Update UDS Connectivity

User Data Service (UDS) is a user virtualization layer that enables access to the third-party data repositories (such as, LDAP directory servers) deployed by your organization. UDS enables CA Strong Authentication and the Administration Console to seamlessly access your existing data and leverage end-user information, without having to duplicate it in the standard CA Strong Authentication SQL database tables.
aa821test
User Data Service
(UDS) is a user virtualization layer that enables access to the third-party data repositories (such as, LDAP directory servers) deployed by your organization. UDS enables CA Strong Authentication and the Administration Console to seamlessly access your existing data and leverage end-user information, without having to duplicate it in the standard CA Strong Authentication SQL database tables.
CA Strong Authentication can access user data either from a relational database (RDBMS) or directly from an LDAP server:
  • If you are using a relational database, seed the database with the CA Strong Authentication schema as a part of the post-installation configurations.
  • If you are using an LDAP directory server and you want CA Strong Authentication Server and Administration Console to seamlessly access it, then you must have deployed UDS as part of the post-installation configurations.
To update the default UDS connectivity settings, use the User Data Service Connectivity Configuration page.
Follow these steps:
  1. Click the
    Services and Server Configurations
    tab.
  2. Click the
    Administration Console
    option on the submenu of the tab.
    The
    UDS Connectivity Configuration
    page opens.
  3. Specify the parameters that are listed in the following table in the
    User Data Service Connectivity
    Configuration
    section. Most of the parameters on this page are mandatory.
    • Protocol
      The protocol to connect to the UDS service using the Administration Console. The available options are:
      • TCP
      • One-Way SSL
      • Two-Way SSL
      Default Value:
      TCP
    • Host
      The IP address or host name of the system where the UDS is available. The default value of localhost will not work.
      Default Value:
      localhost
    • Port
      The port at which the UDS is available.
      Default Value:
      8080
    • Application Context Root
      Application context that is specified when UDS is deployed in the application server.
      Default Value:
      arcotuds
    • Read Timeout (in milliseconds)
      The maximum time in milliseconds to wait for a response from UDS.
      Default Value:
      10000
    • Idle Timeout (in milliseconds)
      The time (in milliseconds) after which an idle connection not serving requests will be closed.
      Default Value:
      30000
    • Server Root Certificate
      The path to the CA certificate file of UDS server. The file must be in PEM format.
    • Client Certificate
      The path to the CA certificate file of the Administration Console. The file must be in PEM format.
    • Client Private Key
      The location of file that contains the CA's private key. The path can be an absolute path or relative to ARCOT_HOME.
    • Minimum Connections
      The minimum number of connections that will be created between the CA Strong Authentication Server and the UDS server.
      Default Value:
      4
    • Maximum Connections
      The maximum number of connections that can be created between the CA Strong Authentication Server and the UDS server.
      Default Value:
      32
    • Connection Timeout (in milliseconds)
      Maximum time in milliseconds before the UDS service is considered unreachable.
      Default Value:
      30000
  4. Click
    Save
    .
  5. Refresh
    all
    deployed CA Strong Authentication Server instances.