>,ou=people,o=yourco.com }
# Novell eDirectory     { uid=<wasuserid>,ou=people,o=yourco.com }
WasUserid=wasadmin

# WasPassword: The password for WebSphere Application Server security authentication (LDAP and CUR)
WasPassword=ReplaceWithYourWASUserPwd

# WpsInstallLocation: The directory where WebSphere Portal is installed
WpsInstallLocation=C:/IBM/PORTAL~1

# PrimaryNode: This key is required if the configuration runs in a clustered environment.
# true: (default): it is the master node
# false it is not the master node
# Please be careful of changing this property.
PrimaryNode=true

# Define the Cluster Name
# Do not use spaces
ClusterName=PortalCluster

# Dynamic cache service
# Push frequency in seconds, default=1
PushFrequency=1

# Dynamic cache service
# Replication type, default=PUSH
ReplicationType=PUSH 

# Define the Host Name of the Deployment Manager Node
DMgrHostName=
           	
# Define the SOAP Port of the Deployment Manager Node
DMgrSoapPort=8879

# CellName: The name of the WebSphere Application Server Cell
CellName=skycell1

# NodeName: The name of WebSphere Application Server Node
NodeName=skynode1

# ServerName: The name of application server for WebSphere Portal
ServerName=WebSphere_Portal

# **Required for z/OS only**
# ServerShortName is the server's jobname, as specified in the MVS
# START command JOBNAME parameter. This value is also passed as a
# parameter to the server's start procedures to specify the location of 
# the server's configuration files and identify the server to certain
# WebSphere for z/OS- exploited z/OS facilities (for example, SAF).
# The name must be 7 or fewer characters and all uppercase.
ServerShortName=BBOS002

# **Required for z/OS only**
# ClusterTransitionName is the WLM APPLENV (WLM application environment)
# name for this server.The name must be 8 or fewer characters and all
# uppercase.
ClusterTransitionName=BBOC002

# WpsHostName: The name of the WebSphere Portal host or the name of the Web server
# For example: http://<WpsHostName>:<WpsHostPort>/<WpsContextRoot>/<WpsDefaultHome>
# For example "localhost" in the URL: http://localhost:80/wps/portal
WpsHostName=skyway2k

# WpsHostPort: The port used by WebSphere Portal or the Web server port
# For example: http://<WpsHostName>:<WpsHostPort>/<WpsContextRoot>/<WpsDefaultHome>
# For example "80" in the URL: http://localhost:80/wps/portal
WpsHostPort=10038

# WpsSoapPort: The SOAP port used by WebSphere Portal Server
# Note: This property may not be used to reconfigure the SOAP port.
#       This value is set by the basic configuration task of WebSphere Portal .
WpsSoapPort=10033

# **Required for iSeries only**
#The port block that will be used for WebSphere Portal Server
WpsHostBasePort=30230

# XmlAccessHost: The name of the local WebSphere Portal host
# Note: Should not be necessary to modify
XmlAccessHost=localhost

# XmlAccessPort: The port used by the XMLAccess configuration task to connect the XMLAccess server
# Note: This property may not be used to reconfigure the XmlAccessPort port.
#       The value is set by the basic configuration task of WebSphere Portal .
XmlAccessPort=10038

# XmlAccessProtocol: The protocol used to connect to the XMLAccess server
# Can be set to 'http' or 'https' depending on security configuration 
XmlAccessProtocol=http

# WpsAppName: The WebSphere Portal application name
WpsAppName=wps

# WpsContextRoot: The WebSphere Portal context root
# For example: http://<WpsHostName>:<WpsHostPort>/<WpsContextRoot>/<WpsDefaultHome>
# For example "wps" in the URL: http://localhost:80/wps/portal
WpsContextRoot=wps
# WsrpContextRoot: The context root for Web Services for Remote Portlets
WsrpContextRoot=wsrp

# WpsDefaultHome: The WebSphere Portal default home
# For example: http://<WpsHostName>:<WpsHostPort>/<WpsContextRoot>/<WpsDefaultHome>
# For example "portal" in the URL: http://localhost:80/wps/portal
WpsDefaultHome=portal

# WpsPersonalizedHome: The WebSphere Portal personalized home
# For example: http://<WpsHostName>:<WpsHostPort>/<WpsContextRoot>/<WpsPersonalizedHome>
# For example "myportal" in the URL: http://localhost:80/wps/myportal
WpsPersonalizedHome=myportal

# ContentAccessServiceProxyHost: The HTTP proxy host used by the Content Access Service
ContentAccessServiceProxyHost=

# ContentAccessServiceProxyPort: The HTTP proxy port used by the Content Access Service
ContentAccessServiceProxyPort=

# **Required for z/OS only**
# SMFLibrary: The library where the ibmzos.jar file resides
SMFLibrary=

# **Required for z/OS only**
# SMFNativeLibrary: The library where the SMF DLLs reside
SMFNativeLibrary=

# **Required for z/OS only**
# WpsSMPEHomeDirectory: WebSphere Portal for z/OS SMP/E home directory
WpsSMPEHomeDirectory=

#
# WebSphere Application Server Properties - END
#


#
# Java Properties - BEGIN
#

# JavaHome: The directory where the WebSphere Application Server Java is installed
# On z/OS, WebSphere Application Server does not ship its own Java. Therefore,
# set JavaHome to the system Java home, e.g., /usr/lpp/java/J1.3.
JavaHome=C:/IBM/AppServer/java

# DbtJavaMaxMemory: This is the max memory setting used by ANT in the transfer of
# domain data during the database transfer task.
# Recommended Value: 512M
DbtJavaMaxMemory=512M

#
# Java Properties - END
#


#
# Portal Config Properties - BEGIN
#

# PortalAdminId: The user ID for the WebSphere Portal Administrator
# DEV (No security):  PortalAdminId=<portaladminid>
# WMMUR DB:  PortalAdminId=<portaladminid>
# See LDAP examples below:
# IBM Directory Server: { uid=<portaladminid>,cn=users,dc=yourco,dc=com }
# Domino:               { cn=<portaladminid>,o=yourco.com }
# Active Directory:     { cn=<portaladminid>,cn=users,dc=yourco,dc=com }
# Active Directory AM:  { cn=<portaladminid>,cn=users,dc=yourco,dc=com }
# SunOne:		{ uid=<portaladminid>,ou=people,o=yourco.com }
# Novell eDirectory     { uid=<portaladminid>,ou=people,o=yourco.com }
PortalAdminId=wpsadmin

# PortalAdminPwd: The password for the WebSphere Portal Administrator
PortalAdminPwd=

# PortalAdminGroupId: The group ID for the WebSphere Portal Administrator group
# DEV (No security):  PortalAdminGroupId=<portaladmingroupid>
# WMMUR DB:  PortalAdminGroupId=<portaladmingroupid>
# See LDAP examples below:
# IBM Directory Server: { cn=<portaladmingroupid>,cn=groups,dc=yourco,dc=com }
# Domino:               { cn=<portaladmingroupid> }
# Active Directory:     { cn=<portaladmingroupid>,cn=groups,dc=yourco,dc=com }
# Active Directory AM:  { cn=<portaladmingroupid>,cn=groups,dc=yourco,dc=com }
# SunOne:		{ cn=<portaladmingroupid>,ou=groups,o=yourco.com }
# Novell eDirectory     { cn=<portaladmingroupid>,ou=groups,o=yourco.com }
PortalAdminGroupId=wpsadmins

# PortalUniqueID: The 12 hex digits unique to this WebSphere Portal instance.
# Usually a MAC address from a communications adapter on this node.
# It is used for the object ID creation mechanism and has to be different for each node.
# Only nodes running on one machine may have the same PortalUniqeID.
PortalUniqueID=00104B758E6B

# CmConfigured: Indicates whether content management functions are configured.
CmConfigured=true

# WtpConfigured: Indicates whether transcoding functions are configured.
WtpConfigured=false

# WpsContentAdministrators: The group ID for the WebSphere Content Administrator group
# DEV (No security):  WpsContentAdministrators=cn=wpsContentAdministrators,o=default organization
# WMMUR DB:  WpsContentAdministrators=cn=wpsContentAdministrators,o=default organization
# See LDAP examples below:
# IBM Directory Server: { cn=wpsContentAdministrators,cn=groups,dc=yourco,dc=com }
# Domino:               { cn=wpsContentAdministrators }
# Active Directory:     { cn=wpsContentAdministrators,cn=groups,dc=yourco,dc=com }
# Active Directory AM:  { cn=wpsContentAdministrators,cn=groups,dc=yourco,dc=com }
# SunOne:		{ cn=wpsContentAdministrators,ou=groups,o=yourco.com }
# Novell eDirectory     { cn=wpsContentAdministrators,ou=groups,o=yourco.com }
WpsContentAdministrators=cn=wpsContentAdministrators,o=default organization

# WpsContentAdministratorsShort: The WebSphere Content Administrators group ID
WpsContentAdministratorsShort=wpsContentAdministrators

# WpsDocReviewer: The group ID for the WebSphere Document Reviewer group
# DEV (No security):   WpsDocReviewer=cn=wpsDocReviewer,o=default organization
# WMMUR DB:  WpsDocReviewer=cn=wpsDocReviewer,o=default organization
# See LDAP examples below:
# IBM Directory Server: { cn=wpsDocReviewer,cn=groups,dc=yourco,dc=com }
# Domino:               { cn=wpsDocReviewer }
# Active Directory:     { cn=wpsDocReviewer,cn=groups,dc=yourco,dc=com }
# Active Directory AM:  { cn=wpsDocReviewer,cn=groups,dc=yourco,dc=com }
# SunOne:		{ cn=wpsDocReviewer,ou=groups,o=yourco.com }
# Novell eDirectory     { cn=wpsDocReviewer,ou=groups,o=yourco.com }
WpsDocReviewer=cn=wpsDocReviewer,o=default organization

# WpsDocReviewerShort: The WebSphere Document Reviewer group ID
WpsDocReviewerShort=wpsDocReviewer

#
# Portal Config Properties - END
#


#
# Dependency Checking Properties - BEGIN
#

# CheckVersions: This value should be false is used to disable dependency rules based validation.
# A false value should only be used in order to bypass validation when a valid configuration
# is indicated as invalid. Most of the dependency rules based validation deals with
# checking versions of installed components (for example WebSphere Application Server)
# { true | false }
# On z/OS, must be set to false.
CheckVersions=true

# DependencyRulesDirectory: This is used to specify a location of a unique set of
# rules to use for dependency rules based validation tasks during configuration.
# This should very rarely be necessary.  However, if you used special rules
# during the installation process and some of the rules need to be used during
# configuration-time validation as well, you would use this property.
#DependencyRulesDirectory=path_to_rules_directory

#
# Dependency Checking Properties - END
#


#
# PORTAL INFO SEQUENCE
#

# DcsRemoteHost: URL of remost host that provides Document Conversion Services
# eg: DcsRmoteHost=http://myremotehost1:9080/dcs/dcs
DcsRemoteHost=http://remotehostname:9080/dcs/dcs

# SpellCheckHost: Hostname of remote system that provides spell checking function
# Use this property in conjunction with SpellCheckPort to delegate spell checking to a remote host
SpellCheckHost=remotehostname

# SpellCheckPort: Port number on remote host where Spell Checker will listen
# Use this property in conjunction with SpellCheckHost to delegate spell checking to a remote host
SpellCheckPort=9080

#
# DB2 Content Manager Runtime Edition Database Properties  - BEGIN
#

# Directory for DB2 Content Manager Runtime Edition's dynamic DDL files
JcrGeneratedDDLPath=${WpsInstallLocation}/jcr/config/dynamic

# Directory for DB2 Content Manager Runtime Edition's binary value files
JcrBinaryValueFileDir=${WpsInstallLocation}/jcr/binaryValues

# Debug level for DB2 Content Manager Runtime Edition database utilities
JcrDebugLevel=2

# JcrDbUnicode: Indicates whether or not the DB2 Content Manager Runtime Edition database is unicode.
#  Y:  is unicode
#  N:  is NOT unicode
JcrDbUnicode=Y

# JcrBPCServerName: The name of application server with a configured
# Business Process Container
JcrBPCServerName=server1

# JcrJMSJAASUser: The user for the Promote J2C alias
JcrJMSJAASUser=ReplaceWithYourJMSUserId

# JcrJMSJAASPassword: The password for the Promote J2C alias
JcrJMSJAASPassword=ReplaceWithYourJMSPwd

#JcrJMSType: Type of JMS Provider
# mq:           {WebSphere MQ JMS Provider}
# embedded:     {WebSphere JMS Provider}
JcrJMSType=embedded

#JcrMQQueueManager: name of the WebSphere MQ Queue Manager
#Note: This value is not needed for WebSphere Embedded Messaging
JcrMQQueueManager=

#
# DB2 Content Manager Runtime Edition Database Properties   - END
#


#
# Personalization Database Properties - BEGIN
#

# InitializeFeedbackDB: Determines how to handle the Personalization Feedback
# database during database transfer from Cloudscape to another DB type.
# Set true to transfer data from Cloudscape; set false to merely redirect the
# Feedback DataSource to a preexisting database.
InitializeFeedbackDB=true

# PznSchedulerUser: Username for RunAs access to Personalization Scheduler
PznSchedulerUser=ReplaceWithYourId

# PznSchedulerUserPassword: Password of user to be given RunAs access to
# Personalization Scheduler
PznSchedulerUserPassword=ReplaceWithYourPassword

#
# Personalization Database Properties - END
#

#
# Web Content Management (WCM) Properties - BEGIN
#

# WcmConfigured: Indicates whether WCM application is configured.
WcmConfigured=true

# WcmAuthoringConfigured: Indicates whether WCM authoring portlet is configured.
WcmAuthoringConfigured=false

# WcmAdminGroupId: The group ID for the WCM Administrator group
# DEV (No security):  WcmAdminGroupId=cn=wcmadmins,o=default organization
# WMMUR DB:  WcmAdminGroupId=cn=wcmadmins,o=default organization
# See LDAP examples below:
# IBM Directory Server: { cn=wcmadmins,cn=groups,dc=yourco,dc=com }
# Domino:               { cn=wcmadmins}
# Active Directory:     { cn=wcmadmins,cn=groups,dc=yourco,dc=com }
# Active Directory AM:  { cn=wcmadmins,cn=groups,dc=yourco,dc=com }
# SunOne:		{ cn=wcmadmins,ou=groups,o=yourco.com }
# Novell eDirectory     { cn=wcmadmins,ou=groups,o=yourco.com }
WcmAdminGroupId=cn=wcmadmins,o=default organization

# WcmAdminGroupIdShort: The WCM admin group ID
WcmAdminGroupIdShort=wcmadmins

#
# WCM Properties - END
#

#
#
# Lotus Collaborative Components Properties - BEGIN
#
#

#
# Lotus QuickPlace Properties - BEGIN
#

# Description: Lotus Collaborative Components required properties
#              to enable Lotus QuickPlace

# LCC.QuickPlace.Enabled: Is Lotus QuickPlace enabled in the environment?
# { true | false }
LCC.QuickPlace.Enabled=false

# LCC.QuickPlace.Server: The Lotus QuickPlace server name.
# { hostname | ip address }
LCC.QuickPlace.Server=my.server.com

# LCC.QuickPlace.Protocol: The protocol used to connect to the Lotus QuickPlace server.
# { http | https }
LCC.QuickPlace.Protocol=http

# LCC.QuickPlace.Port: The port number for the Lotus QuickPlace server.
# { port number }
LCC.QuickPlace.Port=80

#
# Lotus QuickPlace Properties - END
#

#
# Lotus Sametime Properties - BEGIN
#

# Description: Lotus Collaborative Components required properties
#              to enable Lotus Sametime

# LCC.Sametime.Enabled: Is Lotus Sametime enabled in the environment?
# { true | false }
LCC.Sametime.Enabled=false

# LCC.Sametime.Server: The Lotus Sametime server name.
# { hostname | ip address }
LCC.Sametime.Server=my.server.com

# LCC.Sametime.Protocol: The protocol used to connect to the Lotus Sametime server.
# { http | https }
LCC.Sametime.Protocol=http

# LCC.Sametime.Port: The port number for the Lotus Sametime server.
# { port number }
LCC.Sametime.Port=80

#
# Lotus Sametime Properties - END
#

#
# Lotus Discovery Server Properties - BEGIN
#

# Description: Lotus Collaborative Components required properties
#              to enable Lotus Discovery Server

# LCC.DiscoveryServer.Enabled: Is Lotus Discovery Server enabled in the environment?
# { true | false }
LCC.DiscoveryServer.Enabled=false

# LCC.DiscoveryServer.Server: The Lotus Discovery Server name.
# { hostname | ip address }
LCC.DiscoveryServer.Server=my.server.com

# LCC.DiscoveryServer.Protocol: The protocol used to connect to the Lotus Discovery Server.
# { http | https }
LCC.DiscoveryServer.Protocol=http

# LCC.DiscoveryServer.Port: The port number for the Lotus Discovery Server.
# { port number }
LCC.DiscoveryServer.Port=80

#
# Lotus Discovery Server Properties - END
#

#
# Lotus Domino Directory Properties - BEGIN
#

# Description: Lotus Collaborative Components required properties
#              to enable Lotus Domino Directory

# LCC.DominoDirectory.Enabled: Is Lotus Domino Directory enabled in the environment?
# { true | false }
LCC.DominoDirectory.Enabled=false

# LCC.DominoDirectory.Server: The Lotus Domino Directory server name.
# { hostname | ip address }
LCC.DominoDirectory.Server=my.server.com

# LCC.DominoDirectory.Port: The port number for the Lotus Domino Directory server.
# { port number }
LCC.DominoDirectory.Port=389

# LCC.DominoDirectory.SSL: Is SSL used to connect to the Lotus Domino Directory Server?
# { true | false }
LCC.DominoDirectory.SSL=false

#
# Lotus Domino Directory Properties - END
#

#
#
# Lotus Collaborative Components Properties - END
#
#



#
#
# WebSphere Portal Security Configuration - BEGIN
#
#

#
# WebSphere Portal Security LTPA and SSO configuration
#

# LTPAPassword: Specifies the password to encrypt and decrypt the LTPA keys.
LTPAPassword=

# LTPATimeout: Specifies the time period in minutes at which an LTPA token will expire.
LTPATimeout=120

# SSORequiresSSL: Specifies that Single Sign-On function is enabled
# only when requests are over HTTPS Secure Socket Layer (SSL) connections.
SSORequiresSSL=false

# SSODomainName: Domain name (ibm.com, for example) for all Single Sign-on hosts.
SSODomainName=

#
# General Global Security Settings
#

# Description: The values in this section should only be adapted by advanced users

# useDomainQualifiedUserNames: Specifies the user names to qualify with the security domain within which they reside.
useDomainQualifiedUserNames=false

# cacheTimeout: Specifies the timeout value in seconds for security cache.
cacheTimeout=600

# issuePermissionWarning: Specifies that when the Issue permission warning is enabled, during application deployment
# and application start, the security run time emits a warning if applications are granted any custom permissions.
issuePermissionWarning=true

# activeProtocol: Specifies the active authentication protocol for RMI/IIOP requests when security is enabled.
activeProtocol=BOTH

# activeAuthMechanism: Specifies the active authentication mechanism, when security is enabled.
activeAuthMechanism=LTPA

#
# Custom User Registry Configuration - BEGIN
#

# CUClassName: Specifies a dot-separated class name that implements the com.ibm.websphere.security.UserRegistry
# interface (should be in the classpath).
CUClassName=com.ibm.websphere.wmm.registry.WMMCustomRegistry

#
# Custom User Registry Configuration - END
#

#
# LDAP Properties Configuration - BEGIN
#

# LookAside: To configure LDAP with an additional LookAside Database
# true  - LDAP + Lookaside database
# false - only LDAP
LookAside=false

# WmmDefaultRealm
WmmDefaultRealm=portal

# LDAPHostName: The LDAP server hostname
LDAPHostName=yourldapserver.com

# LDAPPort: The LDAP server port number
# For example, 389 for non-SSL or 636 for SSL
LDAPPort=389

# LDAPAdminUId: The LDAP administrator ID
LDAPAdminUId=<ldapadminuid>

# LDAPAdminPwd: The LDAP administrator password
LDAPAdminPwd=

# LDAPServerType: The type of LDAP server to be used for WebSphere Portal
# IBM Directory Server: { IBM_DIRECTORY_SERVER }
# Domino:               { DOMINO502 }
# Active Directory:     { ACTIVE_DIRECTORY }
# Active Directory AM:  { ACTIVE_DIRECTORY }
# SunOne:               { IPLANET }
# Novell eDirectory:    { NDS }
# Note: use IPLANET for SunONE
LDAPServerType=IBM_DIRECTORY_SERVER

#LDAPBindID: The user ID for LDAP Bind authentication
# See LDAP examples below:
# IBM Directory Server: { uid=<ldapbindid>,cn=users,dc=yourco,dc=com }
# Domino:               { cn=<ldapbindid>,o=yourco.com }
# Active Directory:     { cn=<ldapbindid>,cn=users,dc=yourco,dc=com }
# Active Directory AM:  { cn=<ldapbindid>,cn=users,dc=yourco,dc=com }
# SunOne:               { uid=<ldapbindid>,ou=people,o=yourco.com }
# Novell eDirectory     { uid=<ldapbindid>,ou=people,o=yourco.com }
LDAPBindID=

#LDAPBindPassword: The password for LDAP Bind authentication
LDAPBindPassword=

#
# LDAP Properties Configuration - END
#

#
# Advanced LDAP Configuration - BEGIN
#

# LDAPSuffix: The LDAP suffix appropriate for our LDAP server
# IBM Directory Server: { dc=yourco,dc=com }
# Domino value is null
# Domino:               {  }
# Active Directory:     { dc=yourco,dc=com }
# Active Directory AM:  { dc=yourco,dc=com }
# SunOne:               { o=yourco.com }
# Novell eDirectory     { o=yourco.com }
LDAPSuffix=dc=yourco,dc=com


# LdapUserPrefix: The LDAP user prefix appropriate for our LDAP server
# IBM Directory Server: { uid }
# Domino:               { cn }
# Active Directory:     { cn )
# Active Directory AM:  { cn )
# SunOne:               { uid }
# Novell eDirectory     { uid }
LdapUserPrefix=uid


# LDAPUserSuffix: The LDAP user suffix appropriate for our LDAP server
# IBM Directory Server: { cn=users }
# Domino:               { o=yourco.com }
# Active Directory:     { cn=users }
# Active Directory AM:  { cn=users }
# SunOne:               { ou=people}
# Novell eDirectory     { ou=people }
LDAPUserSuffix=cn=users


# LdapGroupPrefix: The LDAP group prefix appropriate for our LDAP server
# IBM Directory Server: { cn }
# Domino:               { cn }
# Active Directory:     { cn }
# Active Directory AM:  { cn }
# SunOne:               { cn }
# Novell eDirectory     { cn }
LdapGroupPrefix=cn


# LDAPGroupSuffix: The LDAP group suffix appropriate for our LDAP server
# IBM Directory Server: { cn=groups }
# Domino value is null
# Domino:               {  }
# Active Directory:     { cn=groups }
# Active Directory AM:  { cn=groups }
# SunOne:               { ou=groups }
# Novell eDirectory     { ou=groups }
LDAPGroupSuffix=cn=groups


# LDAPUserObjectClass: The LDAP user object class appropriate for our LDAP server
# IBM Directory Server: { inetOrgPerson }
# Domino:               { dominoPerson }
# Active Directory:     { user }
# Active Directory AM:  { user }
# SunOne:               { inetOrgPerson }
# Novell eDirectory     { inetOrgPerson }
LDAPUserObjectClass=inetOrgPerson


# LDAPGroupObjectClass: The LDAP group object class appropriate for our LDAP server
# IBM Directory Server: { groupOfUniqueNames }
# Domino:               { dominoGroup }
# Active Directory:     { group }
# Active Directory AM:  { group }
# SunOne:               { groupOfUniqueNames }
# Novell eDirectory     { groupOfNames }
# Shared UserRegistry with WebSeal/TAM: { accessGroup }
LDAPGroupObjectClass=groupOfUniqueNames


# LDAPGroupMember: The LDAP group member attribute name appropriate for our LDAP server
# IBM Directory Server: { uniqueMember }
# Domino:               { member }
# Active Directory:     { member }
# Active Directory AM:  { member }
# SunOne:               { uniqueMember }
# Novell eDirectory     { uniqueMember }
# Shared UserRegistry with WebSeal/TAM: { member }
LDAPGroupMember=uniqueMember

# LDAPUserFilter: The LDAP user filter appropriate for our LDAP server (to work with default values in WMM)
#IBM Directory Server: { (&(uid=%v)(objectclass=inetOrgPerson)) }
#Domino:               { (&(|(cn=%v)(uid=%v))(|(objectclass=dominoPerson)(objectclass=inetOrgPerson))) }
#Active Directory:     { (&(|(cn=%v)(samAccountName=%v))(objectclass=user)) }
#Active Directory AM:  { (&(cn=%v)(objectclass=user)) }
#SunOne:               { (&(uid=%v)(objectclass=inetOrgPerson)) }
#Novell eDirectory     { (&(uid=%v)(objectclass=inetOrgPerson)) }
LDAPUserFilter=(&(uid=%v)(objectclass=inetOrgPerson))

# LDAPGroupFilter: The LDAP group filter appropriate for our LDAP server (to work with default values in WMM)
#IBM Directory Server: { (&(cn=%v)(objectclass=groupOfUniqueNames)) }
#Domino:               { (&(cn=%v)(|(objectclass=dominoGroup)(objectclass=groupOfNames)(objectclass=groupOfUniqueNames))) }
#Active Directory:     { (&(cn=%v)(objectclass=group)) }
#Active Directory AM:  { (&(cn=%v)(objectclass=group)) }
#SunOne                { (&(cn=%v)(objectclass=groupOfUniqueNames)) }
#Novell eDirectory     { (&(cn=%v)(objectclass=groupOfUniqueNames)) }
LDAPGroupFilter=(&(cn=%v)(objectclass=groupOfUniqueNames))


# LDAPGroupMinimumAttributes: This attribute is loaded for group search (performance issues)
LDAPGroupMinimumAttributes=

# LDAPUserBaseAttributes: These attributes are loaded for user login (performance issues)
LDAPUserBaseAttributes=givenName,sn,preferredLanguage

# LDAPUserMinimumAttributes: These attributes are loaded for user search (performance issues)
LDAPUserMinimumAttributes=

#LDAPsearchTimeout: Specifies the timeout value in seconds for an LDAP server to respond before aborting a request.
LDAPsearchTimeout=120

#LDAPreuseConnection: Should set to true by default to reuse the LDAP connection.
# { false | true }
LDAPreuseConnection=true

#LDAPIgnoreCase: Specifies that a case insensitive authorization check is performed.
# { false | true }
LDAPIgnoreCase=true

#
# Advanced LDAP Configuration - END
#

#
# LDAP Properties - END
#

#
#
# WebSphere Portal Security Configuration - END
#
#

#
# iSeries CCSID value
#
# If the CCSID on an iSeries is set to 65535,
# some configuration commands will not work 
# correctly.  Configuration run under a job with
# CCSID of 65535 will be changed by default
# to CCSID 37.   The CCSIDvalue property can
# be used to change the default CCSID to something
# other than 37.  This property is only used
# when the configuration job CCSID is 65535.
# 
#
# CCSIDvalue=37

#
#List of old ports to be replaced (iSeries Only)
WpsHostOldPort1=9080
WpsHostOldPort2=9090
WpsHostSSLOldPort1=9043
WpsHostSSLOldPort2=9443

#
#   Advanced Security Configuration using External Security Managers
#

#
#
#  Namespace management parameers common to TAM and SiteMinder
#
#

# (Optional) We can set different "contexts" to further distinguish externalized Portal 
# role names from other role names in the Tivoli Access Manager namespace. This context 
# information will be added to the namespace entry created upon role externalization. 
# If any of the 3 context values are null, none will be used. 
EACserverName=WebSphere_Portal
EACcellName=vmwtest
EACappName=wps

# Description: this field will allow you to either have our externalized Portal 
# rolenames displayed with the resource type first, or the role types first. 
# For example, if you make this variable "true", our TAM namespace or SiteMinder protected resource 
# would look similair to
#     /WPv6/wps.CONTENT_NODE/Welcome_Page/10_2E@Aministrator/app/server/cell
#     /WPv6/wps.CONTENT_NODE/Welcome_Page/10_2E@Editor/app/server/cell
#     /WPv6/wps.CONTENT_NODE/Administration/15_AF@Aministrator/app/server/cell
#     /WPv6/wps.PORTLET_APPLICATION/Welcome_Portlet/09_2Q@Aministrator/app/server/cell
#     /WPv6/wps.PORTLET_APPLICATION/Welcome_Portlet/09_2Q@User/app/server/cell
# 
# and if you make the variable "false", our TAM namespace or SiteMinder protected resource
# would look similair to: 
#     /WPv6/Aministrator@wps.CONTENT_NODE/Welcome_Page/10_2E/app/server/cell
#     /WPv6/Administrator@wps.CONTENT_NODE/Administration/15_AF/app/server/cell
#     /WPv6/Administrator@wps.PORTLET_APPLICATION/Welcome_Portlet/09_2Q/app/server/cell
#     /WPv6/Editor@wps.CONTENT_NODE/Welcome_Page/10_2E/app/server/cell
#     /WPv6/User@wps.PORTLET_APPLICATION/Welcome_Portlet/09_2Q/app/server/cell
reorderRoles=false


#
#
# Tivoli Access Manager
#
#

#
# AMJRTE connection parameteres
#

#An administratitive user ID for TAM. This user should have the access to create new TAM servers, 
#new Tivoli protected objectspaces, and new Tivoli protected objects 
PDAdminId=sec_master

#The password for the administrative TAM user 
PDAdminPwd=ReplaceWithYourTAMAdminPwd

#The location of the TAM AMJRTE properties file. This properties file is created by the TAM SvrSslCfg 
#command and contains information such as: 
#		Policy Server hostname, ports
#     version of AMJRTE 
#     path to encryption keys. 
PDPermPath=${JavaHome}/jre/PdPerm.properties

#
# SvrSslCfg command parameters
#

# Unique application name. This name will be used to create a new Tivoli server in the 
# Access Manager Policy Server. This server will appears in the pdadmin server list 
# after running the SvrSslCfg command. If a server with the same name appears in the 
# server list command, the SvrSslCfg command will fail. 
PDServerName=amwp6

# Configuration port for the application name. This paramter is currently ignored by the 
# SvrSslCfg command
SvrSslCfgPort=7223

# Configuration mode of the SvrSslCfg command. Currently, the only valid value is remote
SvrSslCfgMode=remote

# Defines the TAM Policy Server used when running PDJrteCfg
TamHost=your.TAM.Policy.Server.hostname

# Defines a hostname, port, and priority combinations for our TAM Policy servers
# used when running SvrSslCfg. 
# The format of this property is host:port:priority. For example, hosta.ibm.com:7135:1 
# or host1.ibm.com:7135:1, hostb.7135:2
PDPolicyServerList=your.TAM.Policy.Server.hostname:7135:1

# Defines a hostname, port, and priority combination for our TAM authorization servers. 
# The format of this property is host:port:priority. For example, hosta.ibm.com:7136:1
PDAuthzServerList=your.TAM.Authorization.Server.hostname:7136:1

# Stores encryption keys used for the SSL communication between AMJRTE and Tivoli 
# Access manager. This file is generated as a result of the SvrSslCfg command. 
PDKeyPath=${JavaHome}/jre/lib/security/pdperm.ks

#
# WebSEAL junction parameters
#

#The type of junction to be created in TAM. Accepted values are tcp and ssl 
JunctionType=tcp

#The WebSEAL junction point to the WebSphere Portal instance
#Note: In order to create a valid  TAM junction, this property must begin 
#with a / character
JunctionPoint=/wpsv6

# Which WebSEAL instance to create the junction. We can view the different WebSEAL 
# instances by issuing a server list from the pdadmin> command line 
WebSealInstance=instance-webseald-yourhost.com

# The headers inserted by WebSEAL that the TAI uses to identify the request as originating from WebSEAL. 
# 
# Note #1: Inclusion of these headers is associated with the headers used by 
# the WebSphere Application Server TAI to identify the request as one from WebSEAL.
# 
# Note #2: If you are configuring Portal to use TAM as an external authorization engine, 
#  include at least the iv-user and iv-creds headers 
TAICreds=iv-user,iv-creds

#
# WAS WebSEAL TAI parameters
#

# Optional parameter that sets the WebSEAL TAI's hostnames parameter. We should include 
# the hostname you provided when configuring the WebSEAL instance.  Please consider 
# the following:
#       * this value is case-sensitive
#       * this value may be a comma delimited list if more than one hostname is provided
#       * the default behavior when configuring a WebSEAL instance is to use the network
#         short name. For example, hosta.yourcompany.com may be represented as hosta
#         when the WebSEAL instance is configured
#       * if any additional proxies are included, their hostnames must be added as well
# Presence of a this parameters will cause the TAI to evaluate the VIA header and only 
# handle those requests that contain one of the provided hostname, and port combinations
WebSealHost=

# Optional parameter that sets the WebSEAL TAI's ports parameter. We should include 
# the WebSEAL ports in this comma delimited list. The default WebSEAL port is 443 
#
# Presence of a this parameters will #cause the TAI to evaluate the VIA header and only 
# handle those requests that contain one of the provided hostname, and port combinations
WebSealPort=

# When you create a TCP junction, this is WebSEAL identity representing the reverse proxy 
# on every request. WebSphere Application Server will use this identity to establish the 
# "trust" that is required to validate the WebSEAL iv-* headers. The password for this user 
# should be set in the WebSEAL instance's webseald.conf on the basicauth-dummy-passwd property.
WebSealUser=wpsadmin


# When you create an SSL junction, this is the WebSEAL identity representing the reverse proxy 
# on every request. WebSphere Application Server will use this identity to establish the "trust" 
# that is required to validate the WebSEAL iv-* headers
BaUserName=wpsadmin

# When you create an SSL junction, we can provide a password to the identity representing 
# the reverse proxy on every request. WebSphere Application Server will use this identity to 
# establish the "trust" that is required to validate the WebSEAL iv-* headers
BaPassword=wpsadmin

#
# Portal authorization paramters
#

# Root objectspace entry in the TAM namespace. All Portal roles will be installed under this objectspace entry. 
PDRoot=/WPv6

# When the Tivoli Access Manager external authorization plugin is started, it will detect and, if necessary, 
# create a custom action in Tivoli Access Manager. The combination of the action group and the action determines 
# the TAM permission string required to assign membership to externalized Portal roles. 
PDAction=m

# When the Tivoli Access Manager external authorization plugin is started, it will detect and, if necessary, 
# create a custom action group in Tivoli Access Manager. The combination of the action group and the action 
# determines the TAM permission string required to assign membership to externalized Portal roles. 
PDActionGroup=[WP6]

# When Portal externalizes a role, it can automatically create and attach a TAM ACL granting membership 
# to the user doing the role. If you select No,the TAM administrator will be responsible for creating TAM 
# ACLs to allow access to Portal roles 
PDCreateAcl=true


#
# Portal vault paramters
#

#New vault type identifier representing the Tivoli GSO lockbox vault. The value can be any string
vaultType=AccessManager

# Defines a properties file to be used to configure the vault with TAM specific user and SSL connection 
# information. This file will automatically be created in the <WP_ROOT>/shared/app/config subdirectory 
# and populated by the ant task based on previous task execution.
vaultProperties=accessmanagervault.properties

# Determines if the portal credential vault or any custom portlet is allowed to create new 
# resource objects in TAM. If you select false, our Tivoli administrator must define the accessible \
# resources to associate users with using the Tivoli command line or GUI
manageResources=true

# Determines if the portal credential vault or any custom portlet is allowed to modify the 
# secrets stored in TAM. If you select "Read Only", the Tivoli administrator must change 
# the credentials associated with resources using the Tivoli command line or GUI.
readOnly=false

#
# Tivoli Access Manager - End
#


#
#
# Netegrity SiteMinder
#
#

#
# SiteMinder TAI parameters
#

# Location of the SiteMinder TAI WebAgent.conf file 
SMConfigFile=e:/netegrity6/smwastai/conf/WebAgent.conf

#
# Portal/SiteMinder authorization paramteres
#

#SiteMinder Domain containing all externalized portal resources
SMDomain=WebSphere Portal v6

# SiteMinder Authentication scheme object name to use when creating realms
SMScheme=Basic

# The SiteMinder custom or 4.x web agent created to allow communication between 
# WebSphere Portal and SiteMinder 
SMAgent=ReplaceWithYourSiteMinderAgentName

# Password for SiteMinder agent
SMAgentPwd=ReplaceWithYourSiteMinderAgentPwd

# SiteMinder administrator. This administrator must have a scope of System, as new 
# SiteMinder domains and realms will be created. In addition, creation of the realms 
# representing Portal roles, reference to the webagent, which also requires System scope
SMAdminId=siteminder

#Password for SiteMinder administrative user
SMAdminPwd=ReplaceWithYourSiteMinderAdminPwd

# SiteMinder User Directory object referencing the LDAP server used for Portal users and groups
SMUserDir=ReplaceWithYourSiteMinderUserDirectoryObject

# Failover mode of Siteminder Policy Server. SMFailover must be set to true if more 
# than 1 policy server is listed in the SMServers property below
SMFailover=false

# Comma delimited list of server for SiteMinder agent
# Important: If our Policy Servers are listening on non default ports (ie. not 44441,44442,44443), 
#  add the port property for each policy server manually in the ExternalAccessControlService.properties 
SMServers=your.Policy.Server.ipaddress

#
# Netegrity SiteMinder - End
#

#
# Advanced Security Configuration - End
#

#
# Virtual Portal Configuration - Begin
#


# VirtualPortalTitle: Title of the Virtual Portal
VirtualPortalTitle=

# VirtualPortalRealm: Realm of the Virtual Portal
VirtualPortalRealm=

# VirtualPortalContext: Context of the Virtual Portal
VirtualPortalContext=

# VirtualPortalNlsFile: File which contains language specific information for the Virtual Portal
VirtualPortalNlsFile=

# VirtualPortalObjectId: ObjectId of the Virtual Portal
# The ObjectId is needed to modify, delete Virtual Portals and
# can be obtained by running task list-all-virtual-portals
# Note: Do not delete the default Virtual Portal (ObjectId ends with _0) 
VirtualPortalObjectId=

#
# Virtual Portal Configuration - End
LikemindsSourceDbUser=db2admin
#