Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Table of Contents

...

  1. Run Service Manager from the desktop (if it is not running). You can locate Service Manager from system tray


  2. Run both Services, one after the other.


  3. To validate if ActiveMQ is running, login to the web-console via http://broker-[x]-ip:[web-console-port] with the default credentials [admin/admin] or as per your configured credentials. Reference ActiveMQ Web Console Configuration

  4. In the Queue section, you should find a Queue name Connector1 created.

  5. You can also verify ActiveMQ and GenericConnector from their log files by clicking on the Logs button in both Sections.

ActiveMQ Configuration (Redundant Deployment Only)

...

  1. Create a new Object in Active Directory with a class of type ‘GroupOfUniqueNames’  in any group and give it any name. This name should match with the roles attribute of SecurityConstraint in the <EF Connector Home>\conf\jetty.xml, which is explained here. For illustration purposes, we have created an empty group with type ‘Container’ called AdminTestGroup. In this container we have created an object of type ‘GroupOfUniqueNames’ called AdminRoles.




  2.  In the next step, add the user you want to give access to as a unique member of AdminRoles. Here we have added the distinguished name of the user called djtest.


    You can find a user’s distinguished name from User’s Properties > Attribute Editor >   distinguishedName.

  3. After adding the members to the group you should be able to see them in the group

    Jetty/ActiveMQ Configuration

    In <EF Connector Home>\conf\jetty.xml

    Modify the securityConstraint bean in the jetty.xml file and change the value of the roles to the name that you provided to the group you created above with the type ‘GroupOfUniqueNames’ in our case this is AdminRoles.

    Modify the securityHandler bean in jetty.xml and change the ref of property name ‘loginService’ to ‘ldapLoginService’ as shown below 



    Also uncomment the following property ‘identityService’ in securityHandler bean

    You will find the ldap.config file on this path  <EF Connector Home>\conf\ldap.config. 

    You will have to update this file according to your Active Directory settings. 

    Note: Please do not change this string “amqLdapLoginModule“

...

4)  You should get two certificates which look like this

5) Now import these certificates using these commands

...