× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



If you look at the source for the testidentitytokens.ear sample app in 
/QIBM/ProdData/OS400/security/eim, it shows how to use identity tokens to 
create AS400 object connections.    

IBM had been writing a JDBC identity token connection factory built on top of 
that.  From a programming perspective, it looks exactly like a regular data 
source.  IBM sent us a copy of it, but I don't know if it's in release status 
yet.  Patrick Botz may know more about whether or not they're planning to 
release.

One final note: you may have problems if you upgrade your WAS to 6.0.2.5.  The 
EIM functions broke ("User ID is not known") with that patch release.  We have 
a PMR opened on it.

--Robert

-----Original Message-----
From: wdsci-l-bounces@xxxxxxxxxxxx on behalf of Dame, Mark
Sent: Mon 3/6/2006 4:31 PM
To: WDSCI-L@xxxxxxxxxxxx
Subject: [WDSCI-L] Enterprise Identity mapping
 
Has anyone tried using Enterprise Identity Mapping to manage the
connection sign on's in WDSC?  I can find a lot of stuff on writing
apps, webfacing, etc.  But nothing that says it works for the
connections.
 
Thanks

Mark Dame 
mark.dame@xxxxxxxxxxxxxx 
Phone: (330) 926-5407 
Fax:      (330) 926-5421 
IM:        utopia_caravan 

The major difference between a thing that might go wrong and a thing
that cannot possibly go wrong is that when a thing that cannot possibly
go wrong goes wrong it usually turns out to be impossible to get at or
repair. 

Douglas Adams

 


This message (including any attachments) contains confidential 
and/or proprietary information intended only for the addressee.  
Any unauthorized disclosure, copying, distribution or reliance on 
the contents of this information is strictly prohibited and may 
constitute a violation of law.  If you are not the intended 
recipient, please notify the sender immediately by responding to 
this e-mail, and delete the message from your system.  If you 
have any questions about this e-mail please notify the sender 
immediately.  
 
Ce message (ainsi que les eventuelles pieces jointes) est 
exclusivement adresse au destinataire et contient des 
informations confidentielles. La copie, la communication ou la 
distribution du contenu de ce message sans l'accord prealable de 
l'expediteur sont strictement interdits et peuvent constituer un 
delit. Si vous n'etes pas destinataire de ce message, merci de le 
detruire et d'avertir l'expediteur. Si vous avez des questions se 
rapportant a ce courrier electronique, merci de bien vouloir 
notifier 
l'expediteur immediatement.

As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.