When you install the WSA, you can choose to enable security. In this case, security is preset to enable access to WSA administration with two predefined administrator roles, PSCAdmin (for system administrators) and PSCOper (for system operators). However, you can define your own custom administrator roles.
To define your own custom administrator roles:
1. Enable the Java container to authenticate users and grant them access if they hold a membership in one of your customized administrator roles. To do so, in the WSA's web.xml file, in the security-constraint for WSA administration, add a role-name element for each of your customized administrator roles.
A security-constraint for WSA administration looks like the following:
<security-constraint>
<web-resource-collection>
<url-pattern>/wsa1/admin/*</url-pattern/*>
</web-resource-collection>
</security-constraint>
The syntax for a role-name element is:
For example, if you created the new administrator roles tempadmin1 and tempadmin2, you might modify the security-constraint for WSA administration to appear as follows:
3. Modify the adminRole property of the WSA to add the new role-names to the list of role-names. The technique for doing so depends on whether the WSA instance is local (residing on the AdminServer machine) or remote (not residing on the AdminServer machine).
If the WSA is local, select the WSA instance in OpenEdge Management or OpenEdge Explorer. Then, in the WSA's Security tab, in the Admin Role Links, add the new role-names. For more information, see the online help.
If the WSA instance is remote, using a text editor, edit the ubroker.properties file. In the adminRoles property, add the new role-names to the comma-separated list of existing role names, as shown: