Documentation Issues
■
“Document the roles and ltered roles support for LDAPv3 plug-in (6365196)” on page 33
■
“Document unused properties in the AMConfig.properties le (6344530)” on page 33
■
“Document how to enable XML encryption (6275563)” on page 33
Document the roles and ltered roles support for LDAPv3 plug-in
(6365196)
After applying the respective patch, you can congure roles and ltered roles for the LDAPv3
plug-in, if the data is stored in Sun Java System Directory Server (xes problem ID 6349959). In
the Access Manager 7.1 Administration console, in LDAPv3 conguration for the “LDAPv3
Plug-in Supported Types and Operations” eld, enter the values as:
role: read,edit,create,delete
filteredrole: read,edit,create,delete
You can enter one or both of the above entries, depending on the roles and ltered roles you
plan to use in your LDAPv3 conguration.
Document unused properties in the AMConfig.properties le
(6344530)
The following properties in the AMConfig.properties le are not used:
com.iplanet.am.directory.host
com.iplanet.am.directory.port
Document how to enable XML encryption (6275563)
To enable XML encryption for either Access Manager or Federation Manager using the Bouncy
Castle JAR le to generate a transport key, follow these steps:
1. If you are using a JDK version earlier than JDK 1.5, download the Bouncy Castle JCE
provider from the Bouncy Castle site (
http://www.bouncycastle.org/). For example, for
JDK 1.4, download the bcprov-jdk14-131.jar le.
2. If you downloaded a JAR le in the previous step, copy the le to the jdk_root/jre/lib/ext
directory.
3. For the domestic version of the JDK, download the JCE Unlimited Strength Jurisdiction
Policy Files from the Sun site (
http://java.sun.com) for your version of the JDK. For IBM
WebSphere, go to the corresponding IBM site to download the required les.
4. Copy the downloaded US_export_policy.jar and local_policy.jar les to the
jdk_root/jre/lib/security directory.
KnownIssues andLimitations
SunJavaSystemAccessManager 7.1ReleaseNotes 33