Assigning users from a foreign realm to the admin-authz.xml
Operating with the administrative agent and job manager topology allows more situations where you might need to add an administrative user from a different registry into your administrative authorization table (admin-authz.xml). Each administrative user that needs to be added requires the "accessID" format of the user from the remote registry. When that user finally is active in the local cell, the authorization table will already have that accessID that is required. This task demonstrates how this assignment of users is performed.
Procedure
Results
admin-authz.xml
in
the receiving administrative process to allow a "cross-realm authorization"
to succeed. The example illustrated here was for a LocalOS registry
user. Performing the same task for an LDAP accessId produces results
that look more like a realm and distinguished name (DN).Note: If
you change your realm you must repeat this process with the new realm
name.