The federated repositories option is the default user account repository option for profiles. You can change the type of user account repository if needed for your environment.
To enable authenticated access to Process
Portal, you must have a user
registry configured and application security enabled. For information
about application security, see Enabling security for the Business Space
component:
.
Configuring Lightweight Directory Access Protocol
search filters in the WebSphere Application Server documentation.
Managing the realm in a federated repository configuration in
the WebSphere Application Server documentation.
.If you find the following errors in the SystemOut.log file, you might have extra attributes in your user registry that cannot be processed:
00000046 SystemErr R Caused by: com.ibm.websphere.wim.exception.WIMSystemException: CWWIM1013E
The value of the property secretary is not valid for entity uid=xxx,c=us,ou=yyy,o=ibm.com.
00000046 SystemErr R at com.ibm.ws.wim.adapter.ldap.LdapAdapter.setPropertyValue(LdapAdapter.java:3338)
com.ibm.mashups.user.userProfile = LIMITED
com.ibm.mashups.user.groupProfile = LIMITED
The ConfigServices.properties file is located at profile_root\BusinessSpace\node_name\server_name\mm.runtime.prof\config\ConfigService.properties for a stand-alone server or deployment_manager_profile_root\BusinessSpace\cluster_name\mm.runtime.prof\config\ConfigService.properties for a cluster. After modifying the ConfigServices.properties file, run the updatePropertyConfig command using the wsadmin scripting client by following the instructions in step 4.d.
If you have Java EE security enabled in a cluster, consider tightening the entry in the server policy applied to the Business Space help location.
The Business Space help location policy is:
grant codeBase "file:${was.install.root}/profiles/profile_name/temp/node_name/-" {
permission java.security.AllPermission;
};
Tighten the policy by changing it to:
grant codeBase "file:${was.install.root}/profiles/profile_name/temp/node_name/server_name/BSpaceHelpEAR_node_name_server_name/BSpaceHelp.war/-" {
permission java.security.AllPermission;
};