Hi,
We have an application from a vendor that is behaving in a way I didn't expect. It was designed as a single all in one solution but our environment has the traditional split between Application Server and Database.
So here the Administrative Security for WAS is set against an LDAP - Standalone Repository (fine). Application Security is enabled (which is key). All okay there.
Next we provide database access to a functional ID called Billing. In WAS I define the J2C credentials for Billing and associate them with the datasource. When I test the datasource connection it fails as the application attempts to look for the user first in the LDAP! So I have to have Billing in the LDAP
and Billing on the database host (which is ludicrous and defeats the purpose of separation for security).
If I disabled Application Security then the jdbc test goes straight to the Database to check the credentials (and Billing only exists on the database server as expected). However, now the application administration console (built into the application) is not secure so this doesn't work.
Is there any way to get more granular in terms of security settings at this point? Am I missing something basic here? (Application Vendor has backed away from this one)
Thanks,
Paul