What is new for scripted administration (wsadmin)

This topic highlights what is new or changed, for users who are going to customize, administer, monitor, and tune production server environments using the wsadmin tool.

The Deprecated, stabilized, and removed features topic describes features that are being replaced or removed in this or future releases.

Improved administrative scripting features

Jython script library

The Jython script library provides a set of procedures to automate the most common application server administration functions. For example, you can use the script library to easily configure servers, applications, mail settings, resources, nodes, business-level applications, clusters, authorization groups, and more. You can run each script procedure individually, or combine several procedures to quickly develop new scripts.

For more information, see Using the script library to automate the application serving environment using wsadmin scripting.

Wildcard pattern usage for the AdminTask help and AdminConfig list commands

Use Java regular expression patterns and wildcard patterns with the AdminTask.help('–commands') command to query for command names and with AdminConfig.list, AdminConfig.types and AdminConfig.listTemplates functions to query for configuration object types.

For more information about using patterns with the AdminTask object, see Obtaining online help using wsadmin scripting.

For more information about using patterns with the AdminConfig object, see Commands for the AdminConfig object using wsadmin scripting.

Complex parameter type support

Use primitive and complex Java™ data types for the parameters of the AdminTask commands.

For more information, see Data types for the AdminTask object using wsadmin scripting.

AdminTask command support for configuring certificate authority (CA) clients

Use the wsadmin tool to manage certificate authority (CA) client configurations. Use the commands and parameters in the CAClientCommands group to create, modify, query, and remove connections to a third-party CA server.

For more information, see CAClientCommands command group for the AdminTask object.

AdminTask command support for configuring security auditing

While security authentication and authorization ensures that users must have access to view protected resources, security auditing provides a mechanism to validate the integrity of a security computing environment. Security auditing collects and logs authentication, authorization, system management, security, and audit policy events in audit event records. You can analyze audit event records to determine possible security breaches, threats, attacks, and potential weaknesses in the security configuration of your environment. Enable security auditing in your environment.

For more information, see Configuring security auditing using scripting.

AdminTask command support for configuring multiple security domains

Create multiple security configurations and assign them to different applications in WebSphere Application Server processes. By creating multiple security domains, you can configure different security attributes for both administrative and user applications within a cell environment. You can configure different applications to use different security configurations by assigning the servers or clusters or SIBuses that host these applications to the security domains. Only users assigned to the administrator role can configure multiple security domains.

For more information, see Configuring multiple security domains using scripting.

AdminTask command support for configuring business-level applications

A business-level application is an administration model that provides the entire definition of an application as it makes sense to the business. A business-level application is a WebSphere® configuration artifact, similar to a server or cluster, that is stored in the product configuration repository.

For more information, see Setting up business-level applications using wsadmin scripting.

AdminTask command support for managing configurations using properties files

Manage your system configuration using properties files. Use the commands in the PropertiesBasedConfiguration group to copy configuration properties from one environment to another, troubleshoot configuration issues, and to apply one set of configuration properties across multiple profiles, nodes, cells, servers, or applications.

For more information, see PropertiesBasedConfiguration command group for the AdminTask object using wsadmin scripting.

AdminTask command support for configuring proxy servers

Use the commands and parameters in the ProxyManagement group to configure proxy servers for Web modules.

For more information, see ProxyManagement command group for the AdminTask object.




Related concepts
What is new in this release
Related tasks
Using the script library to automate the application serving environment using wsadmin scripting
Obtaining online help using wsadmin scripting
Configuring security auditing using scripting
Configuring multiple security domains using scripting
Setting up business-level applications using wsadmin scripting
Related reference
Deprecated, stabilized, and removed features
Commands for the AdminConfig object using wsadmin scripting
Data types for the AdminTask object using wsadmin scripting
CAClientCommands command group for the AdminTask object
PropertiesBasedConfiguration command group for the AdminTask object using wsadmin scripting
ProxyManagement command group for the AdminTask object
Concept topic    

Terms of Use | Feedback

Last updated: Oct 20, 2010 11:50:58 PM CDT
http://www14.software.ibm.com/webapp/wsbroker/redirect?version=compass&product=was-base-iseries&topic=welc_newadministrator
File name: welc_newscripting.html