Validating Security Setup

If users are reporting access is denied errors where access should be allowed, validate your security setup. A security configuration is defined at the cluster level by the platform administrator, then assigned at domain and package levels by either administrator type, so it may take some analysis to determine where the problem is occurring.

Use the security log to evaluate the properties of the assigned security configuration.

  1. In Sybase Control Center, expand the navigation tree in the Unwired Platform administration perspective until you locate the security configuration that generated the error. It appears either in the Domains > <domain_name> > Security folder or the Security folder at the cluster root.
  2. Select the configuration you are investigating.
    • If the security configuration is assigned to a domain, validate that the role mapping is correct:
      • If the Unwired Platform user is the exact name of the user in the security repository, then no mapping is required.
      • If the Unwired Platform user differs, even slightly, then logical roles used by the package, and physical roles used in the repository must be manually mapped.
    • Review the existing security policy with the security administrator to ensure that privileges are set correctly.