Technical data

Using WebLogic Server Commands
Administration Guide B-5
In a development environment in which security is not a top priority, you can use the
-username and -password arguments when invoking the weblogic.Admin utility
directly on the command line or in scripts. With these arguments, the username and
password are not encrypted. If you store the values in a script, the user credentials can
be used by anyone who has read access to the script.
In an environment in which security is a top priority, create user-configuration files
and key files. A user-configuration file contains encrypted user credentials that can be
decrypted only by a single key file. You can include the
-userconfigfile
config-file
and -userkeyfile admin-key arguments in scripts without exposing
the plain text user credentials to those with read privileges for the script. For
information about creating a user-configuration and key file, see
“STOREUSERCONFIG” on page -18.
The following list summarizes the order of precedence for the
weblogic.Admin
user-credentials arguments:
n If you specify -username username -password password, the utility passes
the unencrypted values
to the server instance you specify in the -url argument.
These arguments take precedence over the
{ -userconfigfile config-file
-userkeyfile admin-key }
arguments. If you specify both { -username
username -password password }
and { -userconfigfile config-file
-userkeyfile admin-key }
, the weblogic.Admin utility uses the {
-username username -password password }
arguments and ignores the
user-configuration and key file arguments.
n If you specify -username username, the utility prompts for a password. Then
it passes the unencrypted values
to the server instance you specify in the -url
argument
.
This argument also takes precedence over the
{ -userconfigfile
config-file -userkeyfile admin-key }
arguments.
n If you specify { -userconfigfile config-file -userkeyfile
admin-key }
and do not specify { -username username [-password
password]}
, the utility passes the values that are encrypted in config-file to
the server instance you specify in the -url argument.
n If you specify neither { -username username [-password password] }
nor
{ -userconfigfile config-file -userkeyfile admin-key }, the
utility sea
rches for a user-configuration file and key file at the default path names. The
default path names vary depending on the JVM and the operating system. See
“Configuring the Default Path Name” on page -20.