[App_Service]

The [App_Service] stanza is used to configure the MVMMApplication Service.

Parameter

Description

ads_domainname

The domain name of the Active Directory domain. Example: sample.com. This is only used when configuring Active Directory security.

ads_groupname

This was used when configuring Active Directory Legacy mode security; this mode is no longer supported.

ads_base_fqdn

Active Directory Fully Qualified Domain Name

Example : DC=ad,DC=sample,DC=com

This must match the distinguishedName of your Active Directory Domain.

ads_groupdn

This was used when configuring Active Directory Legacy mode security; this mode is no longer supported.

ads_ouname

This was used when configuring Active Directory Legacy mode security; this mode is no longer supported.

ads_trust_policy

Active Directory Security Trust Policy. Used when configuring Active Directory Delegate mode security. Defines the way security certificates are processed when connecting to an Active Directory Domain Controller.

 The value trustAll allows connection to an Active Directory Domain Controller regardless of the security certificate it presents.

 The value trustNone allows connection to an Active Directory Domain Controller only if the security certificate it presents is listed in the truststore.

ads_hostname

Active Directory Security Host Name. Used when configuring Active Directory delegate mode security. Defines the DNS names of one or more Active Directory Domain Controllers, or if the Active Directory Domain Controllers are referenced by the domain name, that domain name. The SecurityConfig program sets this based on your configuration information.

ads_max_group_recursion

Active Directory Security Maximum Group Recursion. Used when configuring Active Directory delegate mode security. Defines the depth limit that is searched to find a user's group affiliation. This can be set if there are large numbers of AD groups and the response time to AD Domain Controllers is slow. Defaults to 3.

ads_monitor_delay

Active Directory Security Monitor Delay. Used when configuring Active Directory Delegate mode security. Controls the length of time (in seconds) between checks on the health of an Active Directory Domain Controller.

Defaults to 30 seconds.

This is a tuning parameter and generally should not be modified.

ads_monitor_threads

Active Directory Security Monitor Thread Count. Used when configuring Active Directory Delegate mode security. Controls the number of threads used to monitor the Active Directory Domain Controllers.

Defaults to 10.

This is a tuning parameter and generally should not be modified.

ads_port

Used when configuring Active Directory Delegate mode security. Must be set to 636 if using SSL (recommended) to connect to Active Directory Domain Controllers; set to 389 if not using SSL. The SecurityConfig program sets this based on your configuration information.

ads_security

Active Directory Security Transport Type. Used when configuring Active Directory Delegate mode security. Set to NONE, SSL, SASL, or SSL+SASL. Controls the protocol used to connect to Active Directory Domain Controllers. The SecurityConfig program sets this based on your configuration information.

agent_status_delay

Default: 5. Time, in seconds, to delay agent status updates.

Before editing this setting, contact BMC Support.

agent_status_pool_size

Default: 8. Number of threads in the agent status executor pool.

Before editing this setting, contact BMC Support.

company_name

Used with the execution key to determine product licensing.

client_port

Default:15005. Defines the port that the Management Console client connects to.

config_files=jetty/qpas.xml jetty/apache-ds.xml

Defines the config files used to configure jetty. By default it starts the main MVMMApplication Service applications including the apache LDAP server. When running with Active Directory authentication, the jetty/apache-ds.xml can be removed.

doc_home

This allows a user to override the location of the online Documents directory. It defaults to the install directory.

execution_key

Used with the company_name to determine product licensing.

force_client_to_server_timezone

When set to TRUE, forces clients to use the server's timezone. Useful for instances where clients are in a different timezone than the server to avoid gaps in queried report data. The timezone in use by the client is displayed on the clock in the lower right-hand corner of the client window.

hostname

Default: localhost. Defines the host name or IP address of the computer on which the MVMMApplication Service runs.

jaas_config_file=jetty/apache-ds_jaas.config

This allows a user to override the name of the Java JAAS config file used for configuring java application security. It defaults to the configuration for the IETF user authentication. The user overrides this in order to set up Active Directory authentication. The name refers to a file in the jetty directory.

java.naming.security.credentials=D;5iKGpSZ3

Defines the password used to start and stop the LDAP service. It needs to be changed whenever the user runs the setadminpw script to match the new password.

java.naming.security.principal=uid=admin,ou=system

Defines the internal user id used to start and stop the LDAP service. It should not normally be changed.

javax.net.ssl.trustStore

Default: ldapsTruststore.jks

This is a java keystore containing certificates of trusted directory servers.

The LDAP Directory Service internal to the product always has an entry in this keystore. A trusted entry for the self-signed certificate is added when the certificate is generated (see ldaps_keystore). Entries for trusted Active Directory servers are also stored in here.

The Security Config tool can be used to populate this keystore.

javax.net.ssl.trustStorePassword

Default: BMCSOFTWARE (stored in obfuscated format).

The password for the javax.net.ssl.trustStore java keystore file. The password may be in plain text or obfuscated in "Cryptor" format using mqsusertool to encode a plain text password. The Security Config tool can be used to set this.

jetty_home=jetty

This allows a user to override the location of the jetty home directory. It defaults to the jetty directory in the install directory.

jetty_keystore=jetty/webapps/localhost.jks

A java keystore file containing the keys and certificate used to secure the HTTPS port (15004 by default), and the client port (15005 by default).

Users may access the product launch page, reports or agent distributions using HTTPS.

A self-signed certificate is generated when the Application Service starts if the keystore file does not already exist.

See Post core component installation and configuration for more information.

jetty_ssl_stsMaxAgeSeconds

Sets the "max-age" value in the Strict-Transport-Security HTTPS header used for the Application Service HTTPS port.

Default value is 31536000.

Set to -1 to disable the header.

jetty_ssl_stsIncludeSubdomains

Set to True to add "includeSubDomains" to the Strict-Transport-Security HTTPS header.

Set to False to delete it from the header. 

https_certificate_cn

A fully qualified host name.

Overrides the common name ("cn") attribute in the generated HTTPS self-signed certificate. The "cn" is used for host name verification during TLS handshakes.

If this parameter is not set the common name is the detected cannonical host name.

To regenerate the self-signed certificate, stop the MVMM Application Service, removed the existing Jetty keystore file, and start the MVMM Application Service.

jetty_keystore_keypassword=OBF:1fuk1kl61f9d1mrf1ldm1gu71ldw1mrn1f991klg1fuq

Defines the keystore key password used for the jetty_keystore file. See Post core component installation and configuration for more information.

jetty_keystore_password=OBF:1fuk1kl61f9d1mrf1ldm1gu71ldw1mrn1f991klg1fuq

Defines the keystore password used for the jetty_keystore file. See Post core component installation and configuration for more information.

ldap_base_fqdn=dc=mqsoftware,dc=com

This allows a user to override the base LDAP fully qualified domain name. It needs to be changed when using Active Directory authentication.

ldap_bind_dn

Active Directory Security Bind DN pattern. Used when configuring Active Directory Delegate mode security. Overrides the default bind DN pattern used to access the LDAP server. Before editing this setting, contact BMC Support.

ldap_user_dn

Active Directory Security User DN pattern. Used when configuring Active Directory Delegate mode security. Overrides the default user DN pattern used to access the LDAP server. Before editing this setting, contact BMC Support.

ldap_group_dn

Active Directory Security Group DN pattern. Used when configuring Active Directory Delegate mode security. Overrides the default group DN pattern used to access the LDAP server. Before editing this setting, contact BMC Support.

ldap_hostname

Default: localhost. When using Microsoft Active Directory it defines the host name or IP address of the computer on which Microsoft Active Directory runs. Otherwise it defines the host name where the product is installed. When integrating with MVMA located on another host, network interfaces are used by default to determine a hostname or IP address to configure TSMA so that it can connect to TMTM. If for some reason the hostname or IP address used is not reachable from the TSMA machine you can specify a hostname or IP address yourself by changing this keyword from localhost to a reachable hostname or IP address.

ldaps_keystore

Default : ldapsKeystore.jks

A keystore that contains the key and certificate used for the LDAPS port.

A self-signed certificate is generated when the Application Service starts if the keystore file does not already exist.

ldaps_certificate_cn

A fully qualified host name.

Overrides the common name ("cn") attribute in the generated LDAPS self-signed certificate. The "cn" is used for host name verification during TLS handshakes.

If this parameter is not set the common name is the detected cannonical host name.

To regenerate the self-signed certificate, stop the MVMM Application Service, removed the existing LDAPS keystore file, and start the MVMM Application Service.

ldaps_keystore_password

Default: BMCSOFTWARE (stored in obfuscated format).

The password for the ldaps_keystore file. The password may be obfuscated in "Cryptor" format using mqsusertool to encode a plain text password.

ldap_port

Default:15008. Defines the port on which the MVMM Application Service connects to the internal directory service using LDAP.

ldaps_port

Default:15011. Defines the port on which the MVMM Application Service connects to the internal directory service using LDAPS.

ldap_schema

Default: "IETF", indicates the internal LDAP will be used for security.

"Delegate" indicates Active Directory Delegate mode.

ldap_max_results

Default: 1000. Defines the maximum number of user entries that can be returned on an LDAP request.

ldap_timeout

Timeout, in milliseconds, for LDAP operations.

Set to 0 to disable timeouts.

Defaults to 30000.

ldap_retries

Number of retry attempts for failed LDAP operations.

Set to 0 to disable retries.

Defaults to 3.

secure_agent_distributions

Defaults to false. If set to true, permits only authenticated users access to the bootstrap agent distribution packages.
secure_agent_distribution_rightsDefaults to "QPCONFIG_DISTRIBUTE_AGENT". Sets the rights required by authenticated users if secure_agent_distributions is set to true.
ssl.KeyManagerFactory.algorithm=sunX509This is the Java KeyManager algorithm. It is specific to the platform's Java platform.

web_port

Default:15007. Defines the port on which the MVMM Application Service listens.

web_secure_port

Default:15004. Defines the port on which the MVMM Application Service secure traffic travels.

web_redirect_http_to_httpsDefaults to false. If true, HTTP requests to the web_port will be redirected to use HTTPS on the web_secure_port for external (end-user) web apps.

client_protocols

Default: "TLSv1.2". Defines protocol used for clients.

client_ciphers

Default: "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256". Whitelist of ciphers that can be used with clients.

default_client_vm_args

No default. Used to define default JVM launch settings for Management Console clients, e.g. "-Dcom.bmc.mmpa.client_protocols=SSLv3" would restrict the initial client handshake to use SSLv3. Settings are cached on client machines. The client cache must be cleared to pick up changed settings (using the Java Control Panel).

default_client_min_memory

Defaults to "256m". Defines the default client VM initial heap size. Can be no lower than the default.

default_client_max_memory

Defaults to "512m". Defines the default client VM maximum heap size. Can be no larger than "8000m".

pwd_allow_user_change

Allow user changes - allow or deny users the ability to change their own password.

Defaults to true

Only applies when using Internal Security. Defers to Active Directory configuration if using Active Directory Delegate Mode Security.

pwd_check_quality

Quality Check policy - password check quality. 0 - No check. 1 - Check the password and accept hashed passwords. 2 - Check the password but reject hashed passwords. Note that hashed passwords cannot be checked validated against a password policy.

Defaults to 2

Only applies when using Internal Security. Defers to Active Directory configuration if using Active Directory Delegate Mode Security.

pwd_failure_count_interval

Purging login failures - Failures are stored within the user entry. Failures will be purged according to this interval, or due to a successful login in. When purged due to this interval expiring all the failures older than the current time minus the set interval will be removed from the entry.

Defaults to 30

Only applies when using Internal Security. Defers to Active Directory configuration if using Active Directory Delegate Mode Security.

pwd_in_history

Password History - keep a backlog of passwords so that a user can't keep reusing the same password. The old password(s) will be stored in the user's entry password history.

Defaults to 5

Only applies when using Internal Security. Defers to Active Directory configuration if using Active Directory Delegate Mode Security.

pwd_lockout

If true, accounts are locked if the login failure exceed the threshold set in pwd_max_failure. When the account is locked, no further login attempt will succeed even if the correct password is sent.

Locked accounts can be unlocked by administrators by using mqsusertool.

Defaults to true

Only applies when using Internal Security. Defers to Active Directory configuration if using Active Directory Delegate Mode Security.

pwd_lockout_duration

Delayed login - If an account is locked due to failed login attempts it will unlock after this duration. A setting of 0 means no unlock will be applied. Time is in seconds.

Defaults to 0

Only applies when using Internal Security. Defers to Active Directory configuration if using Active Directory Delegate Mode Security.

pwd_max_failure

Attempts counter - Each failed login attempt will be logged in the user entry. When the failure count exceeds this limit the user account may be locked, based on the pwd_lockout and pwd_lockout_duration parameters. A value of 0 disables login failure tracking.

Defaults to 5

Only applies when using Internal Security. Defers to Active Directory configuration if using Active Directory Delegate Mode Security.

pwd_max_idle

Idle Password - if the user does no login for the idle period, the password is expired. A value of 0 disabled the idle check. Time is in seconds.

Defaults to 0

Only applies when using Internal Security. Defers to Active Directory configuration if using Active Directory Delegate Mode Security.

pwd_max_length

Password length constraint - maximum password length. A value of 0 disables the maximum length check.

Defaults to 0

Only applies when using Internal Security. Defers to Active Directory configuration if using Active Directory Delegate Mode Security.

pwd_min_age

Minimum delay between modifications - when the password history is activated, some users may change their passwords many times to get their old password out of the history, and add it as their password again. Setting a delay between two password changes may protect the password against such action. A value of 0 disables the age check.

Defaults to 0

Only applies when using Internal Security. Defers to Active Directory configuration if using Active Directory Delegate Mode Security.

pwd_min_length

Password length constraint - minimum password length. A value of 0 disables the minimum length check.

Defaults to 5

Only applies when using Internal Security. Defers to Active Directory configuration if using Active Directory Delegate Mode Security.

ldaps_protocols

Sets the TLS protocols used for the internal LDAP Server (on port 15011 by default). Default is TLSv1.2.

Applies when using Internal Security or Active Directory Delegate Mode Security.

ldaps_ciphersuitesSets the TLS cipher suites used for the internal LDAP Server (on port 15011 by default). Default is

TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_DSS_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_128_CBC_SHA256

Applies when using Internal Security or Active Directory Delegate Mode Security.

ldap_password_hashing_algorithm

Defines the hashing algorithm used to store passwords in the internal LDAP directory. Any of the following are supported. Previously stored hashed passwords are not changed. An Application Service restart is required.

SHA-384
CRYPT-SHA-256
SHA
SMD5
CRYPT-SHA-512
PKCS5S2
SSHA-512
CRYPT-MD5
SSHA-256
SSHA-384
CRYPT-BCRYPT
CRYPT
SHA-256
SHA-512
SSHA
MD5

Default is SSHA-256

Was this page helpful? Yes No Submitting... Thank you

Comments