[AIX Solaris HP-UX Linux Windows]

Granting write permission for profile-related tasks

The installer can grant write permission of the appropriate files and directories to a non-root user. The non-root user can then create the profile. The installer can create a group for users who are authorized to create profiles, or the installer can give individual users the authority to create profiles. The following example task shows how to create a group that is authorized to create profiles.

Before you begin

This task assumes a basic familiarity with system commands.

This task uses the following terms:
  • Root users refers to:
    • [Linux][AIX][HP-UX][Solaris]Root users
    • [Windows]Administrators
  • Non-root users refers to:
    • [Linux][AIX][HP-UX][Solaris]Non-root users
    • [Windows]Non-administrators
  • Installer refers to a root user or a non-root user.

About this task

Procedure

  1. Log on as the installer to the system where the product is installed.
  2. Create the profilers group that you can use to create profiles.

    Read the documentation for your operating system for information about how to create groups.

  3. Create a user named user1 to create profiles.

    Read the documentation for your operating system for information on how to create users.

  4. Add the installer and user1 to the profilers group.
  5. [Linux][AIX][HP-UX][Solaris]Log off and log back on again as the installer to use the new group.
  6. As the installer, use operating system tools to change directory and file permissions.
    [Linux][AIX][HP-UX][Solaris]The following example assumes that the installation root directory is /opt/IBM/WebSphere/AppServer:
    chgrp profilers /opt/IBM/WebSphere/AppServer/logs/manageprofiles
    chmod g+wr /opt/IBM/WebSphere/AppServer/logs/manageprofiles
    chgrp profilers /opt/IBM/WebSphere/AppServer/properties
    chmod g+wr /opt/IBM/WebSphere/AppServer/properties
    chgrp profilers /opt/IBM/WebSphere/AppServer/properties/fsdb
    chmod g+wr /opt/IBM/WebSphere/AppServer/properties/fsdb
    chgrp profilers /opt/IBM/WebSphere/AppServer/properties/profileRegistry.xml
    chgrp profilers /opt/IBM/WebSphere/AppServer/properties/profileRegistry.xml.semaphore
    chmod g+wr /opt/IBM/WebSphere/AppServer/properties/profileRegistry.xml
    chmod g+wr /opt/IBM/WebSphere/AppServer/properties/profileRegistry.xml.semaphore
    chgrp -R profilers /opt/IBM/WebSphere/AppServer/profileTemplates
    
    [HP-UX]
    chmod -R g+wr /opt/IBM/WebSphere/AppServer/profileTemplates/default/documents 

    [HP-UX]The ownership of files is preserved when the files are copied to the profile directory during profile creation. You granted write permission to the profile directory so that files copied to the profile directory can be modified as part of the profile creation process. Files that are already in the profileTemplate directory structure prior to the start of profile creation are not modified during profile creation.

    [Linux]
    chgrp profilers /opt/IBM/WebSphere/AppServer/properties/Profiles.menu
    chmod g+wr /opt/IBM/WebSphere/AppServer/properties/Profiles.menu
    [Windows]The following example assumes that the installation root directory is C:\Program Files\IBM\WebSphere\AppServer. Follow instructions in the Windows documentation to give the profilers group read and write permission to the following directories and their files:
    C:\Program Files\IBM\WebSphere\AppServer\logs\manageprofiles
    C:\Program Files\IBM\WebSphere\AppServer\properties
    C:\Program Files\IBM\WebSphere\AppServer\properties\fsdb
    C:\Program Files\IBM\WebSphere\AppServer\properties\profileRegistry.xml
    C:\Program Files\IBM\WebSphere\AppServer\properties\profileRegistry.xml.semaphore

    You might have to change the permissions on additional files if the non-root user encounters permission errors. If you authorize a non-root user to delete a profile, for example, the user might have to delete the following file:

    [Linux][AIX][HP-UX][Solaris]app_server_root/properties/profileRegistry.xml_LOCK

    [Linux][AIX][HP-UX][Solaris]app_server_root/properties/profileRegistry.xml.semaphore_LOCK

    [Windows]app_server_root\properties\profileRegistry.xml_LOCK

    [Windows]app_server_root\properties\profileRegistry.xml.semaphore_LOCK

    Give write access to the non-root user for the file to authorize the user to delete the file. If the non-root user still cannot delete the profile, then the installer can delete the profile.

  7. Make the configuration directory accessible to non-root users.
    Perform one of the following actions:
    • Redirect pointers to the configuration directory to a location other than app_server_root/configuration.
      Point to a directory that is writable by non-root users. For example, in app_server_root/bin/setupCmdLine.sh change
      OSGI_CFG="-Dosgi.configuration.area=$WAS_HOME/configuration"
      to
      OSGI_CFG="-Dosgi.configuration.area=writable_directory/configuration"
    • Make the app_server_root/configuration directory writable by non-root users.

Results

The installer created the profilers group and gave the group proper permissions to certain directories and files to create profiles.

These directories and files are the only ones in the installation root of the product to which a non-root user needs to write to create profiles.

What to do next

The non-root user that belongs to the profilers group can create profiles in a directory that the non-root user owns and to which the non-root user has write permission. However, the non-root user cannot create profiles in the installation root directory of the product.

A non-root user ID can manage multiple profiles. For a given profile, have the same non-root user ID manage the entire profile.

The non-root user can use the same tasks to manage a profile that the root user uses.