Hitachi

JP1 Version 12 JP1/Automatic Job Management System 3 Overview


8.3.2 Authentication and operation mechanisms of user applications

Before you can use a user application to operate units and execution agents in JP1/AJS3, you must be authenticated as a JP1 user. Use the user authentication function of JP1/Base (authentication server) for this purpose.

To be authenticated as a JP1 user, specify your authentication information (JP1 user name and password) in the API request headers. The API request to which your authentication information has been added is forwarded via the Web Console server to the authentication server, where you are authenticated as a JP1 user. The authentication server to be used is set on the manager host to which the user application connects.

If authentication is successful, JP1/AJS3 - Manager sends the result of requested processing as a response. The response is then forwarded to the user application via the Web Console server.

Figure 8‒10: Authentication mechanism of user applications

[Figure]

Authentication for a user application is invalidated each time after a request is processed, regardless of whether the response is normal or abnormal. Therefore, if you use a user application to operate units and execution agents, you must undergo authentication each time you issue an API request.

For details about APIs, see 6. Overview of APIs in the manual JP1/Automatic Job Management System 3 Command Reference.

If authentication is successful, you can perform operations on units and execution agents within the limits of the operation permissions of the JP1 user account that you used to log in.

When an operation is performed on a unit or execution agent from a user application, a request is accordingly sent to the Web Console server. The Web Console server connects to JP1/AJS3 - Manager, and then requests JP1/AJS3 - Manager to run processing. When JP1/AJS3 - Manager finishes processing, it returns the execution results to the user application via the Web Console server.

The following figure shows how operations are performed on a unit or execution agent from a user application.

Figure 8‒11: How operations are performed on a unit or execution agent from a user application

[Figure]