PDRTE_config

Configures the Security Access Manager Runtime on AIX®, Linux, and Solaris platforms.

Syntax

PDRTE_config [–c certificate] [–d ad_domain] [–E use_ssl {yes|no}] [–f key_file] [–F key_file_password] [–g key_file_label] [–G ad_multiple_domain {yes | no}] [–h policy_server_host_name] –H LDAP_server_host_name [–i response_file] [–l local_domain] [–P port] [–r port] [–R dnforaccess] [–s silent {yes | no}] [–S local_policy_server {yes | no}] –t registry_type {ldap | active_directory_ldap} [–T tivoli_common_directory] [–u ad_alt_upn {yes | no}] [–v ad_gc_server]

Description

The PDRTE_config utility configures the Security Access Manager Runtime on AIX, Linux, and Solaris platforms. You can run this utility directly from the command line.

Parameters

–c certificate
Specifies the name of the policy server base-64 encoded, self-signed certificate. For example, /var/PolicyDirector/keytab/pdcacert.b64
If the certificate file is not specified, the certificate is downloaded from the Security Access Manager policy server. (Optional)
–d ad_domain
Specifies the Active Directory domain name. For example, dc=ibm,dc=com.

This parameter is required when Active Directory is the user registry. (Optional)

–E use_ssl {yes | no}
Specifies whether to enable SSL communication between the runtime and the registry server. The valid responses are yes and no. The default value is no. (Optional)
–f key_file
Specifies the fully qualified file name of the client-side key file. The key file holds the server-side certificates that are used in secure communication. This parameter is required when use_ssl is set to yes, which means that SSL communication is enabled. (Optional)
–F key_file_password
Specifies the existing password that is associated with the specified key_file. This password was set when the key file was created. This parameter is required if use_ssl is set to yes. (Optional)
–g key_file_label
Specifies the server certificate label name that is in the key_file. The label was set when server certificate was imported in client-side key file. This parameter is required when use_ssl is set to yes, which means that SSL communication is enabled. (Optional)
–G ad_multiple_domain {yes|no}
Configures Security Access Manager in Active Directory multiple domain environment. The valid responses are yes and no. The default value is no. (Optional)
–h policy_server_host_name
Specifies the host name of the Security Access Manager policy server. This parameter is required if local_policy_server is no. You can specify any valid IP host name. For example: libra.example.ibm.com. (Optional)
–H LDAP_server_host_name
Specifies the IP address or host name of the LDAP server. You can specify any valid IP host name. For example:
host = libra
host = libra.dallas.ibm.com
–i response_file
Specifies the fully qualified path and file name of the response file to use during silent configuration. A response file can be used for configuration. There is no default response file name. The response file contains stanzas and key=value pairs. For information about using response files, see the "Using response files" appendix in the IBM Security Access Manager for Web Command Reference. (Optional)
–l local_domain
Specifies the local domain name for the Runtime that is being configured. (Optional)

A local domain is a Security Access Manager secure domain that is used by programs when no explicit domain is specified. If the parameter is not specified, the local domain defaults to the management domain.

A valid local domain name is an alphanumeric, case-sensitive string. Valid characters are a-z, 0-9, -, and _.

–P port
Specifies the port number of the LDAP server. Use the LDAP server-configured port number. The default port number is 636 if Secure Sockets Layer (SSL) is used and 389 if SSL is not used. (Optional)
–r port
Specifies the port number for the Security Access Manager Policy server. This parameter is required if local_policy_server is no. The default value is 7135. (Optional)
–R dnforaccess
Specifies the distinguished name (DN) for the data location on the Active Directory server that stores Security Access Manager data.
The parameter is required if ad_multiple_domain is no. If ad_multiple_domain is yes, then the default value is the value of ad_domain.
–s silent {yes | no}
Specifies silent configuration. The valid responses are yes or no. If the value is yes, the utility runs in silent mode. If the value is no, the utility runs in interactive mode. (Optional)
–S local_policy_server {yes | no}
Indicates whether the policy server is installed on the same computer. The valid responses are yes or no. The default value is no. (Optional)
–t registry_type {ldap | active_directory_ldap}
Specifies the type of registry server to be set up for Security Access Manager. The valid responses are ldap and active_directory_ldap.
–T tivoli_common_directory
Enables Tivoli Common Directory logging and specifies the fully qualified path location for common logging. When Tivoli Common Directory is enabled, all of the Security Access Manager message log files are placed in this common location. (Optional)
–u ad_alt_upn {yes | no}
Security Access Manager supports an email address (alternative format) of the userPrincipalName attribute of the Active Directory user object as its user ID. The valid responses are yes and no. If set to no, only the default format of the userPrincipalName can be used as the Security Access Manager user ID. The default value is no. (Optional)
–v ad_gc_server
Security Access Manager supports an email address (alternative format) of the userPrincipalName attribute of the Active Directory user object as its user ID. Specify the Global Catalog server host name, such as gcserver.us.ibm.com, to enable the support.
If not specified, only the default format of the userPrincipalName can be used as the Security Access Manager user ID. (Optional)

Availability

This utility is in /opt/PolicyDirector/sbin, the default installation directory on AIX, Linux, and Solaris operating systems.

When an installation directory other than the default is selected, this utility is in the /sbin directory under the installation directory (for example, installation_directory/sbin).

Return codes

0
The utility ran successfully.
1
The utility failed. When a utility fails, the software a description of the error. See the IBM Security Access Manager for Web Error Message Reference. This reference provides a list of the Security Access Manager error messages by decimal or hexadecimal codes.

Examples

The following example configures the Security Access Manager Runtime by using LDAP as the user registry. The policy server is installed on the same computer:
./PDRTE_config -S yes -t ldap -H libra.example.ibm.com -P 389 -s yes