Book description
This IBM Redbooks publication recommends strategies that you can
use to replace the Distributed Computing Environment (DCE)
dependencies in your environment and move to new technologies. The
following topics are covered:
- DCE overview and recap
- Replacement technologies
- Replacement strategies
- Replacement scenarios
- Replacement coding examples
This book is a valuable information source if you are an executive, administrator, or developer of an IBM customer environment that uses IBM DCE for a distributed systems and application infrastructure.
Although strategies for replacing DCE are described, the book does not cover strategies for replacing dependencies to IBM products that use DCE, such as DFS and TXSeries.
Please note that the additional material referenced in the text is not available from IBM.
Table of contents
- Tables
- Figures
- Notices
- Preface
-
Part 1: Description of the DCE replacement strategies
- Chapter 1: DCE review
- Chapter 2: Replacement technologies
-
Chapter 3: Replacement strategies
- Replacement strategies for C/C++ applications (1/4)
- Replacement strategies for C/C++ applications (2/4)
- Replacement strategies for C/C++ applications (3/4)
-
Replacement strategies for C/C++ applications (4/4)
- Auditing
- Authentication
- Authorization, PAC, and UUID
- Backing store
- Configuration
- Delegation, GSS-API, and login
- Directory
- Extended Registry Attributes
- Event management
- GSS-API
- Host management
- Integrated login
- Login
- Messaging
- PAC
- Password strength
- Protection
- Registry
- RPC services
- Serviceability
- Threads
- Time
- UUID
- Replacement strategy for Java applications
- Replacement strategies for mixed applications
- Chapter 4: Using DCE data with IBM Network Authentication Service
-
Chapter 5: Using DCE objects with IBM Tivoli Access Manager
- Introduction
- Data representation
- Configuration scenarios
- Managing objects in a shared environment (1/2)
-
Managing objects in a shared environment (2/2)
- Creating a user with IBM Tivoli Access Manager
- Creating a group with IBM Tivoli Access Manager
- Adding a member to a group using IBM Tivoli Access Manager
- Deleting a user using IBM Tivoli Access Manager
- Deleting a group using IBM Tivoli Access Manager
- Removing a member from an IBM Tivoli Access Manager group
- Creating a principal with DCE
- Creating a DCE group
- Adding a member to a group using DCE
- Deleting a user using DCE
- Deleting a group using DCE commands
- Removing a member from a group with DCE commands
- Sharing policies
- Attaching a DCE policy
- Deleting a shared DCE policy
- Chapter 6: Binary structure of DCE ERA data in LDAP
-
Part 2: Replacement sample scenarios
- Chapter 7: Common replacement considerations
-
Chapter 8: Scenario 1: GSS-API application
- Scenario description
- DCE application (1/2)
- DCE application (2/2)
- Replacement roadmap (1/3)
- Replacement roadmap (2/3)
- Replacement roadmap (3/3)
- Revised application discussion
- Administration considerations and interfaces (1/3)
- Administration considerations and interfaces (2/3)
- Administration considerations and interfaces (3/3)
- Discussion and conclusions
- Chapter 9: Scenario 2: Non-secure RPC application
-
Chapter 10: Scenario 3: Secure RPC application #1
- Scenario description (1/2)
- Scenario description (2/2)
- DCE application (1/2)
- DCE application (2/2)
- Replacement roadmap (1/4)
- Replacement roadmap (2/4)
- Replacement roadmap (3/4)
-
Replacement roadmap (4/4)
- Software requirements
- Installing and configuring IBM WebSphere Application Server
- Configuring WebSphere Application Server security
- Configuring the application client
- Developing the application
- Configuring IBM Directory Server
- Assembling the scenario application
- Deploying and starting the application
- Running the application client
- Revised application discussion (1/3)
- Revised application discussion (2/3)
- Revised application discussion (3/3)
- Administration considerations and interfaces
- Discussion and conclusions
-
Chapter 11: Scenario 4: Secure RPC application #2
- Scenario description
- DCE application
-
Replacement roadmap
- Software requirements
- Installing and configuring IBM WebSphere Application Server
- Configuring WebSphere Application Server security
- Configuring the application client
- Developing the application
- Configuring IBM Directory Server
- Assembling the scenario application
- Deploying and starting the application
- Running the application client
- Revised application discussion
- Administration considerations and interfaces
- Discussion and conclusions
-
Part 3: Appendixes
-
Appendix A: Scenario 1: Source code listings
- Application with DCE dependencies
- Makefile for application client
- Makefile for application server
- DCE dependent application client (1/2)
- DCE dependent application client (2/2)
- DCE dependent application server
- Authorization module with DCE dependencies
- Utility source of the DCE dependent application
- Header file for utility source
- Revised application without DCE dependencies
- Makefile for application client
- Makefile for application server
- Revised application client
- Revised application server
- Authorization module using aznAPI
- Utility source of the revised application (1/2)
- Utility source of the revised application (2/2)
- Header file for utility source
- Application configuration file (1/3)
- Application configuration file (2/3)
- Application configuration file (3/3)
-
Appendix B: Scenario 2: Source code listings
- Application with DCE dependencies
- Makefile for the AIX platform
- Makefile for the Windows platform
- IDL source
- DCE dependent application client
- DCE dependent application server
- Application server logic
- Revised application without DCE dependencies
- Makefile for the AIX platform
- Makefile for the Windows platform
- CORBA IDL file
- Header file for C wrapper functions
- C++ client for the revised application
- C client for the revised application
- Header file for CORBA servant
- Servant implemention
- Revised application server (1/2)
- Revised application server (2/2)
- Revised application logic
- Properties file for client
- Properties file for server
-
Appendix C: Scenario 3: Source code listings
- Application with DCE dependencies
- Makefile for the AIX platform
- Makefile for the Windows platform
- IDL source
- DCE dependent application client
- DCE dependent application server (1/2)
- DCE dependent application server (2/2)
- Application server manager
- Application server logic header
- Application server logic
- Common error handling
- Revised application without DCE dependencies
- JNI connection
- JNI connection factory class
- JNI connection manager
- JNI managed connection
- JNI connection meta data
- JNI managed connection factory interface
- JNI managed connection meta data
- JNI resource adapter meta data
- Enterprise bean wrapper
- Enterprise bean remote interface
- Enterprise bean home interface
- Deployment descriptor for the application
- Deployment descriptor for the enterprise bean
- Deployment descriptor for the resource adapter
- “C” application server
- JNI wrapper for the application server
- Header file for application server
- CORBA C++ client
- Properties file for CORBA C++ client
-
Appendix D: Scenario 4: Source code listings
- Application with DCE dependencies
- Revised application without DCE dependencies
- Build script to create class and jar files
- Java client program
- Java stateless session bean
- Java EJB home interface
- Java EJB remote interface
- Java application exception
- EJB deployment descriptor
- Application client deployment descriptor
- Application deployment descriptor
- Application client security properties
- Appendix E: Additional material
-
Appendix A: Scenario 1: Source code listings
- Abbreviations and acronyms
- Related publications
- Index (1/3)
- Index (2/3)
- Index (3/3)
- Back cover
Product information
- Title: DCE Replacement Strategies
- Author(s):
- Release date: June 2003
- Publisher(s): IBM Redbooks
- ISBN: None
You might also like
book
Microsoft® Office Excel® 2007 Inside Out
Learn how to conquer Microsoft Office Excel 2007—from the inside out! This book packs hundreds of …
book
WebSphere Application Server V8.5 Concepts, Planning, and Design Guide
This IBM® Redbooks® publication provides information about the concepts, planning, and design of IBM WebSphere® Application …
book
Windows Server® 2012 Pocket Consultant
Portable and precise, this pocket-sized guide delivers ready answers for the day-to-day administration of Windows Server …
book
Microsoft® Windows® Server 2003 Insider Solutions
Rather than being a traditional planning, design, and implementation guide, this book is a serious resource …