Two ways to avoid entering the boot username and password in very Weblogic Server startup
1.setting "WLS_USER" and "WLS_PW" in "$DOMAIN_HOME/bin/startWebLogic.sh" file.
.......
WLS_USER="wlsadmin"
WLS_PW="weblogic"
if [ "${WLS_USER}" != "" ] ; then
JAVA_OPTIONS="${JAVA_OPTIONS} -Dweblogic.management.username=${WLS_USER}"
fi
if [ "${WLS_PW}" != "" ] ; then
JAVA_OPTIONS="${JAVA_OPTIONS} -Dweblogic.management.password=${WLS_PW}"
.......
2.creating the boot.properties file
#cd $DOMAIN_HOME/server/PROD_AdminServer
#mkdir security
#cd security
#echo -ne "username=wlsadmin\npassword=<password>" > boot.properties
#cat boot.properties
username=wlsadmin
password=<password>
The next time you start Weblogic Administration Server, it will use the credentials from the boot.properties file. The file will also be encrypted.
相关推荐
If you have installed a new version of your application in the encrypted web directory, you can do so by configuring the username and password of access files, or allow this component to be displayed...
Aimed at entering graduate students and practicing researchers in the earth and ocean sciences, this book is ideal for those who want to learn how to analyze data using MATLAB in a statistically ...
Working with Data Ranges and Tables is a two-lesson intermediate level course that guides you through organizing, entering and validating worksheet data and then effectively sorting, filtering, ...
The user login function allows access only after entering the correct username and password. There's also a password modification feature, which can only be executed when the user is logged in. The ...
In the first case, sound waves are emitted from the camera, and by measuring the delay in their reflection, distance to the subject is calculated. Polaroid cameras were known for successfully ...
However this body of knowledge is something of a barrier for anybody entering the field, or even looking to see if they want to enter the field -- What is the right algorithm for a particular pr
1.The first task is to modify the main() function in Figure 3.36 so that a child process is forked and executes the command specified by the user. The next task is to modify the shell interface ...
- Changed the Memory test to wait for the Video Playback test and 3D test to allow memory allocation for these tests. - Minor changes to the No operation error watchdog timer for the CD and Hard ...
Designed for users of data analysis tools, as well as researchers and developers, the book should be useful for anyone interested in entering the "world" of R and data mining. About the Author Luís...
This section serves as a disclaimer to avoid any legal issues related to the use of trademarks within the document. #### Overview of a Linux System The guide provides a detailed overview of the ...
The unprecedented success of iPhone and iPod touch serves as proof positive that application developers are entering uncharted territory when it comes to creating sophisticated, multi-functional ...
Designed for users of data analysis tools, as well as researchers and developers, the book should be useful for anyone interested in entering the "world" of R and data mining. Table of Contents ...
With the explosive growth in the industry for highly-integrated semiconductor circuits the construction- and fault analysis for these products has become very important. It plays a key role since it ...
courses, such as knowledge, and use AutoCAD software to carry on the drawing, so the comprehensive practice is a very important link, is also a comprehensive, standardized training in practice....
The static logic design ensures reliable operation even at very low clock frequencies or down to zero frequency, entering power-saving modes when necessary. The AT89S51 offers two power-saving modes...
use guide for learning how to secure networks with the world-class PIX Firewall Ideal for network administrators with little or no firewall experience Easily explains how to implement a security ...
DOS can copy critical programs and data to the RAMdisk where they will be read or written at memory speed If loaded after CONFIG SYS RDISK files can be assigned to any free DOS drive letter using ...
l CPU's from the 8086/8088 to the Pentium III and Athlon l Real, protected and virtual models l Windows and plug&play devices l CPU Clones from all major manufacturers l Chipsets and support chips...