In the Security dialog, specify the
supported by the resource adapter.
Select the authentication mechanism(s) to be used with the resource
adapter in the Authentication Mechanisms pane. One or more of the
following may be checked:
Password: A user and password is required to connect to an EIS.
Kerberos Version 5.0: The resource adapter supports the Kerberos
authentication mechanism. See the Kerberos specification for details.
If you do not select one, no standard security authenication is
supported as part of the security contract.
Select Reauthentication Supported if the resource adapter supports
performing reauthentication on an existing physical connection.
Reauthentication is performed when an application server calls
getConnection with a new
.
In the Security Permissions pane, Click Add to enter a security
permission that your resource adapter needs to access system
resources in your operational environment. You need to specify
only those permissions that are not included in the default set
(see section 11.2 of the Connector specification). For example,
this security permission allows the resource adapter to look up the
name of any remote host: