About the WebLogic Embedded LDAP

You may want to apply security policies with the WebLogic Embedded LDAP Server to the SIMULIA Execution Engine if you do not have a standard LDAP authentication mechanism in your organization. Defining security with the WebLogic Embedded LDAP Server involves creating groups and users and mapping the roles to the users or groups.

It is better to create a group first if you are going to add users to that group. The WebLogic configuration template automatically configures the Default Authenticator (i.e., Embedded LDAP) of the myrealm security realm, with the following properties/attributes:

  • Groups:

    • fiperusers

    • fiperstations

    • fiperadmins

    For more information on these groups, see Using the WebLogic Embedded LDAP for Client Authentication.

  • Group membership (role conditions) in global security roles:

    • The fiperusers group is a member of the fiperuser global role.

    • The fiperstations group is a member of the fiperstation global role.

    • The fiperadmins group is a member of the fiperadmin global role.

  • Users:

    • The user name is fiperacs.

    • The password is fiperacs.

    • The group membership is fiperusers, fiperstations, and fiperadmins.

Note: This default group membership enables the fiperacs user to perform all tasks. The fiperusers group membership is mandatory (for more information, see User Security Identity Configuration), but the other memberships can be removed, which limits the fiperacs user rights (for example, the user cannot start a station if the fiperstations membership is removed).