Oracle Audio Technologies B31003-01 User Manual

Page 92

Advertising
background image

Daemon Security

C-6 Oracle Application Server Adapter for IMS/TM User’s Guide

7.

Right-click the daemon and select End Unused Servers. Any servers in the
connection pool are closed and new servers start with the new configuration.

The Daemon Security tab is shown in the following figure:

Figure 6–16 The Daemon Security tab

The Daemon Security tab comprises fields, as listed in the following table:

Note:

You can also change daemon settings using the

Configuration Explorer, by selecting a computer and scrolling the
list to the required daemon. Right-click the daemon and select Edit
Daemon

.

Changes made to the daemon configuration are not implemented.
They are only implemented after the configuration is reloaded
using the Reload Configuration option in the Runtime Manager.

Table 6–20 Daemon Security tab Components

Field

Description

Administrators
privileges

Identifies the users (accounts) allowed to perform
administrative tasks (tasks that require administrative
login).

All users

Enables all users to access the daemon and change the
settings.

Advertising