Wtc_admin Web Logic Tuxedo Connector Administration Guide

User Manual:

Open the PDF directly: View PDF PDF.
Page Count: 78

DownloadWtc_admin Web Logic Tuxedo Connector Administration Guide
Open PDF In BrowserView PDF
BEA WebLogic

A

Server

ET

®

B

WebLogic Tuxedo
Connector
Administration Guide

Version 9.0 BETA
Revised: December 15, 2004

A

ET

B

Copyright
Copyright © 2004-2005 BEA Systems, Inc. All Rights Reserved.

Restricted Rights Legend
This software and documentation is subject to and made available only pursuant to the terms of the BEA Systems License
Agreement and may be used or copied only in accordance with the terms of that agreement. It is against the law to copy
the software except as specifically allowed in the agreement. This document may not, in whole or in part, be copied,
photocopied, reproduced, translated, or reduced to any electronic medium or machine readable form without prior
consent, in writing, from BEA Systems, Inc.

A

Use, duplication or disclosure by the U.S. Government is subject to restrictions set forth in the BEA Systems License
Agreement and in subparagraph (c)(1) of the Commercial Computer Software-Restricted Rights Clause at FAR
52.227-19; subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS
252.227-7013, subparagraph (d) of the Commercial Computer Software--Licensing clause at NASA FAR supplement
16-52.227-86; or their equivalent.

ET

Information in this document is subject to change without notice and does not represent a commitment on the part of BEA
Systems. THE SOFTWARE AND DOCUMENTATION ARE PROVIDED “AS IS” WITHOUT WARRANTY OF
ANY KIND INCLUDING WITHOUT LIMITATION, ANY WARRANTY OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE. FURTHER, BEA Systems DOES NOT WARRANT, GUARANTEE, OR MAKE
ANY REPRESENTATIONS REGARDING THE USE, OR THE RESULTS OF THE USE, OF THE SOFTWARE OR
WRITTEN MATERIAL IN TERMS OF CORRECTNESS, ACCURACY, RELIABILITY, OR OTHERWISE.

Trademarks or Service Marks

B

BEA, BEA WebLogic Server, Jolt, Tuxedo, and WebLogic are registered trademarks of BEA Systems, Inc. BEA Builder,
BEA Campaign Manager for WebLogic, BEA eLink, BEA Liquid Data for WebLogic, BEA Manager, BEA WebLogic
Commerce Server, BEA WebLogic Enterprise, BEA WebLogic Enterprise Platform, BEA WebLogic Enterprise
Security, BEA WebLogic Express, BEA WebLogic Integration, BEA WebLogic JRockit, BEA WebLogic
Personalization Server, BEA WebLogic Platform, BEA WebLogic Portal, BEA WebLogic Server Process Edition, BEA
WebLogic Workshop and How Business Becomes E-Business are trademarks of BEA Systems, Inc.
All other trademarks are the property of their respective companies.

A

ET

B

Contents

About This Document
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xii
e-docs Web Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xii
How to Print the Document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xii

A

Related Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xii
Contact Us! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii

ET

Introduction to WebLogic Tuxedo Connector

WebLogic Tuxedo Connector Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Key Functionality and Administrative Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
Known Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2

B

How WebLogic Tuxedo Connector Differs from Jolt . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
Platform Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
Licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
Upgrading WebLogic Tuxedo Connector 6.x Applications . . . . . . . . . . . . . . . . . . . . . . . 1-4
Upgrading WebLogic Tuxedo Connector 7.0 Applications . . . . . . . . . . . . . . . . . . . . . . . 1-4

Configuring WebLogic Tuxedo Connector
Summary of Environment Changes and Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Tuxedo Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
WebLogic Server Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Administration and Programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2

WebLogic Tuxedo Connector Administration Guide

v

WebLogic Server Threads. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Configuring WebLogic Tuxedo Connector for Your Applications . . . . . . . . . . . . . . . . . 2-2
WebLogic Tuxedo Connector MBean Classes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
Configuring WebLogic Tuxedo Connector Using the Administration Console . . . . 2-5
Configuring WebLogic Tuxedo Connector Using the Command-Line Interface . . . 2-6
Set the WebLogic Server Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-6
How to Set WebLogic Tuxedo Connector Properties . . . . . . . . . . . . . . . . . . . . . . . . 2-7
Set TraceLevel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7
Set PasswordKey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7
Set encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-8

A

WebLogic Tuxedo Connector Configuration Guidelines. . . . . . . . . . . . . . . . . . . . . . 2-8

WebLogic Tuxedo Connector Administration

ET

Configuring the Connections Between Access Points . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
How to Request a Connection at Boot Time (On Startup). . . . . . . . . . . . . . . . . . . . . 3-2
How to Configure RetryInterval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
How to Configure MaxRetries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
How to Request Connections for Client Demands (On Demand) . . . . . . . . . . . . . . . 3-3

B

Accepting Incoming Connections (Incoming Only) . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
How to use LOCAL Connection Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
How ConnectionPolicy Affects Dynamic Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
Configuring Failover and Failback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
Prerequisite to Using Failover and Failback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
How to Configure Failover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
How to Configure Support Failback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6
Authentication of Remote Access Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6
Configuring a Password Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7
Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7

vi

WebLogic Tuxedo Connector Administration Guide

Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8
Local Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8
Remote Passwords. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8
App Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8
User Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-9
ACL Policy is LOCAL. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-9
ACL Policy is GLobal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-10
Credential Policy is Global . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-10
CredentialPolicy is Local . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-10
User Authenticaion for Tuxedo 6.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-10

A

How to Configure WebLogic Tuxedo Connector to Provide Security between Tuxedo and
WebLogic Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-10

ET

TpUsrFile Plug-in. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-11
Configuring the Local Tuxedo Access Point for the TpUsrFile Plug-in. . . . . . 3-11
Configure the Remote Tuxedo Access Point for the TpUsrFile Plug-in. . . . . . 3-11
LDAP Plug-in. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-12
Implementing Single Point Security Administration . . . . . . . . . . . . . . . . . . . . 3-12

B

Configure the Local Tuxedo Access Point for the LDAP Plug-in . . . . . . . . . . 3-13
Configure the Remote Tuxedo Access Point for the LDAP Plug-in. . . . . . . . . 3-13

Custom Plug-in. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-13
Configure the Local Tuxedo Access Point for the Custom Plug-in . . . . . . . . . 3-14
Configure the Remote Tuxedo Access Point for the Custom Plug-in. . . . . . . . 3-14
Anonymous Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-14
Anonymous Users and CORBA Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-15
Link-Level Encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-15

Administration of CORBA Applications
How to Configure WebLogic Tuxedo Connector for CORBA Service Applications. . . . 4-1

WebLogic Tuxedo Connector Administration Guide

vii

Example WTC Service and Tuxedo UBB Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2
How to Administer and Configure WebLogic Tuxedo Connector for Inbound RMI-IIOP4-4
Configuring Your WTC Service for Inbound RMI-IIOP. . . . . . . . . . . . . . . . . . . . . . 4-4
Administering the Tuxedo Application Environment . . . . . . . . . . . . . . . . . . . . . . . . 4-5
Guidelines About Using Your Server Name as an Object Reference. . . . . . . . . 4-6
How to Configure WebLogic Tuxedo Connector for Outbound RMI-IIOP. . . . . . . . . . . 4-7
Example Outbound RMI-IIOP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8

How to Manage WebLogic Tuxedo Connector in a Clustered
Environment

A

WebLogic Tuxedo Connector Guidelines for Clustered Environments . . . . . . . . . . . . . . 5-1
How to Configure OutBound Requests to Tuxedo Domains . . . . . . . . . . . . . . . . . . . . . . 5-2
Example Clustered WebLogic Tuxedo Connector Configuration . . . . . . . . . . . . . . . 5-2

ET

How to Configure Inbound Requests from Tuxedo Domains. . . . . . . . . . . . . . . . . . . . . . 5-4
Load Balancing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-4
Fail Over . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-5

How to Configure the Tuxedo Queuing Bridge

B

Overview of the Tuxedo Queuing Bridge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1
How Tuxedo Queuing Bridge connects JMS with Tuxedo . . . . . . . . . . . . . . . . . . . . 6-2
How Tuxedo Queuing Bridge connects Tuxedo to JMS . . . . . . . . . . . . . . . . . . . . . . 6-3
Tuxedo Queuing Bridge Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-4
Configuring the Tuxedo Queuing Bridge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-4
Starting the Tuxedo Queuing Bridge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-4
Error Logging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-5
Tuxedo Queuing Bridge Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-5
Example Connection Type Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-5
Example JmsQ2TuxQ Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-5

viii

WebLogic Tuxedo Connector Administration Guide

Example TuxQ2JmsQ Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-6
Example JmsQ2TuxS Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-7
Priority Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-9
Error Queues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-9
WLS Error Destination. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-10
Unsupported Message Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-10
Tuxedo Error Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-10
Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-10

Connecting WebLogic Integration and Tuxedo Applications

A

Synchronous WebLogic Integration-to-Tuxedo Connectivity . . . . . . . . . . . . . . . . . . . . . 7-1
Defining Business Operations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2
Invoking an eLink Adapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2

ET

Define Exception handlers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2
Synchronous Non-Blocking WebLogic Integration-to-Tuxedo Connectivity . . . . . . . . . 7-2
Asynchronous WebLogic Integration-to-Tuxedo Connectivity . . . . . . . . . . . . . . . . . . . . 7-3
Asynchronous Tuxedo /Q-to-WebLogic Integration Connectivity . . . . . . . . . . . . . . . . . . 7-3

B

Bi-directional Asynchronous Tuxedo-to-WebLogic Integration Connectivity. . . . . . . . . 7-3

Troubleshooting The WebLogic Tuxedo Connector
Monitoring the WebLogic Tuxedo Connector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1
Set Trace Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1
Enable Debug Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2
Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2
What does this EJB Deployment Message Mean? . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3
How do I Start the Connector? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3
How do I Start the Tuxedo Queuing Bridge? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3
How do I Assign a WTC Service to a Server? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3

WebLogic Tuxedo Connector Administration Guide

ix

How do I Resolve Connection Problems? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-4

B

ET

A

How do I Migrate from Previous Releases? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-4

x

WebLogic Tuxedo Connector Administration Guide

A

About This Document

This document introduces the BEA WebLogic Tuxedo Connector™ application development
environment. This document provides information on how to configure and administer the
WebLogic Tuxedo Connector to interoperate between WebLogic Server and Tuxedo.

ET

The document is organized as follows:

Chapter 1, “Introduction to WebLogic Tuxedo Connector,” is an overview of the WebLogic
Tuxedo Connector.

z

Chapter 2, “Configuring WebLogic Tuxedo Connector,” describes how to configure the
WebLogic Tuxedo Connector.

z

Chapter 3, “WebLogic Tuxedo Connector Administration,” provides configuration
information about the WebLogic Tuxedo Connector.

z

Chapter 4, “Administration of CORBA Applications,” provides information on how to
administer CORBA applications.

z

Chapter 5, “How to Manage WebLogic Tuxedo Connector in a Clustered Environment,”
provides information on how to use WebLogic Tuxedo Connector in a clustered
environment.

z

Chapter 6, “How to Configure the Tuxedo Queuing Bridge,” provides information on
tBridge functionality and configuration.

z

Chapter 7, “Using FML with WebLogic Tuxedo Connector,” discusses the Field
Manipulation Language (FML) and describes how the WebLogic Tuxedo Connector uses
FML.

B

z

WebLogic Tuxedo Connector Administration Guide

xi

About This Do cume nt

z

Chapter 8, “Troubleshooting The WebLogic Tuxedo Connector,” provides WebLogic
Tuxedo Connector troubleshooting information.

Audience
This document is intended for system administrators and application developers who are
interested in building distributed Java applications that interoperate between WebLogic Server
and Tuxedo environments. It assumes a familiarity with the WebLogic Server, Tuxedo, and Java
programming.

e-docs Web Site

How to Print the Document

A

BEA product documentation is available on the BEA corporate Web site. From the BEA Home
page, click on Product Documentation or go directly to the WebLogic Server Product
Documentation page at http://e-docs.bea.com.

ET

You can print a copy of this document from a Web browser, one main topic at a time, by using
the File→Print option on your Web browser.

B

A PDF version of this document is available on the WebLogic Server documentation Home page
on the e-docs Web site (and also on the documentation CD). You can open the PDF in Adobe
Acrobat Reader and print the entire document (or a portion of it) in book format. To access the
PDFs, open the WebLogic Server documentation Home page, click Download Documentation,
and select the document you want to print.
Adobe Acrobat Reader is available at no charge from the Adobe Web site at
http://www.adobe.com.

Related Information

The BEA corporate Web site provides all documentation for WebLogic Server and Tuxedo.
For more information about Java and Java CORBA applications, refer to the following sources:

xii

z

The OMG Web Site at http://www.omg.org/

z

The Sun Microsystems, Inc. Java site at http://java.sun.com/

WebLogic Tuxedo Connector Administration Guide

Contact Us!
Your feedback on BEA documentation is important to us. Send us e-mail at
docsupport@bea.com if you have questions or comments. Your comments will be reviewed
directly by the BEA professionals who create and update the documentation.
In your e-mail message, please indicate the software name and version you are using, as well as
the title and document date of your documentation. If you have any questions about this version
of BEA WebLogic Server, or if you have problems installing and running BEA WebLogic
Server, contact BEA Customer Support through BEA WebSupport at http://www.bea.com. You
can also contact Customer Support by using the contact information provided on the Customer
Support Card, which is included in the product package.
When contacting Customer Support, be prepared to provide the following information:
Your name, e-mail address, phone number, and fax number

z

Your company name and company address

z

Your machine type and authorization codes

z

The name and version of the product you are using

z

A description of the problem and the content of pertinent error messages

ET

A

z

Documentation Conventions

B

The following documentation conventions are used throughout this document.
Convention

Usage

Ctrl+Tab

Keys you press simultaneously.

italics

Emphasis and book titles.

WebLogic Tuxedo Connector Administration Guide

xiii

About This Do cume nt

Convention

Usage

monospace
text

Code samples, commands and their options, Java classes, data types,
directories, and file names and their extensions. Monospace text also
indicates text that you enter from the keyboard.
Examples:
import java.util.Enumeration;
chmod u+w *
config/examples/applications
.java
config.xml
float

Variables in code.
Example:
String CustomerName;

Device names, environment variables, and logical operators.
Examples:
LPT1

ET

UPPERCASE
TEXT

A

monospace
italic
text

BEA_HOME
OR

A set of choices in a syntax line.

[ ]

Optional items in a syntax line. Example:

B

{ }

java utils.MulticastTest -n name -a address
[-p portnumber] [-t timeout] [-s send]

|

Separates mutually exclusive choices in a syntax line. Example:
java weblogic.deploy [list|deploy|undeploy|update]
password {application} {source}

xiv

WebLogic Tuxedo Connector Administration Guide

Convention

Usage

...

Indicates one of the following in a command line:
An argument can be repeated several times in the command line.

•

The statement omits additional optional arguments.

•

You can enter additional parameters, values, or other information

ET

A

Indicates the omission of items from a code example or from a syntax line.

B

.
.
.

•

WebLogic Tuxedo Connector Administration Guide

xv

B

ET

A

About This Do cume nt

xvi

WebLogic Tuxedo Connector Administration Guide

CHAPTER

1

A

Introduction to WebLogic Tuxedo
Connector

The following sections summarize the concepts and functionality of WebLogic Tuxedo
Connector for this release of WebLogic Server:
WebLogic Tuxedo Connector Overview

z

Key Functionality and Administrative Features

z

Known Limitations

z

How WebLogic Tuxedo Connector Differs from Jolt

z

Platform Support

z

Licensing

z

Upgrading WebLogic Tuxedo Connector 6.x Applications

z

Upgrading WebLogic Tuxedo Connector 7.0 Applications

B

ET

z

WebLogic Tuxedo Connector Overview
The WebLogic Tuxedo Connector provides interoperability between WebLogic Server
applications and Tuxedo services. The connector allows WebLogic Server clients to invoke
Tuxedo services and Tuxedo clients to invoke WebLogic Server Enterprise Java Beans (EJBs) in
response to a service request.

WebLogic Tuxedo Connector Administration Guide

1-1

Key Functionality and Administrative Features
The WebLogic Tuxedo Connector enables you to develop and support applications interoperating
WebLogic Server and Tuxedo by using a Java Application-to-Transaction Monitor Interface
(JATMI) similar to the Tuxedo ATMI. The WebLogic Tuxedo Connector tBridge functionality
provides Tuxedo /Q and JMS advanced messaging services.
The WebLogic Tuxedo Connector provides the following bi-directional interoperability:
Ability to call WebLogic Server applications from Tuxedo applications and vice versa.

z

Ability to integrate WebLogic Server applications into existing Tuxedo environments.

z

Transaction support.

z

Ability to provide interoperability between CORBA Java and CORBA C++ server
applications.

z

Ability to provide interoperability between Remote Method Invocation (RMI) over Internet
Inter-ORB Protocol (IIOP) applications and Tuxedo CORBA remote objects.

z

Ability to use WebLogic Integration to manage workflow across Tuxedo ATMI services.

z

Ability to define multiple connections between WebLogic Server and Tuxedo.

ET

A

z

The WebLogic Tuxedo Connector includes the following key administration features:
z

Simple implementation. The WebLogic Tuxedo Connector does not require modification of
existing Tuxedo application code.

B

– Existing Tuxedo clients call WebLogic Server EJBs through the WebLogic Tuxedo
Connector.
– New or modified WebLogic Server clients call Tuxedo services through WebLogic
Tuxedo Connector.
z

Bi-directional security propagation, including domain and ACL security.

z

Domain-level failover and fallback.

z

Advanced messaging services provided by Tuxedo /Q and JMS.

z

Interoperability with mainframes and other legacy applications using eLink.

Known Limitations
WebLogic Tuxedo Connector has the following limitations:
1-2

WebLogic Tuxedo Connector Administration Guide

How WebL ogi c Tuxedo Conne cto r Differs from Jolt

z

Does not support dynamic configuration changes to the WebLogic Tuxedo Connector
gateway.
Note: When making changes to your WebLogic Tuxedo Connector service configuration,
you will need to remove the service from the server and target the service to the server
for these changes to take effect.
Does not support inbound TGIOP in clustered environments.

z

Does not support Tuxedo 8.1 multibyte string data typed buffer named MBSTRING for
transport of multibyte character user data.

z

Does not support Tuxedo 8.1 Domains keepalive functionality.

z

WebLogic Tuxedo Connector does not support Tuxedo 6.5 running on VMS and OS/390
platforms.

A

z

How WebLogic Tuxedo Connector Differs from Jolt

ET

The WebLogic Tuxedo Connector is not a replacement for Jolt. WebLogic Tuxedo Connector
differs from Jolt in the following ways:
z

WebLogic Tuxedo Connector offers a similar but different API than Jolt.

z

Jolt enables the development of generic Java clients and other Web server applications that
the WebLogic Tuxedo Connector does not.

z

Jolt does not provide a mechanism for an integrated WebLogic Server-Tuxedo transaction.

B

Users should use Jolt as a solution instead of the WebLogic Tuxedo Connector when a generic
Java client or other Web server application is required and WebLogic Server is not part of the
solution.

Platform Support

See our Platforms Support page at
http://e-docs.bea.com/wls/certifications/certifications/overview.html for the most accurate and
current information regarding platform support.

Licensing
Note: For more information on WebLogic Server licensing information, see Installing a
WebLogic Server License at
http://e-docs.bea.com/wls/docs90/../../platform/docs90/install/prepare.html#1129187.
WebLogic Tuxedo Connector Administration Guide

1-3

This section provides licensing information for the WebLogic Tuxedo Connector:
z

There is no license requirement for using the connector without encryption.

z

An appropriate Tuxedo LLE license and an appropriate WebLogic Server SSL license is
required to use encryption.

Upgrading WebLogic Tuxedo Connector 6.x Applications
You must make some changes in your WebLogic Tuxedo Connector 6.x applications (including
WebLogic Tuxedo Connector 1.0) to use them with WebLogic Server 9.0. For detailed
information on the administration and programming changes required to upgrade to WebLogic
Tuxedo Connector in WebLogic Server 9.0, see Upgrade Planning Guide at
http://e-docs.bea.com/wls/docs90/../../platform/docs90/upgrade/index.html.

A

Upgrading WebLogic Tuxedo Connector 7.0 Applications

B

ET

You may want to make some changes in your WebLogic Tuxedo Connector 7.0 RMI-IIOP
applications to use them with WebLogic Server 9.0. For detailed information, see Upgrade
Planning Guide at http://e-docs.bea.com/wls/docs90/../../platform/docs90/upgrade/index.html.

1-4

WebLogic Tuxedo Connector Administration Guide

CHAPTER

2

A

Configuring WebLogic Tuxedo
Connector

The following sections describe how to configure the WebLogic Tuxedo Connector.
Summary of Environment Changes and Considerations

z

Configuring WebLogic Tuxedo Connector for Your Applications

ET

z

Summary of Environment Changes and Considerations
This section provides an overview of the changes you must make to the Tuxedo and WebLogic
Server environments before you can start using the WebLogic Tuxedo Connector.

B

Tuxedo Changes

Note: For more information on Tuxedo domains, see the BEA TUXEDO Domains Guide.
Tuxedo users need to make the following environment changes:
z

If an existing Tuxedo application is already using Tuxedo /T DOMAINS, then a new
domain must be added to the domains configuration file for each connection to a
WebLogic Tuxedo Connector instantiation.

z

If the existing Tuxedo application does not use domains, then the domain servers must be
added to the TUXCONFIG of the application. A new DMCONFIG must be created with a
Tuxedo /T Domain entry corresponding to the WebLogic Tuxedo Connector instantiation.

z

WebLogic Tuxedo Connector requires that the Tuxedo domain always have encoding
turned on. MTYPE should always be unset or set to NULL in the DMCONFIG file.

WebLogic Tuxedo Connector Administration Guide

2-1

WebLogic Server Changes
The following sections describe WebLogic Server changes required to use the WebLogic Tuxedo
Connector:
z

Administration and Programming

z

WebLogic Server Threads

Administration and Programming
WebLogic Server users need to make the following environment changes:
Create Java clients or servers. For more information on creating WebLogic Tuxedo
Connector clients or servers, see the WebLogic Tuxedo Connector Programmer’s Guide.

z

Configure the WebLogic Tuxedo Connector using the WebLogic Server console or
command-line interface. For more information on how to configure the WebLogic Tuxedo
Connector, see “Configuring WebLogic Tuxedo Connector for Your Applications” on
page 2-2.

z

If the WebLogic Tuxedo Connector ACL Policy is set to Local, access to local services
does not depend on the CredentialPolicy. The Tuxedo remote domain DOMAINID must
be authenticated as a local WebLogic Server user. For more information, see “User
Authentication” on page 3-9.

ET

A

z

WebLogic Server Threads

B

Note: For more information on WebLogic Server performance and tuning, see BEA WebLogic
Server Performance and Tuning at
http://e-docs.bea.com/wls/docs90/perform/index.html.
The number of client threads available when dispatching services from the gateway may limit the
number of concurrent services running. For this release of WebLogic Tuxedo Connector, there is
no WebLogic Tuxedo Connector attribute to increase the number of available threads. Use a
reasonable thread model when invoking service EJBs.You may need to increase the number of
WebLogic Server threads available to a larger value.

Configuring WebLogic Tuxedo Connector for Your Applications
Note: Deciding when to target a WTC Service is very important. Once a WTC Service is
targeted, the configuration deployed to the selected server is static. Although you can
continue to make changes in your WTC Service configuration, any changes made after
2-2

WebLogic Tuxedo Connector Administration Guide

C o n fi g u ri n g Web L o gi c T u xe do C onnector for Your Applic ations

the configuration is deployed will not be reflected in the selected server. You will need
to remove the service from the server and target the service to the server for these changes
to take effect.
This section provides information on how to configure the WebLogic Tuxedo Connector to allow
WebLogic Server applications and Tuxedo applications to interoperate.
WebLogic Tuxedo Connector MBean Classes

z

Configuring WebLogic Tuxedo Connector Using the Administration Console

z

Configuring WebLogic Tuxedo Connector Using the Command-Line Interface

z

Set the WebLogic Server Environment

z

How to Set WebLogic Tuxedo Connector Properties

z

WebLogic Tuxedo Connector Configuration Guidelines

A

z

WebLogic Tuxedo Connector MBean Classes

ET

Note: For more information on the WebLogic Server management and the config.xml file,
see WebLogic Server Configuration Reference at
http://e-docs.bea.com/wls/docs90/wlsmbeanref/index.html.

B

The WebLogic Tuxedo Connector uses MBeans to describe connectivity information and
security protocols to process service requests between WebLogic Server and Tuxedo. These
configuration parameters are analogous to the interoperability attributes required for
communication between Tuxedo domains. The configuration parameters are stored in the
WebLogic Server config.xml file. The following table lists the MBean types used to
configure WebLogic Tuxedo Connector:

WebLogic Tuxedo Connector Administration Guide

2-3

Description

WTCServer

Parent MBean containing the interoperability attributes
required for a connection between WebLogic Server and
Tuxedo. Defines your WTC Service when configured using
the Administration Console.

WTCLocalTuxDom

Provides configuration information to connect available
remote Tuxedo domains to a WTC Service. You must
configure at least one local Tuxedo access point. Defines
your Local Tuxedo Access Points when configured using the
Administration Console.

WTCRemoteTuxDom

Provides configuration information to connect a WTC
Service to available remote Tuxedo domains. You may
configure multiple remote domains. Defines your Remote
Tuxedo Access Points when configured using the
Administration Console.

WTCExport

Provides information on services exported by a local Tuxedo
access point. Defines your Exported Services when
configured using the Administration Console.

WTCPassword

ET

WTCResources

Provides information on services imported and available on
remote domains. Defines your Imported Services when
configured using the Administration Console.
Specifies global field table classes, view table classes, and
application passwords for domains. Defines your Resources
when configured using the Administration Console.

B

WTCImport

A

MBean Type

Specifies the configuration information for inter-domain
authentication. Defines your Passwords when configured
using the Administration Console.
Support for MBSTRING is provided using
RemoteMBEncoding and MBEncodingMapFile
attributes

2-4

WebLogic Tuxedo Connector Administration Guide

C o n fi g u ri n g Web L o gi c T u xe do C onnector for Your Applic ations

MBean Type

Description

WTCtBridgeGlobal

Specifies global configuration information for the transfer of
messages between WebLogic Server and Tuxedo. Defines
your Tuxedo Queuing Bridge when configured using the
Administration Console.

WTCtBridgeRedirect

Specifies the source, target, direction, and transport of
messages between WebLogic Server and Tuxedo. Defines
your Tuxedo Queuing Bridge Redirects when configured
using the Administration Console.

A

Configuring WebLogic Tuxedo Connector Using the
Administration Console

ET

The Administration Console allows you to configure, manage, and monitor WebLogic Tuxedo
Connector connectivity. To display the tabs that you use to perform these tasks, complete the
following procedure:
1. Start the Administration Console.

2. Locate the Interoperability node in the left pane, then expand the WTC Service.
3. Create or modify the WTC Server you want to configure.
4. Follow the instructions in the Online Help. For links to the Online Help, see Table 2-1.

B

The following table shows the connectivity tasks, listed in typical order in which you perform
them. You may change the order; just remember you must configure an object before associating
or assigning it.
Table 2-1 WebLogic Tuxedo Connector Configuration Tasks
Task #

Task

Description

1

Creating a WTC
Service

On the General tab in the right pane, you set the attributes
for Name and Deployment Order.

2

Creating a Local
Tuxedo Access Point

Set the attributes that describe your local Tuxedo access
point in the General, Connections, and Security tabs. You
must configure at least one local Tuxedo access point.

WebLogic Tuxedo Connector Administration Guide

2-5

Table 2-1 WebLogic Tuxedo Connector Configuration Tasks
Task

Description

3

Creating a Remote
Tuxedo Access Point

Set the attributes that describe your remote Tuxedo
domains in the Local APs tab.

4

Creating Exported
Services

Set the attributes that describe your exported WebLogic
Server services in the Exported tab.

5

Creating Imported
Services

Set the attributes that describe your imported Tuxedo
services in the Imported tab.

6

Creating a Password
Configuration

Set the attributes that describe your passwords in the
Password tab.

7

Creating a Resource

Set the attributes that describe your WebLogic Tuxedo
Connector resources in the Resources tab.

8

Creating a Tuxedo
Queuing Bridge
Connection

Set the global configuration information for the transfer of
messages between WebLogic Server and Tuxedo.

9

Creating a tBridge
Redirection

10

Assign a WTC
Service to a Server

ET

A

Task #

Sets the attributes used to specify the source, target,
direction, and transport of a message between WebLogic
Server and Tuxedo

B

Select a target server for your WTC Service.

Configuring WebLogic Tuxedo Connector Using the
Command-Line Interface
The command-line interface provides a way to create and manage WebLogic Tuxedo Connector
connections. For information on how to use the command-line interface, see Commands for
Managing WebLogic Server MBeans at
http://e-docs.bea.com/wls/docs90/admin_ref/cli.html#Commands_Managing_WebLogic_Serve
r_MBeans.

Set the WebLogic Server Environment
You need to set the environment of your WebLogic Server application by running the
setExamplesEnv script located at WL_HOME\samples\domains\examples.
2-6

WebLogic Tuxedo Connector Administration Guide

C o n fi g u ri n g Web L o gi c T u xe do C onnector for Your Applic ations

- NT/2000 users: run setExamplesEnv.cmd
- UNIX users: run setExamplesEnv.sh
If you are setting the environment for the first time, you will need to review the settings in the
script. If necessary, use the following steps to modify the settings for your application
environment:
1. From the command line, change directories to the location of the WebLogic Server
application. Copy the setExamplesEnv script located at
WL_HOME\samples\domains\examples to your application directory.
2. Edit the setExamplesEnv script with a text editor, such as vi.
- NT/2000 users: edit setExamplesEnv.cmd

A

- UNIX users: edit setExamplesEnv.sh
3. Save the file.

ET

How to Set WebLogic Tuxedo Connector Properties
TraceLevel, PasswordKey, and encoding are WebLogic Server Properties. If you need to set
these properties, update the JAVA_OPTIONS variable in your server start script. Example:
JAVA_OPTIONS=-Dweblogic.wtc.TraceLevel=100000

Set TraceLevel

B

Note: For more information on how to record log information, see “Monitoring the WebLogic
Tuxedo Connector” on page 8-1.
Use TraceLevel to specify the level of message tracing WebLogic Tuxedo Connector will send
to your log files:
JAVA_OPTIONS= -Dweblogic.wtc.TraceLevel=tracelevel

where tracelevel is a number between 10,000 and 100,000 that specifies the level of
WebLogic Tuxedo Connector tracing.

Set PasswordKey
Note: For more information on PasswordKey, see “Configuring a Password Configuration” on
page 3-7.
Use PasswordKey to specify the key used by the weblogic.wtc.gwt.genpassword utility to
encrypt passwords:
WebLogic Tuxedo Connector Administration Guide

2-7

JAVA_OPTIONS=-Dweblogic.wtc.PasswordKey=mykey

where mykey is the key value.

Set encoding
To transfer non-ascii (multibyte) strings between WebLogic Server and Tuxedo applications, you
must configure WebLogic Tuxedo Connector to provide characer set translation. WebLogic
Tuxedo Connector uses a WebLogic Server property to match the encoding used by all the
Tuxedo remote domains specified in a WebLogic Tuxedo Connector service. If you require more
than one coding set running simultaneously, you will require WebLogic Tuxedo Connector
services running in separate WebLogic Server instances.

A

To enable character set translation, update the JAVA_OPTIONS variable in your server start
script. Example:
JAVA_OPTIONS=-Dweblogic.wtc.encoding=codesetname

ET

where codesetname is the name of a supported codeset used by a remote Tuxedo domain.
See Supported Encodings at http://java.sun.com/j2se/1.3/docs/guide/intl/encoding.doc.html
for list of supported supported base and extended coding sets.
You may not be able to select the exact encoding name to match the encoding used by the remote
domain. In this situation, you should select an encoding name that is equivalent to the remote
domain.
Example:

The Supported Encoding list includes EUC_JP

z

The remote domain is supported by a Solaris operating system using eucJP

B

z

Although the names don’t match exactly, EUC_JP and eucJP are equivalent encoding sets and
provide the correct string translation between WebLogic Server and your remote domain. You
should set the encoding property to EUC_JP:
JAVA_OPTIONS=-Dweblogic.wtc.encoding=EUC_JP

WebLogic Tuxedo Connector Configuration Guidelines
Use the following guidelines when configuring WebLogic Tuxedo Connector:

2-8

z

You must have at least one local Tuxedo access point in your configuration.

z

You may have more than one WTC Service in your configuration.

WebLogic Tuxedo Connector Administration Guide

C o n fi g u ri n g Web L o gi c T u xe do C onnector for Your Applic ations

You can not target 2 or more WTC Services to the same server. A server can only be a
target for one WTC Service.

z

Any configuration changes implemented in a WTC Service after a target server is selected
will not be updated in the target server instance. You must remove the WTC Service from
the server and then add the updated WTC Service add to the target server. For more
information on selecting a target server, see Assign a WTC Service to a Server.

B

ET

A

z

WebLogic Tuxedo Connector Administration Guide

2-9

A
ET
B
2-10

WebLogic Tuxedo Connector Administration Guide

CHAPTER

3

A

WebLogic Tuxedo Connector
Administration

Note: For more information on the WebLogic Server management, including the WebLogic
Tuxedo Connector, see the WebLogic Server Configuration Reference at
http://e-docs.bea.com/wls/docs90/wlsmbeanref/index.html.

ET

The following sections describe how to establish connectivity and provide security between
WebLogic Server applications and Tuxedo environments. WebLogic Tuxedo Connector uses
attributes that are analogous to the interoperability attributes required for the communication
between Tuxedo access points.
The following sections provide WebLogic Tuxedo Connector configuration information:
Configuring the Connections Between Access Points

z

How ConnectionPolicy Affects Dynamic Status

z

Configuring Failover and Failback

z

Authentication of Remote Access Points

z

User Authentication

z

How to Configure WebLogic Tuxedo Connector to Provide Security between Tuxedo and
WebLogic Server

z

Link-Level Encryption

B

z

WebLogic Tuxedo Connector Administration Guide

3-1

Configuring the Connections Between Access Points
Note: For more information on Dynamic Status, see “How ConnectionPolicy Affects Dynamic
Status” on page 3-4.
Several options can specify the conditions under which an access point tries to establish a
connection with a remote access point. Specify these conditions using the ConnectionPolicy
attribute in the Connections tab of the Local Tuxedo Access Points and Remote Tuxedo Access
Points configurations of your WTC Service. You can select any of the following connection
policies:
How to Request a Connection at Boot Time (On Startup)

z

How to Request Connections for Client Demands (On Demand)

z

Accepting Incoming Connections (Incoming Only)

z

How to use LOCAL Connection Policy

A

z

ET

For connection policies of On Startup and Incoming Only, Dynamic Status is invoked.
Dynamic Status checks and reports on the status of imported services associated with each remote
access point.

How to Request a Connection at Boot Time (On Startup)

B

A policy of On Startup means that an access point attempts to establish a connection with its
remote access points at gateway server initialization time. The connection policy retries failed
connections at regular intervals determined by the RetryInterval parameter and the
MaxRetries parameter. To request a connection at boot time, set the ConnectionPolicy
attribute in the Connections tab of your local Tuxedo access point to On Startup.

How to Configure RetryInterval
You can control the frequency of automatic connection attempts by specifying the interval (in
seconds) during which the access point should wait before trying to establish a connection again.
The minimum value is 0; the default value is 60, and maximum value is 2147483647.

How to Configure MaxRetries
Note: Use only when ConnectionPolicy is set to On Startup. For other connection policies,
retry processing is disabled.

3-2

WebLogic Tuxedo Connector Administration Guide

Configuring the Conne cti ons Betwee n Acc ess Poi nts

You indicate the number of times an access point tries to establish connections to remote access
points before quitting by assigning a value to the MaxRetries parameter: the minimum value is
0; the default and maximum value is 2147483647.
z

If you set MaxRetries to 0, automatic connection retry processing is turned off. The server
does not attempt to connect to the remote access point automatically.

z

If you set MaxRetries to a number, the access point tries to establish a connection the
specified number of times before quitting.

z

If you set MaxRetries to 2147483647, retry processing is repeated indefinitely or until a
connection is established.

Table 3-1 Example Settings of MaxRetries and RetryInterval Parameters
Then ...

ConnectionPolicy: On Startup
RetryInterval: 30

ConnectionPolicy: On Startup
MaxRetries: 0

ConnectionPolicy: On Startup

The access point attempts to establish a
connection at initialization time but
does not retry if the first attempt fails.
The access point attempts to establish a
connection every 30 seconds until a
connection is established.

B

RetryInterval: 30

The access point makes 3 attempts to
establish a connection, at 30 seconds
intervals, before quitting.

ET

MaxRetries: 3

A

If you set ...

How to Request Connections for Client Demands (On Demand)
Note: If the ConnectionPolicy is not specified, the WebLogic Tuxedo Connector uses a
ConnectionPolicy of 0n Demand.
A connection policy of 0n Demand means that a connection is attempted only when requested by
either a client request to a remote service or an administrative connect command.

Accepting Incoming Connections (Incoming Only)
A connection policy of Incoming Only means that an access point does not establish a
connection to remote access points upon starting. The access point is available for incoming

WebLogic Tuxedo Connector Administration Guide

3-3

connections from remote access points and remote services are advertised when the access point
receives an incoming connection.

How to use LOCAL Connection Policy
Note: A ConnectionPolicy of LOCAL is not valid for local access points.
A connection policy of LOCAL indicates that a remote domain connection policy is explicitly
defaulted to the local domain ConnectionPolicy attribute value. If the remote access point
ConnectionPolicy is not defined, the system uses the setting specified by the associated local
access point.

How ConnectionPolicy Affects Dynamic Status

0n Demand

Dynamic Status is off. Services imported from remote access
points are always advertised.
Dynamic Status is on. Remote services are initially
suspended. The access point is available for incoming
connections from remote access points. Remote services are
advertised when the access point receives an incoming
connection.

B

Incoming Only

Dynamic Status is on. Services imported from a remote
access point are advertised while a connection to that remote
access point exists.

ET

On Startup

A

Dynamic Status determines the availability of remote services. The connection policy used
determines whether the Dynamic Status feature is available for a service. The following table
describes how ConnectionPolicy affects Dynamic Status capability.

Configuring Failover and Failback
Note: In the Tuxedo T/ Domain, there is a limit of two (2) backup remote access points. The
WebLogic Tuxedo Connector has no limit to the number of backup access points allowed
to be configured for a service.
WebLogic Tuxedo Connector provides a failover mechanism that transfers requests to alternate
remote access points when a failure is detected with a primary remote access point. It also
provides failback to the primary remote access point when that access point is restored. This level

3-4

WebLogic Tuxedo Connector Administration Guide

Conf ig ur in g F ail ove r and Fail back

of failover/failback depends on Dynamic Status. The access point must be configured with a
connection policy of On Startup or Incoming Only to enable failover/failback.

Prerequisite to Using Failover and Failback
To use failback, you must specify On Startup or Incoming Only as the value of the
Connection Policy parameter.
A connection policy of 0n Demand is unsuitable for failback as it operates on the assumption that
the remote access point is always available. If you do not specify On Startup or Incoming Only
as your connection policy, your servers cannot fail over to the alternate remote access points that
you have specified with the Tuxedo RDOM parameter.

How to Configure Failover

A

Note: A remote access point is available if a network connection to it exists; a remote access
point is unavailable if a network connection to it does not exist.

ET

To support failover, you must specify the remote access points responsible for executing a
particular service. You must specify the following in your WTC Service:
z

Create Remote Tuxedo Access Points configurations for each remote access point.

z

Create Imported Services configurations that specify the service provided by each remote
access point.

B

Suppose a service, TOUPPER, is available from two remote access points: TDOM1 and TDOM3.
Your WTC Service would include two Remote Tuxedo Access Point configuratons and two
Imported Services configurations in your WTC Service. The WTC Service defined in the
config.xml file would contain the following:






WebLogic Tuxedo Connector Administration Guide

3-5




How to Configure Support Failback
Failback occurs when a network connection to the primary remote access point is reestablished
for any of the following reasons:
z

Automatic retries (On Startup only)

z

Incoming connections

Authentication of Remote Access Points

A

Note: Tuxedo 6.5 users should set the Interoperate parameter to Yes.

ET

Domain gateways can be made to authenticate incoming connections requested by remote access
points and outgoing connections requested by local access points. Application administrators can
define when security should be enforced for incoming connections from remote access points.
You can specify the level of security used by a particular local access point by setting the
Security attribute in the Security tab of the local Tuxedo access point configuration of your
WTC Service. There are three levels of password security:
z

NONE—incoming connections from remote access points are not authenticated.

z

Application Password— incoming connections from remote access points are

z

B

authenticated using the application password defined in the Password configuration of your
WTC Service. You use the weblogic.wtc.gwt.genpasswd utility to create encrypted
application passwords.
Domain Password—this feature enforces security between two or more access points.

Connections between the local and remote access points are authenticated using password
pairs defined in the Password configuration of your WTC Service. You use the
weblogic.wtc.gwt.genpasswd utility to create encrypted local and remote passwords.
The Security attribute in the Security tab of the local Tuxedo access point of your WTC Service
must match the SECURITY attribute of the *DM_LOCAL_DOMAINS section of the Tuxedo
domain configuration file.
z

3-6

If authentication is required, it is done every time a connection is established between the
local access point and the remote access point.

WebLogic Tuxedo Connector Administration Guide

Authe ntication of Remote Acc ess Poi nts

z

If the security type of the local Tuxedo access point in your WTC Service does not match
the security type of the *DM_LOCAL_DOMAINS or if the passwords do not match, the
connection fails.

Configuring a Password Configuration
Note: For more information on how to assign a PasswordKey, see “How to Set WebLogic
Tuxedo Connector Properties” on page 2-7.
Use weblogic.wtc.gwt.genpasswd to generate encrypted passwords for Local Password,
Remote Password, and App Password attributes. The utility uses a key to encrypt a password that
is copied into the Password or Resources configuration of your WTC Service.
The Password configuration of your WTC Service does not store clear text passwords.

z

The key value is a WebLogic Server property.

A

z

– PasswordKey is the attribute used to assign the key.
-Dweblogic.wtc.PasswordKey=mykey

ET

where: mykey is the key value

– The PasswordKey attribute can only be assigned one key value. This key value is used
for all Weblogic Tuxedo Connector passwords generated (local, remote, and application
passwords) for use with a specific WebLogic Server.

Usage
Example:

B

Call the utility without any arguments to display the command line options.

$ java weblogic.wtc.gwt.genpasswd
Usage: genpasswd Key 


Call the utility with a key value, password to encrypt, and the type of password.
Example:
$ java weblogic.wtc.gwt.genpasswd Key1 LocalPassword1 local
The utility will respond with the encoded password and password IV. Cut and paste the results
into the appropriate fields in Password configuation of your WTC Service.
Local Password

: my_password

WebLogic Tuxedo Connector Administration Guide

3-7

Local Password IV: my_passwordIV

where
z

Cut and paste the string of characters represented by my_password into the Password field.

z

Cut and paste the string of characters represented by my_passwordIV into the
PasswordIV field.

Examples
This section provides examples of each of the password element types.

Local Passwords

A

The following example uses key1 to encrypt “LocalPassword1” as the password of the local
access point.
$ java weblogic.wtc.gwt.genpasswd key1 LocalPassword1 local
Local Password : FMTCg5Vi1mTGFds1U4GKIQQj7s2uTlg/ldBfy6Kb+yY=

ET

Local Password IV : NAGikshMiTE=

Your Password attributes are:

Local Password: FMTCg5Vi1mTGFds1U4GKIQQj7s2uTlg/ldBfy6Kb+yY=
Local Password IV: NAGikshMiTE=

B

Remote Passwords

The following example uses mykey to encrypt “RemotePassword1” as the password for the
remote access point.
$ java weblogic.wtc.gwt.genpasswd mykey RemotePassword1 remote
Remote Password : A/DgdJYOJunFUFJa62YmPgsHan8pC02zPT0T7EigaVg=
Remote Password IV : ohYHxzhYHP0=

Your Password attributes are:
Remote Password: A/DgdJYOJunFUFJa62YmPgsHan8pC02zPT0T7EigaVg=
Remote Password IV: ohYHxzhYHP0=

App Passwords
The following example uses mykey to encrypt “test123” as the application password.

3-8

WebLogic Tuxedo Connector Administration Guide

Us er Authenti catio n

$ java weblogic.wtc.gwt.genpasswd mykey test123 application
App Password : uou2MALQEZgNqt8abNKiC9ADN5gHDLviqO+Xt/VjakE=
App Password IV : eQuKjOaPfCw=

Your Resources attributes are:
Application Password: uou2MALQEZgNqt8abNKiC9ADN5gHDLviqO+Xt/VjakE=
Application Password IV: eQuKjOaPfCw=

User Authentication

A

Access Control Lists (ACLs) limit the access to local services within a local access point by
restricting the remote Tuxedo access point that can execute these services. Inbound policy from
a remote Tuxedo access point is specified using the AclPolicy attribute. Outbound policy
towards a remote Tuxedo domain is specified using the CredentialPolicy attribute. This
allows WebLogic Server and Tuxedo applications to share the same set of users and the users are
able to propagate their credentials from one system to the other.

z

LOCAL

z

GLOBAL

ET

The valid values for AclPolicy and CredentialPolicy are:

ACL Policy is LOCAL

B

If the WebLogic Tuxedo Connector ACL Policy is set to Local, access to local services does not
depend on the CredentialPolicy. The Tuxedo remote domain DOMAINID is authenticated as
a local WebLogic Server user. To allow WebLogic Tuxedo Connector to authenticate a
DOMAINID as a local user, use the WebLogic Server Console to complete the following steps:
1. Click on the Security node.
2. Click on Realms.
3. Select your default security Realm.
4. Click on Users.
5. Click the Configure a new User text link.
6. In the General tab, do the following:
a. Add the Tuxedo DOMAINID in the Name field.

WebLogic Tuxedo Connector Administration Guide

3-9

b. Enter and validate a password.
c. Click apply.

ACL Policy is GLobal
If the WebLogic Tuxedo Connector ACL Policy is GLOBAL, access to local services depends on
the CredentialPolicy.

Credential Policy is Global
If a remote domain is running with the CredentialPolicy set to GLOBAL, the request has the
credentials of the caller.

A

CredentialPolicy is Local
If a remote domain is running with the CredentialPolicy set to LOCAL, the result depends on
the user configuration that initiated the call.

ET

User Authenticaion for Tuxedo 6.5

Tuxedo 6.5 users should set the Interoperate parameter to Yes. The AclPolicy and
CredentialPolicy elements are ignored and the Tuxedo remote domain DOMAINID is
authenticated as a local WebLogic Server user. If you require User Security features and use the
WebLogic Tuxedo Connector, you will need to upgrade to Tuxedo 7.1 or higher.

B

How to Configure WebLogic Tuxedo Connector to Provide
Security between Tuxedo and WebLogic Server
The following sections provide information on how to configure WebLogic Tuxedo provide user
security information to Tuxedo:

3-10

z

TpUsrFile Plug-in

z

LDAP Plug-in

z

Custom Plug-in

z

Anonymous Users

WebLogic Tuxedo Connector Administration Guide

How to Configure Web Logic Tuxe do Connector to Provide Security betwe en Tu xe do an d W eb Log ic S er ver

TpUsrFile Plug-in
The TpUsrFile plug-in provides traditional Tuxedo TpUserFile functionality for users who do not
need single point security administration or custom security authentication. Use the following
steps to configure WebLogic Tuxedo Connector to provide security between Tuxedo and
WebLogic Server applications using the TpUsrFile plug-in AppKey Generator:
z

Configuring the Local Tuxedo Access Point for the TpUsrFile Plug-in

z

Configure the Remote Tuxedo Access Point for the TpUsrFile Plug-in

Configuring the Local Tuxedo Access Point for the TpUsrFile Plug-in

A

Set the security attribute in the Security tab of the local Tuxedo access point of your WTC
Service to match the SECURITY parameter of the *DM_LOCAL_DOMAINS section of the
Tuxedo domain configuration file.

Configure the Remote Tuxedo Access Point for the TpUsrFile Plug-in

ET

Configure the Security tab of the remote Tuxedo access point of your WTC Service to establish
an inbound and outbound Access Control List (ACL) policy.
Perform the following steps to prepare the WebLogic Server environment:
1. Set the AclPolicy attribute to GLOBAL.

2. Set the CredentialPolicy attribute to GLOBAL.

B

3. Set the Allow Anonymous attribute for your environment. If you select to allow anonymous
users to access Tuxedo, you must set the value of the Default AppKey to be used by
anonymous users. For more information on anonymous users, see “Anonymous Users” on
page 3-14.
4. Select TpUsrFile from the AppKey Generator dropdown box.
5. Set the value of the Tp Usr File attribute to the full path to the user password file.
You must have a copy of the Tuxedo tpusr file in your WebLogic Server environment.
Copy the tpusr file from TUXEDO to the WebLogic Server application environment or
generate your own tpusr file. For more information on how to create a Tuxedo tpusr file,
see How to Enable User-Level Authentication at
http://e-docs.bea.com/tuxedo/tux81/sec/secadm.htm#1239966.

WebLogic Tuxedo Connector Administration Guide

3-11

Using the Resources TpUsrFile attribute
The location of the TpUsrFile can be specified from your remote Tuxedo access point
configurations or from your Resources configuration. You may find it convenient assign the
value of the TpUsrFile attribute globally at the WTC Service level, rather than by assigning it
individually on all of your remote Tuxedo access point configurations. Use the following
guidelines to help you determine where to best configure the TpUsrFile attribute:
All TpUsrFile attribute values are ignored if the TpUsrFile Plug-in is not selected as the
AppKey Generator, regardless of location.

z

If the Resources configuation does not have TpUsrFile attribute values, the TpUsrFile
attribute value must be specified in the remote Tuxedo access point configurations. The
cached user record information is ignored.

z

If the Resources and remote Tuxedo access point configurations contain TpUsrFile
attribute values, the attribute values in the remote Tuxedo access points are used. The
cached user record information is ignored.

z

If the remote Tuxedo access point configuations do not have TpUsrFile attribute values, the
TpUsrFile attribute value must be specified in the Resources configuration. The cached
user record is used, which improves system performance. However, this restricts the user to
have the same identity in all remote Tuxedo access points.

LDAP Plug-in

ET

A

z

B

The LDAP plug-in provides single point security administration that allows you to maintain user
security information in a WebLogic Server embedded LDAP server and use the WebLogic Server
Console to administer the security information from a single system. Requires Tuxedo 8.1 and
higher.Use the following steps to configure WebLogic Tuxedo Connector to provide security
between Tuxedo and WebLogic Server applications using the LDAP Plug-in AppKey Generator:
z

Implementing Single Point Security Administration

z

Configure the Local Tuxedo Access Point for the LDAP Plug-in

z

Configure the Remote Tuxedo Access Point for the LDAP Plug-in

Implementing Single Point Security Administration
Detailed information on how to implement single point security administration, see
Implementing Single Point Security Administration located at

3-12

WebLogic Tuxedo Connector Administration Guide

How to Configure Web Logic Tuxe do Connector to Provide Security betwe en Tu xe do an d W eb Log ic S er ver

http://e-docs.bea.com/tuxedo/tux81/sec/sngleadm.htm. For information on WebLogic Security,
see Introduction to WebLogic Security at http://e-docs.bea.com/wls/docs90/secintro/index.html.

Configure the Local Tuxedo Access Point for the LDAP Plug-in
Set the security attribute in the Security tab of the local Tuxedo access point of your WTC
Service to match the SECURITY parameter of the *DM_LOCAL_DOMAINS section of the
Tuxedo domain configuration file.

Configure the Remote Tuxedo Access Point for the LDAP Plug-in
Configure the Security tab of the remote Tuxedo access point of your WTC Service to establish
an inbound and outbound Access Control List (ACL) policy.

1. Set the AclPolicy attribute to GLOBAL.

A

Perform the following steps to prepare the WebLogic Server environment:

2. Set the CredentialPolicy attribute to GLOBAL.

ET

3. Set the Allow Anonymous attribute for your environment. If you select to allow anonymous
users to access Tuxedo, you must set the value of the Default AppKey to be used by
anonymous users. For more information on anonymous users, see “Anonymous Users” on
page 3-14.
4. Select LDAP from the AppKey Generator dropdown box.

B

5. If necessary, set the value of the Tuxedo UID Keyword attribute and Tuxedo GID attribute.
Default values are provided. These keywords for the Tuxedo user ID (UID) is used to
extract the Tuxedo UID and GID in the user record of the embedded LDAP database.

Custom Plug-in

Note: For information on how to create a Custom Plug-in, see How to Create a Custom AppKey
Plug-in athttp://e-docs.bea.com/wls/docs90/wtc_atmi/CustomAppKey.html.
The Custom plug-in provides the ability for you to create customized security authentication. Use
the following steps to configure WebLogic Tuxedo Connector to provide security between
Tuxedo and WebLogic Server applications using the Custom Plug-in AppKey Generator:
z

Configure the Local Tuxedo Access Point for the Custom Plug-in

z

Configure the Remote Tuxedo Access Point for the Custom Plug-in

WebLogic Tuxedo Connector Administration Guide

3-13

Configure the Local Tuxedo Access Point for the Custom Plug-in
Set the security attribute in the Security tab of the local Tuxedo access point of your WTC
Service to match the SECURITY parameter of the *DM_LOCAL_DOMAINS section of the
Tuxedo domain configuration file.

Configure the Remote Tuxedo Access Point for the Custom Plug-in
Configure the Security tab of the remote Tuxedo access point of your WTC Service to establish
an inbound and outbound Access Control List (ACL) policy.
Perform the following steps to prepare the WebLogic Server environment:
1. Set the AclPolicy attribute to GLOBAL.

A

2. Set the CredentialPolicy attribute to GLOBAL.

ET

3. Set the Allow Anonymous attribute for your environment. If you select to allow anonymous
users to access Tuxedo, you must set the value of the Default AppKey to be used by
anonymous users. For more information on anonymous users, see “Anonymous Users” on
page 3-14.
4. Select Custom from the AppKey Generator dropdown box.
5. Set the value of the Custom AppKey Class attribute to the full pathname to your Custom
AppKey generator class. This class is loaded when the WTC Service is started.

B

6. Set the value of the Custom AppKey Param attribute to the optional parameters that you
may require to use your Custom AppKey class when it is initialized when the WTC Service
starts.

Anonymous Users

The Allow Anonymous attribute on the Security tab of a remote Tuxedo access point specifies
whether the anonymous user is allowed to access Tuxedo. If the anonymous user is allowed to
access Tuxedo, the value of the Default AppKey attribute is used for TpUsrFile and LDAP
AppKey plug-ins. The TpUsrFile and LDAP plug-ins do not allow users that are not defined in
user database to access Tuxedo unless the Allow Anonymous attribute is enabled. Interaction
with the Custom AppKey plug-in depends on the design of the Custom AppKey generator.
The default value of the Default AppKey is -1. If you wish to use this value, you must make sure
that your Tuxedo environment has a user assigned to that key value. You should avoid assigning
the Default AppKey value to 0. In some systems, this specifies the user as root.

3-14

WebLogic Tuxedo Connector Administration Guide

L ink -L eve l Encryptio n

Anonymous Users and CORBA Services
It is important to understand the differences between how ATMI services and CORBA services
authenticate an anonymous user. ATMI services rely on the Default AppKey value sent with the
message. Corba services use the default WebLogic Server anonymous user name 
to identify the user credential defined in the Tuxedo tpusr file. CORBA users must configure the
anonymous user using one of the following methods to become an authenticated user:
z

Add  to the Tuxedo tpusr file.

z

Define anonymous as a user in the WebLogic Authentication provider. You do this by
setting the following argument when starting a WebLogic Server instance:

Link-Level Encryption

A

-Dweblogic.security.anonymousUserName=anonymous

ET

You can use encryption to ensure data privacy. In this way, a network-based eavesdropper cannot
learn the content of messages or application-generated messages flowing from one domain
gateway to another. You configure this security mechanism by setting the MINENCRYPTBITS and
MAXENCRYPTBITS attributes of the Security tab in the local Tuxedo access points and remote
Tuxedo access points configurations of your WTC Service.

B

Note: Encryption requires appropriate licensing. For more information on license
requirements, see “Licensing” on page 1-3.

WebLogic Tuxedo Connector Administration Guide

3-15

A
ET
B
3-16

WebLogic Tuxedo Connector Administration Guide

CHAPTER

4

A

Administration of CORBA Applications

Note: For more information on CORBA applications, see Tuxedo CORBA at
http://e-docs.bea.com/tuxedo/tux80/interm/corba.htm.

ET

The following sections provide information on how to administer and configure the WebLogic
Tuxedo Connector to support Tuxedo CORBA clients and services.
z

How to Configure WebLogic Tuxedo Connector for CORBA Service Applications

z

How to Administer and Configure WebLogic Tuxedo Connector for Inbound RMI-IIOP

z

How to Configure WebLogic Tuxedo Connector for Outbound RMI-IIOP

B

How to Configure WebLogic Tuxedo Connector for CORBA
Service Applications
Note: For more information on how to configure your WTC Service, see “Configuring
WebLogic Tuxedo Connector for Your Applications” on page 2-2.
This section provides information on how to configure a WTC Service to support a call to a
Tuxedo CORBA server from a WebLogic Server EJB. Use the following steps to configure your
WTC Service:
1. Configure Local Tuxedo Access Points WebLogic Server applications.
2. Configure Remote Tuxedo Access Points for your Tuxedo CORBA domain.
3. Configure Imported Services.

WebLogic Tuxedo Connector Administration Guide

4-1

z

Set Resource Name to “//domain_id” where domain_id is DOMAINID specified in the
Tuxedo UBBCONFIG file of the remote Tuxedo domain where the object is deployed. The
maximum length of this unique identifier for CORBA domains is 15 characters including
the //.

z

Set Local Access Point to the value of the Local Access Point attribute of your
Remote Tuxedo Access Point.

z

Set the Remote Access Point List to the value of the Access Point Id attribute of
the Remote Tuxedo Access Point.

For information on how to develop client applications that call a Tuxedo CORBA service using
a WebLogic Server EJB, see the WebLogic Tuxedo Connector Programmer’s Guide at
http://e-docs.bea.com/wls/docs90/wtc_atmi/index.html.

A

Example WTC Service and Tuxedo UBB Files

ET

The following WTC Service (represented by the WTCServer MBean in the config.xml file)
provides an example of how to configure an Imported Services configuration for a TUXEDO
CORBA server.
Listing 4-1 Example WTCServer MBean for a CORBA Server Application

B






The following example Tuxedo UBB configuration file has a DOMAINID name of simpapp. The
DOMAINID name is used in the Resource Name attribute of the Imported Services configuration
of your WTC Service.

4-2

WebLogic Tuxedo Connector Administration Guide

How to Configure We bLogic Tuxedo Co nnector for CORBA Service Applications

Listing 4-2 Example Tuxedo UBB File for a CORBA Server Application
*RESOURCES
IPCKEY
DOMAINID

55432
simpapp

MASTER

SITE1

MODEL

SHM

LDBAL

N

*MACHINES
"YODA"
LMID=SITE1
APPDIR="your APPDIR"
TUXDIR="your TUXDIR"
MAXWSCLIENTS=10
*GROUPS
SYS_GRP
GRPNO=1
APP_GRP

ET

LMID=SITE1

A

TUXCONFIG="APPDIR\tuxconfig"

LMID=SITE1
GRPNO=2

B

*SERVERS
DEFAULT:

RESTART=Y

MAXGEN=5
TMSYSEVT

SRVGRP=SYS_GRP

SRVID=1
TMFFNAME
SRVGRP=SYS_GRP
SRVID=2
CLOPT="-A -- -N -M"
TMFFNAME
SRVGRP=SYS_GRP
SRVID=3
CLOPT= "-A -- -N"
TMFFNAME

WebLogic Tuxedo Connector Administration Guide

4-3

SRVGRP=SYS_GRP
SRVID=4
CLOPT="-A -- -F"
ISL
SRVGRP=SYS_GRP
SRVID=5
CLOPT="-A -- -n "
cns
SRVGRP=SYS_GRP
SRVID=6
CLOPT="-A --"
DMADM SRVGRP=SYS_GRP SRVID=7
GWADM SRVGRP=SYS_GRP SRVID=8
simple_server
SRVID=1
RESTART = N
*SERVICES

ET

SRVGRP=APP_GRP

A

GWTDOMAIN SRVGRP=SYS_GRP SRVID=9

B

How to Administer and Configure WebLogic Tuxedo Connector
for Inbound RMI-IIOP
This section provides information on how to administer your application environment and
configure your WTC Service to enable Tuxedo CORBA objects to invoke upon EJBs deployed
in WebLogic Server using the RMI-IIOP API.
z

Configuring Your WTC Service for Inbound RMI-IIOP

z

Administering the Tuxedo Application Environment

Configuring Your WTC Service for Inbound RMI-IIOP
Note: For more information on how to configure your WTC Service, see “Configuring
WebLogic Tuxedo Connector for Your Applications” on page 2-2.

4-4

WebLogic Tuxedo Connector Administration Guide

H o w t o A dm i n i s t e r a nd C o n fi gu re We bLo gi c Tu xedo Con nec to r f or I nb oun d RM I-II OP

Configure Local Tuxedo Access Points and Remote Tuxedo Access Points as needed for your
environment. No special administration steps are required to enable Tuxedo CORBA objects to
invoke upon EJBs deployed in WebLogic Server using the RMI-IIOP API.

Administering the Tuxedo Application Environment
Note: For more information on how to configure your Tuxedo application environment, see
Tuxedo Administration Topics at
http://e-docs.bea.com/tuxedo/tux80/interm/admin.htm.
You must perform some additional steps when configuring your Tuxedo application
environment.
1. Set the TOBJADDR for your environment.

A

Example: //:2468
2. Register WebLogic Server (WLS) Naming Service in the Tuxedo domain’s CosNaming
namespace by entering the following command:

where

ET

cnsbind -o ior.txt your_bind_name

your_bind_name is the CosNaming service object name from your Tuxedo

application.

B

The ior.txt file contains the URL of the WebLogic Server’s domain Naming Service.
Listing 4-3 ior.txt File for iiop.ejb.stateless.server.tux Tuxedo Client Example
corbaloc:tgiop:myServer/NameService

where
myServer is your server name.

3. Modify the *DM_REMOTE_SERVICES of your Tuxedo domain configuration file. Replace
your WebLogic Server service name, formerly the DOMAINID, with the name of your
WebLogic Server.

WebLogic Tuxedo Connector Administration Guide

4-5

Listing 4-4 Domain Configuration File
*DM_RESOURCES
VERSION=U22
*DM_LOCAL_DOMAINS
TDOM1 GWGRP=SYS_GRP
TYPE=TDOMAIN
DOMAINID="TDOM1"
BLOCKTIME=20
MAXDATALEN=56
MAXRDOM=89

TDOM2 TYPE=TDOMAIN

*DM_TDOMAIN

ET

DOMAINID="TDOM2"

A

*DM_REMOTE_DOMAINS

TDOM1 NWADDR="//123.123.123.123:1234"
TDOM2 NWADDR="//234.234.234.234:5678"

"//myServer"

where

B

*DM_REMOTE_SERVICES

myServer is the server name that is running the WTC Service.

4. Load your modified domain configuration file using dmloadcf.

Guidelines About Using Your Server Name as an Object Reference
This section provides guidelines you need to remember when creating server names that are used
as object references.
z

4-6

The maximum field length Tuxedo accepts in the *DM_REMOTE_SERVICES section is 15
characters including the //. For example: If your server name is examplesServer, your
*DM_REMOTE_SERVICES object reference is //examplesServe.

WebLogic Tuxedo Connector Administration Guide

How to Configure WebLog ic Tuxe do Connector for Outbound RMI-II OP

z

If you require muliple servers, the server names must be unique in the first 13 charactcers.

z

You can use the complete name of your server name in the ior.txt file if it exceeds 13
characters. For example: corbaloc:tgiop:examplesServer/NameService

How to Configure WebLogic Tuxedo Connector for Outbound
RMI-IIOP
Note: For more information on how to configure your WTC Service, see “Configuring
WebLogic Tuxedo Connector for Your Applications” on page 2-2.

1. Configure a Local Tuxedo Access Point.

A

This section provides information on how to enable WebLogic Server EJBs to invoke upon
Tuxedo CORBA objects using the RMI-IIOP API. Use the following steps to modify your WTC
Service:

2. Configure Remote Tuxedo Access Point. Outbound RMI-IIOP requires two additional
elements: Federation URL and Federation Name.
Set Federation URL to the URL for a foreign name service that is federated into the
JNDI. This must be the same URL used by the EJB to obtain the initial context used to
access the remote Tuxedo CORBA object.

z

Set Federation Name to the symbolic name of the federation point.

ET

z

3. Configure Imported Services.

Set Resource Name to “//domain_id” where domain_id is DOMAINID specified in the
Tuxedo UBBCONFIG file of the remote Tuxedo domain where the object is deployed. The
maximum length of this unique identifier for CORBA domains is 15 characters including
the //.

z

Set Local Access Point to the value of the Local Access Point attribute of your
Remote Tuxedo Access Point.

z

Set Remote Access Point List to the value of the Access Point Id attribute of
your Remote Tuxedo Access Point.

B

z

For information on how to develop applications that use RMI-IIOP to call a Tuxedo service using
a WebLogic Server EJB, see the WebLogic Tuxedo Connector Programmer’s Guide at
http://e-docs.bea.com/wls/docs90/wtc_atmi/index.html.

WebLogic Tuxedo Connector Administration Guide

4-7

Example Outbound RMI-IIOP Configuration
The following WTCServer MBean in the config.xml file provides an example of a configured
WTC Service for outbound RMI-IIOP.
Listing 4-5 Example WTCServer MBean for Outbound RMI-IIOP
.
.
.



A



.
.
.

4-8

B



WebLogic Tuxedo Connector Administration Guide

CHAPTER

5

A

How to Manage WebLogic Tuxedo
Connector in a Clustered Environment

Note: For more information on WebLogic Server Clusters, see Using WebLogic Server
Clusters at http://e-docs.bea.com/wls/docs90/cluster/index.html.

ET

The following sections provide information on how to administer and configure the WebLogic
Tuxedo Connector for use in a clustered environment:
z

WebLogic Tuxedo Connector Guidelines for Clustered Environments

z

How to Configure OutBound Requests to Tuxedo Domains

z

How to Configure Inbound Requests from Tuxedo Domains

B

WebLogic Tuxedo Connector Guidelines for Clustered
Environments
Use the following guidelines when deploying WebLogic Tuxedo Connector in a clustered
environment:
z

Because the binding is not replicated in other servers in a cluster, all the WebLogic Servers
in the cluster must have a configured WebLogic Tuxedo Connector that includes an
Imported Services tab that defines any imported services required. If one server in the
cluster does not have a WebLogic Tuxedo Connector deployed, the Enterprise Java Bean
(EJB) or Message Driven Bean (MDB) won't be able to find a Tuxedo Connection Factory
for that connection.

WebLogic Tuxedo Connector Administration Guide

5-1

z

The administrator is responsible for the correct configuration of the TUXEDO
DMCONFIG to allow proper load balancing and fail over of inbound calls to clustered
nodes.

z

WebLogic Tuxedo Connector does not support inbound TGIOP in clustered environments.

How to Configure OutBound Requests to Tuxedo Domains
Note: For more information on WebLogic Server Clusters, see Cluster Features and
Infrastructure at http://e-docs.bea.com/wls/docs90/cluster/features.html. WebLogic
Tuxedo Connector also provides domain-level failover and failback capabilities. For
more information, see “Configuring Failover and Failback” on page 3-4.

A

The load balancing and failover of the outbound requests from WebLogic Server depend on the
WebLogic Server EJB and MDB.

Example Clustered WebLogic Tuxedo Connector Configuration

ET

The following configuration provides an example of WebLogic Tuxedo Connector in a clustered
environment. The cluster consists of an administration server (wtcAServer) and three managed
servers (wtcMServer1, wtcMServer2, wtcMServer3). Each managed server has a configured
WTC Service that contains the same service (TOUPPER) in as an imported service.
Listing 5-1 Example Clustered WebLogic Tuxedo Connector Configuration

B













5-2

WebLogic Tuxedo Connector Administration Guide

How to Configure OutBound Re quests to T uxedo Do mains







ET

A









B

















A

How to Configure Inbound Requests from Tuxedo Domains
Load Balancing

ET

Load balancing and failover of inbound requests from Tuxedo depend on the Tuxedo domain
DMCONFIG configuration.

Note: For more information on Tuxedo Load Balancing
http://e-docs.bea.com/tuxedo/tux81/int/intatm.htm#1119040.

*DM_IMPORT

B

The following is a sample Tuxedo DMCONFIG that load balances from Tuxedo to clustered
WTC. This configuration has three nodes in a WebLogic Server cluster. Each node has a single
properly configured WebLogic Tuxedo Connector instance that provides an exported service that
is accessible to the Tuxedo client.

TOUPPER LDOM=tuxedo_dom RDOM=WDOM1 LOAD=50
TOUPPER LDOM=tuxedo_dom RDOM=WDOM2 LOAD=50
TOUPPER LDOM=tuxedo_dom RDOM=WDOM3 LOAD=50

5-4

WebLogic Tuxedo Connector Administration Guide

H o w to C o nf i g ur e I nb o u nd R e q ue s ts fr o m T ux e d o D o m ai n s

Fail Over
Notes: For more information on Specifying Domains Failover and Failback on Tuxedo, see
http://e-docs.bea.com/tuxedo/tux81/add/addom.htm#1257878.
The following is a sample Tuxedo DMCONFIG that uses a more sophisticated configuration that
load balances between the WebLogic Server nodes as well as illustrate Tuxedo failover
capability. The Tuxedo domain must be configured with a Connection Policy of On Startup
or Incoming Only to enable Domains-level failover/failback.
*DM_IMPORT
TOUPPER LDOM=tuxedo_dom RDOM=WDOM1,WDOM2,WDOM3 LOAD=50
TOUPPER LDOM=tuxedo_dom RDOM=WDOM2,WDOM3,WDOM1 LOAD=50

B

ET

A

TOUPPER LDOM=tuxedo_dom RDOM=WDOM3,WDOM1,WDOM2 LOAD=50

WebLogic Tuxedo Connector Administration Guide

5-5

A
ET
B
5-6

WebLogic Tuxedo Connector Administration Guide

CHAPTER

6

A

How to Configure the Tuxedo Queuing
Bridge

The following sections provide information on the Tuxedo Queuing Bridge functionality and
configuration.
Overview of the Tuxedo Queuing Bridge

z

Configuring the Tuxedo Queuing Bridge

z

Tuxedo Queuing Bridge Connectivity

z

Example Connection Type Configurations

z

Priority Mapping

z

Error Queues

B

ET

z

Overview of the Tuxedo Queuing Bridge
The Tuxedo Queuing Bridge is a part of the WebLogic Tuxedo Connector that provides a
bi-directional JMS interface for your WebLogic Server applications communicate to Tuxedo
application environments. The transfer of messaging between the environments consists of JMS
based messages containing text, Byte, or XML data streams used to invoke services on behalf of
the client application.

WebLogic Tuxedo Connector Administration Guide

6-1

ET

A

Figure 6-1 Interaction between WebLogic Server and Tuxedo with the Queing Bridge

The following features determine the functionality of the Tuxedo Queuing Bridge:
Connectivity is determined by the configuration of the attributes in theTuxedo Queuing
Bridge and Redirections of your WTC Service.

z

The Tuxedo Queuing Bridge uses Java Messaging Service (JMS) to provide an interface to
a Tuxedo /Q or a Tuxedo service.

z

The Tuxedo Queuing Bridge provides simple translation between XML and FML32 to
provide connectivity to existing Tuxedo systems.

B

z

How Tuxedo Queuing Bridge connects JMS with Tuxedo
Note: All messages remain on the JMS queue until they have been acknowledged.
This section provides information on how JMS messages flow through the Tuxedo Queuing
Bridge to Tuxedo queues and services.

6-2

WebLogic Tuxedo Connector Administration Guide

Overvi ew o f the T uxedo Queui ng Bridge

1. A JMS client, such as a web enabled WLPI application, places a message to be processed by
Tuxedo on a JMS Queue. If this message was part of a transaction, the transaction commits.
2. The message is removed from the JMS queue to be processed by the Tuxedo Queuing
Bridge Converter.
3. The Tuxedo Queuing Bridge Converter checks the message type and converts supported
JMS types to JATMI buffer types.
BytesMessage, TextMessage, XML are converted respectively to TypedCArray,
TypedString, and TypedFML32. XML/FML translation is performed according to the
TranslateFML attribute.

z

Translation errors are sent to the wlsServerErrorDestination queue and the message is
acknowledged in the JMS session.

z

If an unrecognized JMS message is received: an appropriate error message is logged, the
message is acknowledged, and then is discarded. This is considered a configuration error
and the Tuxedo Queuing Bridge does not redirect the message to the error queue.

A

z

ET

4. The converted message is sent to Tuxedo using the T/Domain gateway.
z

Messages with a redirect set to JmsQ2TuxQ use JATMI tpenqueue to deliver the message
to a Tuxedo queue.

z

Messages with a redirect set to JmsQ2TuxS use JATMI tpcall to deliver the message to a
Tuxedo service.

z

B

5. The tpenqueue is successful or tpcall is successful and the return results are placed in the
replyQ. The message is acknowledged in the JMS session.
If the tpenqueue or tpcall fails, Tuxedo Queuing Bridge delivers the message to the
wlsServerErrorDestination queue and the message is acknowledged in the JMS
session. If a wlsServerErrorDestination queue is not configured, the message is
discarded and the Tuxedo Queuing Bridge processes the next available unacknowledged
message.

How Tuxedo Queuing Bridge connects Tuxedo to JMS
Note: Tuxedo Queuing Bridge uses a transaction to prevent the loss of messages while
transferring messages from Tuxedo /Q to a JMS queue.
This section provides information on how Tuxedo messages flow through the Tuxedo Queuing
Bridge to a JMS queue using the TuxQ2JmsQ redirect.

WebLogic Tuxedo Connector Administration Guide

6-3

1. Tuxedo Queuing Bridge polls the Tuxedo queue for available messages.
2. A Tuxedo service places a message on a Tuxedo queue.
3. Tuxedo Queuing Bridge uses JATMI tpdequeue to forward the message from Tuxedo and
places the message in the JMS queue.
z

If a message cannot be redirected to a JMS queue for any reason after the specified retries
have been exhausted, the message is put into the tuxErrorDestination queue within the
same queue space as the Tuxedo queue.

z

If the Tuxedo Queuing Bridge is not able to put the message into the
tuxErrorDestination queue for any reason, an error is logged and the message is lost.

z

If the tuxErrorDestination queue is not specified, the message is lost.

A

Tuxedo Queuing Bridge Limitations

The Tuxedo Queuing Bridge has the following limitations:

Transactions are not used when retrieving messages from the JMS location and placing
them on the Tuxedo queue or invoking a Tuxedo service.

z

Tuxedo Queuing Bridge is thread intensive. A thread is used to transport each message
from JMS queue to Tuxedo. A polling thread is required to monitor the configured Tuxedo
queue.

z

The XML/FML translator is intended to construct simple message structures. For more
information on XML to FML conversion see, FML32 Considerations at
http://e-docs.bea.com/wls/docs90/wtc_atmi/XML_FML.html.

B

ET

z

Configuring the Tuxedo Queuing Bridge
Tuxedo Queuing Bridge connectivity is determined by configuring the attributes in the Tuxedo
Queuing Bridge and Redirections of your WTC Service. These attributes contain the necessary
information to establish a connection to Tuxedo.

Starting the Tuxedo Queuing Bridge
The Tuxedo Queuing Bridge is started as part of the WebLogic Server application environment
if the Tuxedo Queuing Bridge and Redirections of your WTC Service are configured and the
WTC Service is is deployed to a target server. Any configuration condition that prevents the
Tuxedo Queuing Bridge from starting results in an error being logged.
6-4

WebLogic Tuxedo Connector Administration Guide

T uxedo Queuing Bridge Co nnectivi ty

Error Logging
WebLogic Tuxedo Connector errors are logged to the WebLogic Server error log.

Tuxedo Queuing Bridge Connectivity
Note: JMS message types: MapMessage, ObjectMessage, StreamMessage are not valid in
WebLogic Tuxedo Connector. If one of these message types is received by the Tuxedo
Queuing Bridge, a log entry is generated indicating this is an unsupported type and the
message is discarded.

z

A

The Tuxedo Queuing Bridge establishes a one-way data connection between instances of a JMS
queue and a Tuxedo /Q or a JMS queue and a Tuxedo service. This connection is represented by
the Tuxedo Queuing Bridge and Redirections configurations of your WTC Service and provides
a one-to-one connection between the identified points. Three types of connections can be
configured. The following is a description of each of the connection types:
JmsQ2TuxQ: Reads from a given JMS queue and transports the messages to the specified

ET

Tuxedo /Q.
z

TuxQ2JmsQ: Reads from a Tuxedo /Q and transports the messages to JMS.

z

JmsQ2TuxS: Reads from a given JMS queue, synchronously calls the specified Tuxedo

service, and places the reply back onto a specified JMS queue.

Example Connection Type Configurations

B

The following sections provide example configurations for each connection type.

Example JmsQ2TuxQ Configuration
The following section provides an example configuration in the config.xml file for reading
from a JMS queue and sending to Tuxedo /Q.


The following section describes the components of the JmsQ2TuxQ configuration:
z

The Direction connection type is JmsQ2TuxQ.

z

Source Name specifies the name of the JMS queue to read is
weblogic.jms.Jms2TuxQueue. The Tuxedo Queuing Bridge establishes a JMS client

session to this queue using CLIENT_ACKNOWLEDGE semantics.
Target Access Point specifies the name of the access point is TDOM2.

z

Target Qspace specifies the name of the Qspace is Qspace.

z

Target Name specifies the name of the queue is STRING.

z

ReplyQ specifies the name of a JMS reply queue is RPLYQ. Use of this queue causes
tpenqueue to provide TMFORWARD functionality.

z

TranslateFML set to NO specifies that no data translation is provided by the Tuxedo
Queuing Bridge.

ET

A

z

The following table provides information on JmsQtoTuxQ message mapping:
From: JMS Message Type
BytesMessage

To: WebLogic Tuxedo Connector JATMI (Tuxedo)
TypedCArray

TypedString

TextMessage (translateFML = FLAT)

TypedFML32

B

TextMessage (translateFML = NONE)

Example TuxQ2JmsQ Configuration
The following section provides an example configuration in the config.xml file for reading
from a Tuxedo /Q and sending to a JMS queue.


The following section describes the components of the TuxQ2JmsQ configuration:
The Direction connection type is TuxQ2JmsQ.

z

Target Name specifies the name of the JMS queue to read is
weblogic.jms.Tux2JmsQueue.

z

Source Access Point specifies the name of the access point is TDOM2.

z

Source Qspace specifies the name of the Qspace is Qspace.

z

Source Name specifies the name of the queue is STRING.

z

TranslateFML set to NO specifies that no data translation is provided by the Tuxedo
Queuing Bridge.

z

TranslateFML set to Flat specifies that the data is translated from FML to XML by the
Tuxedo Queuing Bridge.

A

z

ET

The following table provides information on TuxQ2JmsQ message mapping:
From: WebLogic Tuxedo Connector JATMI
(Tuxedo)

To: JMS Message Type

TypedCArray

BytesMessage
TextMessage

TypedFML32 (translateFML = FLAT)

TextMessage

TypedFML (translateFML = FLAT)

TextMessage

TypedXML

TextMessage

B

TypedString (translateFML = NO)

Example JmsQ2TuxS Configuration
Note: For more information on XML/FML conversion, see Using FML with WebLogic
Tuxedo Connector at http://e-docs.bea.com/wls/docs90/wtc_atmi/XML_FML.html.
The following section provides an example configuration in the config.xml file for reading
from a JMS queue, calling a Tuxedo service, and then writing the results back to a JMS queue.

WebLogic Tuxedo Connector Administration Guide

6-7



The following section describes the components of the JmsQ2TuxS configuration:
The Direction connection type is JmsQ2TuxS.

z

Source Name specifies the name of the JMS queue to read is
weblogic.jms.Jms2TuxQueue.

z

Target Access Point specifies the name of the access point is TDOM2.

z

Target Name specifies the name of the queue is TOUPPER.

z

ReplyQ specifies the name of the JMS reply queue is weblogic.jms.Tux2JmsQueue.

z

TranslateFML set to FLAT specifies that when a JMS message is received, the message is
in XML format and is converted into the corresponding FML32 data buffer. The message
is then placed in a tpcall with arguments TDOM2 and TOUPPER. The resulting message is
then translated from FML32 into XML and placed on the weblogic.jms.Tux2JmsQueue.

ET

A

z

JMS Message Type

B

The following table provides information on the JMSQ2TuxX message mapping:
WebLogic Tuxedo Connector JATMI
(Tuxedo)

JMS Message Type

TypedCArray

BytesMessage

TextMessage
(translateFML = NONE)

TypedString

TextMessage

TextMessage
(translateFML = FLAT)

TypedFML32

TextMessage

BytesMessage

6-8

WebLogic Tuxedo Connector Administration Guide

P r i o r i t y Ma pp i n g

Priority Mapping
WebLogic Tuxedo Connector supports multiple Tuxedo Queuing Bridge redirect instances. In
many environments, using multiple redirect instances significantly improves application
scalability and performance. However, it does randomizes the order in which messages are
processed. Although priority mapping does not guarantee ordering, it does provides a mechanism
to react to messages based on an assigned importance. If the order of delivery must be guaranteed,
use a single Tuxedo Queuing Bridge redirect instance.
Use Priority Mapping to map priorities between the JMS and Tuxedo.
z

JMS has ten priorities (0 - 9).

z

Tuxedo/Q has 100 priorities (1 - 100).

JmstoTux

z

TuxtoJms

ET

z

A

This section provides a mechanism to map the priorities between the Tuxedo and JMS
subsystems. There are two mapping directions:

Defaults are provided for all values, shown below in pairs of value:range.
z

The value specifies the given input priority.

z

The range specifies a sequential group of resulting output priorities.

JmstoTux- 0:1 | 1:12 | 2:23 | 3:34 | 4:45 | 5:56 | 6:67 | 7:78 | 8:89 | 9:100

B

TuxtoJms- 1-10:0 | 11-20:1 | 21-30:2 | 31-40:3 | 41-50:4| 51-60:5 | 61-70:6 | 71-80:7 | 81-90:8 |

91-100:9

For this configuration, a JMS message of priority 7 is assigned a priority of 78 in the Tuxedo /Q.
A Tuxedo /Q with a priority of 47 is assigned a JMS priority of 4.

Error Queues
When Tuxedo Queuing Bridge encounters a problem retrieving messages from Tuxedo Queue or
JMS Queue after the retry interval:
z

The information is logged.

z

The message is saved in the error queue if it is configured.

WebLogic Tuxedo Connector Administration Guide

6-9

WLS Error Destination
The WLS Error Destination queue is used if a JMS message cannot be properly delivered due
to Tuxedo failure or a translation error.

Unsupported Message Types
If an unrecognized JMS message is received, an appropriate error message is logged and the
message is discarded. This is considered a configuration error and the Tuxedo Queuing Bridge
does not redirect the message to the error queue.

Tuxedo Error Queue

A

The Tuxedo Error Queue is the failure queue for the JATMI primitive tpdequeue during a
TuxQ2JmsQ redirect.

Limitations

6-10

ET

The Tuxedo Queuing Bridge error queues have the following limitations:
Tuxedo Error Destination can be specified only once. Any error queue name
associated with the ErrorDestination implies that all the QSPACEs have the same error
queue name available.

z

When there is an error, the message is put back in the source QSPACE. Assuming the
QSPACE is corrupted or full, subsequent messages would be lost.

z

There is no way to drop messages on error. All messages are received or none are received.

z

Information about the error is only available in the server log.

B

z

WebLogic Tuxedo Connector Administration Guide

CHAPTER

7

A

Connecting WebLogic Integration and
Tuxedo Applications

Note: For more information on how to integrate applications, see BEA WebLogic Integration
at http://e-docs.bea.com/more_wlpi.html.

ET

The WebLogic Tuxedo Connector Tuxedo Queuing Bridge provides the necessary infrastructure
for WebLogic Integration users to integrate Tuxedo applications into their business workflows.
The following sections discuss WebLogic Integration - Tuxedo interoperability using the
WebLogic Tuxedo Connector.
Synchronous WebLogic Integration-to-Tuxedo Connectivity

z

Synchronous Non-Blocking WebLogic Integration-to-Tuxedo Connectivity

z

Asynchronous WebLogic Integration-to-Tuxedo Connectivity

z

Asynchronous Tuxedo /Q-to-WebLogic Integration Connectivity

z

Bi-directional Asynchronous Tuxedo-to-WebLogic Integration Connectivity

B

z

Synchronous WebLogic Integration-to-Tuxedo Connectivity
WebLogic Integration executes a blocking invocation against a Tuxedo service using a JATMI
EJB. This process consists of three parts:
z

Defining WebLogic Integration Business Operations.

z

Invoking an eLink Adapter.

z

Defining WebLogic Integration Exception Handlers.

WebLogic Tuxedo Connector Administration Guide

7-1

Defining Business Operations
Define WebLogic Integration Business Operations for the JATMI methods to be used:
z

TypedFML32 buffer manipulation methods.

z

Use the JATMI tpcall() method.
Example: out_buffer = tpcall (service_name, in_buffer, flags)

Invoking an eLink Adapter
Invoke an eLink adapter from a WebLogic Integration process flow:
Build TypedFML32 request buffers using defined Business Operations.

z

Using the defined Business Operation invoke the JATMI tpcall() method specifying the
service name.

z

Process TypedFML32 response buffers using defined Business Operations.

ET

Define Exception handlers

A

z

Define WebLogic Integration Exception handlers to process exceptions.

Synchronous Non-Blocking WebLogic Integration-to-Tuxedo
Connectivity

7-2

B

WebLogic Integration sends a message to synchronously invoke a Tuxedo service:
z

1:1 relationship between JMS queue and the call to a Tuxedo service.

z

1:1 relationship between the response from the Tuxedo service and a JMS queue.

z

WebLogic Integration writes a message to JMS queue.

z

Once the message is on the JMS queue then Tuxedo Queuing Bridge moves the message to
the target Tuxedo service.

z

The message is translated from/to XML/FML32.

z

The response is written to the specified JMS reply queue.

z

The WebLogic Integration event node waits on the response queue for a response message.

WebLogic Tuxedo Connector Administration Guide

As ynch r ono us Web Log ic In teg r at ion - to -T uxed o Co nn ect ivi ty

Asynchronous WebLogic Integration-to-Tuxedo Connectivity
WebLogic Integration sends a guaranteed asynchronous message to a Tuxedo /Q:
z

1:1 relationship between JMS queue and Tuxedo /Q.

z

WebLogic Integration writes a message to JMS queue.

z

Once the message is on the JMS queue then Tuxedo Queuing Bridge moves the message to
the target Tuxedo /Q on a per message basis.

z

Messages in error are forwarded to a specified JMS error queue:
– Infrastructure errors.
– XML/FML32 translation errors.

A

Asynchronous Tuxedo /Q-to-WebLogic Integration Connectivity
Tuxedo /Q sends a guaranteed asynchronous message to WebLogic Integration:
1:1 relationship between JMS queue and Tuxedo /Q.

z

Tuxedo writes a message to Tuxedo /Q.

z

Once the message is committed on Tuxedo /Q, the message is forwarded via the Tuxedo /T
Domain Gateway to the WebLogic Tuxedo Connector Tuxedo Queuing Bridge and target
JMS queue.

z

Messages which cannot be forwarded from Tuxedo are enqueued on a Tuxedo /Q error
queue.

z

Messages in error are forwarded to a specified Tuxedo /Q error queue, including:

B

ET

z

– Infrastructure errors.

– FML32/XML translation errors.
z

A workflow is created that waits for the message on the JMS queue. It is defined in the
Start workflow node or in the Event node of an existing workflow instance.

Bi-directional Asynchronous Tuxedo-to-WebLogic Integration
Connectivity
Tuxedo executes a blocking invocation of a WebLogic Integration process flow. Use two
asynchronous instances to connect from JMS to Tuxedo /Q and from Tuxedo /Q back to JMS.
WebLogic Tuxedo Connector Administration Guide

7-3

A
ET
B
7-4

WebLogic Tuxedo Connector Administration Guide

CHAPTER

8

A

Troubleshooting The WebLogic Tuxedo
Connector

The following sections provide WebLogic Tuxedo Connector troubleshooting information.
Monitoring the WebLogic Tuxedo Connector

z

Frequently Asked Questions

ET

z

Monitoring the WebLogic Tuxedo Connector
The WebLogic Tuxedo Connector uses the WebLogic Server log file to record log information.
To record log information you must:
Set Trace Levels

z

Enable Debug Mode

B

z

Set Trace Levels

Note: For more information about setting WebLogic Server properties, see “How to Set
WebLogic Tuxedo Connector Properties” on page 2-7.
To enable tracing, update the JAVA_OPTIONS variable in your server start script to the to the
desired level.
Example:
JAVA_OPTIONS=-Dweblogic.wtc.TraceLevel=100000

Use the following values to set the TraceLevel:

WebLogic Tuxedo Connector Administration Guide

8-1

Components Traced

Description

10000

TBRIDGE_IO

Tuxedo Queuing Bridge input and
output

15000

TBRIDGE_EX

more Tuxedo Queuing Bridge
information

20000

GWT_IO

Gateway input and output, including
the ATMI verbs

25000

GWT_EX

more Gateway information

50000

JAMTI_IO

JAMTI input and output, including
low-level JAMTI calls

55000

JAMTI_EX

60000

CORBA_IO

65000

CORBA_EX

A

Value

more JAMTI information

CORBA input and output

ET

more CORBA information

100000

All Components

information on all WebLogic Tuxedo
Connector components

Enable Debug Mode

B

Use the following procedure to specify that trace information is written to the log file:
1. Click the Server node in the left pane.
2. Select your server in the left pane.
3. Select the Logging tab.
4. In the General tab:
a. Check Debug to Stdout
b. Set Stdout severity threshold to Info.

Frequently Asked Questions
This section provides solutions to common user questions.
8-2

WebLogic Tuxedo Connector Administration Guide

Freque ntly A sked Questions

What does this EJB Deployment Message Mean?
When I build the simpserv example, I get the following error:
   

This error message can be ignored for this release of the WebLogic Tuxedo Connector. The EJB
wants all of the interfaces for an EJB call in the EJB jar file. However, some interfaces for the
WebLogic Tuxedo Connector are implemented through the CLASSPATH, and the compiler
throws an exception. When the EJB is deployed, the compiler complains that the EJB cannot be
redeployed because some of its classes are found in the CLASSPATH.

A

How do I Start the Connector?
Releases prior to WebLogic Server 7.0 used a WebLogic Server Startup class to start a WebLogic
Tuxedo Connector session and a WebLogic Server Shutdown class to end a session. In WebLogic
Server 8.1, WebLogic Tuxedo Connector sessions are managed using a WTC Service.
A WebLogic Tuxedo Connector session is started when a configured WTC Service is
assigned to a selected server.

z

A WebLogic Tuxedo Connector session is ended by removing a WTC Service from the
WebLogic server or when you shutdown the WebLogic server.

ET

z

B

How do I Start the Tuxedo Queuing Bridge?
The Tuxedo Queuing Bridge is started if the Tuxedo Queuing Bridge and Redirections
configurations exist in your WTC Service and the WTC Service is assigned to a selected server

How do I Assign a WTC Service to a Server?
The console displays an exception when I try to assign my WTC Service to a server. What should
I do?
Make sure you have a valid WTC Service configured. Each WTC Service must have 1 or more
Local Tuxedo Access Points configured before it can be assigned to a server. Your server log will
display the following:
   <180101> 

WebLogic Tuxedo Connector Administration Guide

8-3

How do I Resolve Connection Problems?
I'm having trouble getting a connection established between WebLogic Tuxedo Connector and
Tuxedo. What should I do?
Make sure you have started your Tuxedo server.

z

Set the TraceLevel and enable Debug mode. Repeat the connectivity test and check the
WebLogic Tuxedo Connector and Tuxedo log files for error messages.

z

Avoid using machine names or localhost. Always use an IP address when specifying a
network location.

z

Check your AclPolicy and CredentialPolicy attributes. If your AclPolicy is LOCAL,
you must register the remote domain DOMAINID as a WebLogic Server user. For more
information, see “User Authentication” on page 3-9.

z

If you are migrating from WebLogic Server 6.x and your applications use security, you
need to set PasswordKey as a WebLogic Server property. For more information, see “How
to Set WebLogic Tuxedo Connector Properties” on page 2-7.

z

Check the WebLogic Tuxedo Connector configuration against the Tuxedo remote domain.
The remote domain must match the name of a remote domain configured in WebLogic
Tuxedo Connector.

ET

A

z

z

B

For example: If the name simpapp is configured in the Tuxedo DMCONFIG
*DM_LOCAL_DOMAINS section, then this name must match the name in your
Remote Tuxedo Access Point Access Point Id attribute.
Request assistance from BEA Customer Support.

How do I Migrate from Previous Releases?
You must make some changes in your WebLogic Tuxedo Connector 6.x applications (including
WebLogic Tuxedo Connector 1.0) to use them with WebLogic Server 9.0. For more information,
see WebLogic Platform Upgrade Planning Guide at
http://e-docs.bea.com/wls/docs90/../../platform/docs90/upgrade/index.html.

8-4

WebLogic Tuxedo Connector Administration Guide



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : Yes
Page Count                      : 78
Page Mode                       : UseOutlines
XMP Toolkit                     : XMP toolkit 2.9.1-13, framework 1.6
About                           : uuid:be1088b2-7b45-462e-8f3c-b61aba6737cb
Producer                        : Acrobat Distiller 6.0 (Windows)
Creator Tool                    : FrameMaker 6.0
Modify Date                     : 2004:12:14 07:53:21Z
Create Date                     : 2004:12:14 07:53:16Z
Document ID                     : uuid:2c9b581f-61bc-421d-989a-4085ebf7688d
Format                          : application/pdf
Title                           : wtc_admin.book
Creator                         : webadmin
Author                          : webadmin
EXIF Metadata provided by EXIF.tools

Navigation menu