Use the Administrative Group Roles page to give groups specific authority to administer application servers through tools such as the administrative console or wsadmin scripting. The authority requirements are only effective when administrative security is enabled. Use the Common Object Request Broker Architecture (CORBA) naming service groups page to manage CORBA Naming Service groups settings. To view the Console Groups administrative console page, complete either of the following steps:
To view the CORBA naming service groups administrative console page, click Environment > Naming > CORBA Naming Service Groups.
Identifies CORBA naming service groups.
In previous releases of WebSphere Application Server, there were two default groups: ALL AUTHENTICATED and EVERYONE. However, EVERYONE is now the only default group, and it provides CosNamingRead privileges only.
Data type: | String |
Range: | EVERYONE |
Identifies naming service group roles.
A number of naming roles are defined to provide the degrees of authority that are needed to perform certain application server naming service functions. The authorization policy is only enforced when global security is enabled. Four name space security roles are available: CosNamingRead, CosNamingWrite, CosNamingCreate, and CosNamingDelete. The roles have authority levels from low to high:
Data type: | String |
Range: | CosNamingRead, CosNamingWrite, CosNamingCreate, and CosNamingDelete |
Specifies groups.
The ALL_AUTHENTICATED and the EVERYONE groups can have the following role privileges: Administrator, Configurator, Operator, and Monitor.
Data type: | String |
Range: | ALL_AUTHENTICATED, EVERYONE |
Specifies user roles. The following administrative roles provide different degrees of authority needed to perform certain application server administrative functions:
Note: To manage users and groups, click Users and Groups in the console navigation tree. Click either Manage Users or Manage Groups.
Data type: | String |
Range: | Administrator, Operator, Configurator, Monitor, Deployer and iscadmins |
Note: Other arbitrary administrative roles might also be visible in the administrative console collection table. Other contributors to the console might create these additional roles, which can be used for applications that are deployed to the console.