IBM BS029ML Self Help Guide - Page 109

Resources, Resource Environment Providers, WP CacheManagerService

Page 109 highlights

When the PAC configuration is to be persisted, the datastore persistence layer is called to pass the configuration data to the portal database. The Portal Access Control runtime decision module has to retrieve the persisted permission data through the datastore persistence layer. In order to reduce the IO traffic to the datastore, the portal architecture adopts a fairly sophisticated cache management system. The multi-level fine-grained controls over PAC caches gives the portal administrator a lot of flexibility and opportunities in tuning the performance. On the other hand, improper PAC cache settings could adversely cause serious performance degradation to the portal system. In WebSphere Portal Version 6, the PAC and other cache configurations are managed by CacheManagerService. A default set of configuration parameters are presented in CacheManagerService.properties in /shared/app/wp.services.properties.jar. These settings can be customized through "WP CacheManagerService" in the WebSphere Administrative Console by selecting Resources → Resource Environment Providers → WP CacheManagerService. Access Control Runtime Access Control Admin External Access Control SPI Access Control Service Access Control Commands PAC - API Access Control Config Service Internal Configuration API Access Control Engine PAC Implementation PAC Cache Data Store Persistence Layer Portal Database Figure 4-4 Portal Access Control components Some suggestions on tuning the PAC caches are summarized below: Keep the access control configurations as simple as possible. Minimize the number of user groups. Minimize the number of different groups to which the users belong. Avoid nested group hierarchies and depth of the nested groups. Avoid doing access control administration while the system is under heavy load. Limit the use of external access control. Chapter 4. WebSphere Portal security 95

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242

Chapter 4. WebSphere Portal security
95
When the PAC configuration is to be persisted, the datastore persistence layer is called to
pass the configuration data to the portal database. The Portal Access Control runtime
decision module has to retrieve the persisted permission data through the datastore
persistence layer. In order to reduce the IO traffic to the datastore, the portal architecture
adopts a fairly sophisticated cache management system.
The multi-level fine-grained controls over PAC caches gives the portal administrator a lot of
flexibility and opportunities in tuning the performance. On the other hand, improper PAC
cache settings could adversely cause serious performance degradation to the portal system.
In WebSphere Portal Version 6, the PAC and other cache configurations are managed by
CacheManagerService. A default set of configuration parameters are presented in
CacheManagerService.properties in <portal_root>/shared/app/wp.services.properties.jar.
These settings can be customized through "WP CacheManagerService" in the WebSphere
Administrative Console by selecting
Resources
Resource Environment Providers
WP CacheManagerService
.
Figure 4-4
Portal Access Control components
Some suggestions on tuning the PAC caches are summarized below:
±
Keep the access control configurations as simple as possible.
±
Minimize the number of user groups.
±
Minimize the number of different groups to which the users belong.
±
Avoid nested group hierarchies and depth of the nested groups.
±
Avoid doing access control administration while the system is under heavy load.
±
Limit the use of external access control.
Portal
Database
PAC - API
Internal
Configuration
API
PAC Implementation
Persistence Layer
Access Control
Admin
Access Control
Commands
Access Control
Config Service
Access Control
Runtime
Access Control
Service
Access Control Engine
PAC Cache
Data Store
External
Access Control
SPI