These properties are set in
config/.
com.forgerock.agents.ext.url.validation.default.url.set-
This property takes a comma-separated list of indexes for URL values indicating the order in which to fail over, where the indexes are taken from the values set for
com.sun.identity.agents.config.naming.url,com.sun.identity.agents.config.login.url,com.sun.identity.agents.config.cdsso.cdcservlet.url, andcom.sun.identity.agents.config.logout.url.For example if
com.sun.identity.agents.config.naming.urlis set as follows:com.sun.identity.agents.config.naming.url= http://zero.example.com:8080/openam/namingservice http://one.example.com:8080/openam/namingservice
Then the following setting means first use OpenAM on
zero.example.com, then fail over if necessary to OpenAM onone.example.com, assumingcom.forgerock.agents.ext.url.validation.levelis set to enable validation.com.forgerock.agents.ext.url.validation.default.url.set=0,1
When using this failover capability make sure you synchronize URL settings in
com.sun.identity.agents.config.naming.url,com.sun.identity.agents.config.login.url,com.sun.identity.agents.config.cdsso.cdcservlet.url, andcom.sun.identity.agents.config.logout.urlsuch that each service shares the same index across all properties. In other words, in the example above each service underhttp://zero.example.com:8080/openamwould be the first item (index: 0) for each property. This ensures the policy agent fails over and fails back from one server to another in synchronized fashion for all services.This property has no default setting.
com.forgerock.agents.ext.url.validation.level-
This bootstrap configuration property lets you configure naming URL validation during the initial bootstrap phase when the policy agent reads its configuration, and then thereafter if the policy agent is configured fail over when a naming URL becomes invalid.
When URL validation is fully disabled the policy agent does not need to connect to OpenAM during the bootstrap phase.
If you leave naming URL validation disabled, then make sure that the URLs in the policy agent bootstrap configuration file are valid and correct. As the policy agent performs no further validation after the bootstrap phase, incorrect naming URLs can cause the agent to crash.
To enable full URL validation, set the property as shown:
com.forgerock.agents.ext.url.validation.level = 0
This property can take the following values.
- 0
-
Fully validate naming URLs specified by using the
com.sun.identity.agents.config.naming.urlproperty. The web policy agent logs into and logs out of OpenAM to check that a naming URL is valid. - 1
-
Check that naming URLs are valid by performing an HTTP GET, which should receive an HTTP 200 response.
- 2 (Default)
-
Disable all naming URL validation.
When naming URL validation is enabled, then set the following properties.
-
com.sun.identity.agents.config.connect.timeout -
com.sun.identity.agents.config.receive.timeout
com.forgerock.agents.ext.url.validation.ping.interval-
Set this to the seconds between validation requests against the current naming URL.
The sum of the values of
com.sun.identity.agents.config.connect.timeoutandcom.sun.identity.agents.config.receive.timeoutmust not exceed this value. Notice that the two timeout values are specified in milliseconds, whereas this property's value is specified in seconds.Default: 60 (seconds)
com.forgerock.agents.ext.url.validation.ping.miss.count-
If validation requests against the current naming URL fail this number of times in a row, the web policy agent fails over to the next service in
com.forgerock.agents.ext.url.validation.default.url.set.Default: 3
com.forgerock.agents.ext.url.validation.ping.ok.count-
After failover, if validation requests against the default naming URL succeed this number of times in a row, the web policy agent fails back to that service, the first URL in the
com.forgerock.agents.ext.url.validation.default.url.setlist.Default: 3
com.sun.identity.agents.config.certdb.password-
When SSL is configured, set this to the password for the certificate database.
com.sun.identity.agents.config.certdb.prefix-
When SSL is configured, set this property if the certificate databases in the directory specified by
com.sun.identity.agents.config.sslcert.dirhave a prefix. com.sun.identity.agents.config.certificate.alias-
When SSL is configured, set this to the alias of the certificate used to authenticate.
com.sun.identity.agents.config.connect.timeout-
Set this to the number of milliseconds to keep the socket connection open before timing out. If you have the web policy agent perform naming URL validation, then set this property to a reasonable value such as 2000 (2 seconds). The default value is 0 which implies no timeout.
com.sun.identity.agents.config.debug.file-
Set this to the full path of the agent's debug log file.
com.sun.identity.agents.config.debug.level-
Default is
Error. Increase toMessageor evenAllfor fine-grained detail.Set the level in the configuration file by module using the format
, wheremodule[:level][,module[:level]]*moduleis one ofAuthService,NamingService,PolicyService,SessionService,PolicyEngine,ServiceEngine,Notification,PolicyAgent,RemoteLog, orall, andlevelis one of the following.-
0: Disable logging from specified moduleAt this level the agent nevertheless logs messages having the level value
always. -
1: Log error messages -
2: Log warning and error messages -
3: Log info, warning, and error messages -
4: Log debug, info, warning, and error messages -
5: Like level 4, but with even more debugging messages
When you omit
level, the agent uses the default level, which is the level associated with theallmodule.The following example used in the local configuration sets the log overall level to debug for all messages.
com.sun.identity.agents.config.debug.level=all:4
-
com.sun.identity.agents.config.forward.proxy.host-
When OpenAM and the agent communicate through a web proxy server configured in forward proxy mode, set this to the proxy server host name.
com.sun.identity.agents.config.forward.proxy.password-
When OpenAM and the agent communicate through a web proxy server configured in forward proxy mode and the proxy server has the agent authenticate using Basic Authentication, set this to the agent's password.
com.sun.identity.agents.config.forward.proxy.port-
When OpenAM and the agent communicate through a web proxy server configured in forward proxy mode, set this to the proxy server port number.
com.sun.identity.agents.config.forward.proxy.user-
When OpenAM and the agent communicate through a web proxy server configured in forward proxy mode and the proxy server has the agent authenticate using Basic Authentication, set this to the agent's user name.
com.sun.identity.agents.config.key-
Set this to the encryption key used to encrypt the agent profile password.
com.sun.identity.agents.config.local.logfile-
Set this to the full path for agent's audit log file.
com.sun.identity.agents.config.naming.url-
Set this to the naming service URL(s) used for naming lookups in OpenAM. Separate multiple URLs with single space characters.
com.sun.identity.agents.config.organization.name-
Set this to the realm name where the agent authenticates to OpenAM.
com.sun.identity.agents.config.password-
Set this to the encrypted version of the password for the agent authenticator. Use the command ./agentadmin --encrypt
agentInstancepasswordFileto get the encrypted version. com.sun.identity.agents.config.profilename-
Set this to the agent profile name.
com.sun.identity.agents.config.receive.timeout-
Set this to the number of milliseconds to wait for a response from OpenAM before timing out and dropping the connection. If you have the web policy agent perform naming URL validation, then set this property to a reasonable value such as 2000 (2 seconds). The default value is 0 which implies no timeout.
com.sun.identity.agents.config.sslcert.dir-
When SSL is configured, set this to the directory containing SSL certificate databases.
com.sun.identity.agents.config.tcp.nodelay.enable-
Set to
trueto enable the socket optionTCP_NODELAY. Default isfalse. com.sun.identity.agents.config.trust.server.certs-
When SSL is configured, set to
falseto trust the OpenAM SSL certificate only if the certificate is found to be correct and valid. Default istrueto make it easy to try SSL during evaluation.![[Important]](common/images/admon/important.png)
Important Notice that the default setting,
true, means that the web policy agent trusts all server certificates. Change this tofalse, and test that your web policy agent can trust server certificates before deploying the policy agent in production. com.sun.identity.agents.config.username-
Set this to the user name of the agent authenticator.
com.forgerock.agents.instance.id-
When there are multiple agents on a single system, set this to a unique numeric value.

