Client authentication

Users are authenticated when a client application creates a proxy or stub object (a connection is made when the application creates the first proxy or stub; other proxies or stubs may use the same connections or allocate new connections as needed).

Authentication options for base clients include:

EAServer provides a special user name, admin@system, for the EAServer Administrator login. Administrator authentication is performed independently of the authentication option you configure. By default, the admin@system user name has no password. Use the set-admin-password batch file located in the EAServer bin directory to establish the admin@system password.

NoteSet the administrator password for new servers Immediately after you create a new server, you must secure access to the server by defining the admin@system password and configuring the authentication mechanism of your choice. See “Administration password and OS authentication” in the EAServer System Administration Guide for more information.

For backwards compatibility, you can use “jagadmin” as an alias for “admin@system”. However by default you cannot have an empty password. To allow an empty password (which is not recommended) you must set the “minimum password length” property of the “default” Security Domain to “0”.

By default, the admin@system user name has no password. Use the set-admin-password batch file located in the EAServer bin subdirectory to establish the admin@system password, otherwise the server will not start.

The “admin@system” password must be the same for all members of a cluster.

User installed authentication services You can install your own service component to authenticate clients for any EAServer. For example, if you require the client user name to match a remote database user name, you can code the component to retrieve the client user name and password and attempt to log in to the remote database. For more information, see Chapter 7, “Creating and Using Custom Security Components.”