This blog introduces how to diagnose Agile PLM related issues.

  • May 30, 2014

Allow agile user to login Weblogic Admin Console

Jie Chen
Senior Principal Technical Support Engineer

By default, Agile uses the default user superadmin as the administrator user to start Weblogic and logon Admin Console. We also can enable any type of users to start Weblogic or manage it, for example the DB user and LDAP user.

  • DB User to start WLS and logon WLS console

  • LDAP user to logon WLS console

Note: As we talked in previous article Agile superadmin authentication during Weblogic startup, user authentication during WLS startup is based on the DB connection, so LDAP user is not feasible to start WLS.

DB User to start WLS and logon WLS console

To allow DB user to start and login Weblogic, we only modify agile.properties and boot.properties file. Note if enable wls.admin.console.users in agile.properties file will override the user account in boot.properties. That is to say, if superadmin user to start WLS but also other user to logon WLS console, add both superadmin and other users to wls.admin.console.users parameters like below.

wls.admin.console.users =superadmin;admin;jiechen

If other user to start and logon WLS console, need to modify both files to remove superadmin as below.

wls.admin.console.users =admin;jiechen

LDAP user to logon WLS console

Each user in wls.admin.console.users will be added to WLS subject as separate principle and must be validated through WLSLoginModule.class which only works as DB authentication. So if add one ldap user to wls.admin.console.users and expect this user to logon WLS console will get 403--Forbidden error.

Error 403--Forbidden
From RFC 2068 Hypertext Transfer Protocol -- HTTP/1.1:
10.4.4 403 Forbidden
The server understood the request, but is refusing to fulfill it.
Authorization will not help and the request SHOULD NOT be repeated.
This status code is commonly used when the server does not wish to reveal exactly why the request has been refused,
or when no other response is applicable.

And in WLS server log the detailed error is:

at com.agile.util.Scrambler.getHashAlgorithm(Scrambler.java:107)
at com.agile.admin.security.userregistry.DBUserAdapter.checkPassword(DBUserAdapter.java:89)
at com.agile.admin.security.userregistry.DBUserAdapter.validateCredentials(DBUserAdapter.java:858)
at com.agile.admin.security.weblogic.WLSLoginModule.validate(WLSLoginModule.java:477)
at com.agile.admin.security.weblogic.WLSLoginModule.login(WLSLoginModule.java:199)
at com.bea.common.security.internal.service.LoginModuleWrapper$1.run(LoginModuleWrapper.java:110)
at java.security.AccessController.doPrivileged(Native Method)
at com.bea.common.security.internal.service.LoginModuleWrapper.login(LoginModuleWrapper.java:106)

To make it feasible we have to setup on WLS console manually after you successfully set up LDAP Authentication provider in WLS.
First logon WLS console as the DB user, go to Security Realms >AgileRealm >Realm Roles, then expand Global Roles || Roles || Admin, click View Role Conditions link.

Add a new OR condition "User ldapuser1" with Administrators group. Enable the modification, then user ldapuser1 is able to logon WLS console.

Additionally, if add a new OR condition "Group LDAP Group 1", the all the ldap users in the Group of "LDAP Group 1" are allowed to logon as well.

Be the first to comment

Comments ( 0 )
Please enter your name.Please provide a valid email address.Please enter a comment.CAPTCHA challenge response provided was incorrect. Please try again.