Oracle Audio Technologies B31003-01 User Manual
C-6 Oracle Application Server Adapter for IMS/TM User’s Guide
Right-click the daemon and select End Unused Servers. Any servers in the
connection pool are closed and new servers start with the new configuration.
The Daemon Security tab is shown in the following figure:
Figure 6–16 The Daemon Security tab
The Daemon Security tab comprises fields, as listed in the following table:
You can also change daemon settings using the
Configuration Explorer, by selecting a computer and scrolling the
list to the required daemon. Right-click the daemon and select Edit
Changes made to the daemon configuration are not implemented.
They are only implemented after the configuration is reloaded
using the Reload Configuration option in the Runtime Manager.
Table 6–20 Daemon Security tab Components
Identifies the users (accounts) allowed to perform
administrative tasks (tasks that require administrative
Enables all users to access the daemon and change the