Skip Headers

Oracle9iAS Portal Configuration Guide
Release 2 (9.0.2)

Part Number A90852-02
Go To Documentation Library
Home
Go To Product List
Solution Area
Go To Table Of Contents
Contents
Go To Index
Index

Go to previous page Go to next page

B
Oracle9iAS Portal Installation and Configuration Scripts

After installing Oracle9iAS Portal with the Oracle9i Application Server installation, several scripts are available for post-installation configuration. For example, you may want to configure a new Oracle9iAS Portal instance, or update an existing Oracle9iAS Portal instance.


Note:

For information about the Oracle9iAS Portal import and export scripts, see the Oracle9iAS Portal Online Help topic: Exporting and importing in Oracle Portal.

For information about the Oracle9iAS Portal upgrade scripts, visit the Oracle Technology Network at:

http://otn.oracle.com


For purposes of configuring Oracle9iAS Portal, the following scripts are useful, and are described in this appendix. In Oracle9iAS Portal most Portal configuration is done by using the Oracle9iAS Portal Configuration Assistant (OPCA).

See also:

Section 3.1, "The Oracle9iAS Portal Configuration Assistant (OPCA)" about the Oracle9iAS Portal Configuration Assistant modes and parameters.

The specific scripts covered in this appendix include:

B.1 Associating Oracle9iAS Portal with an Oracle9iAS Single Sign-On Server


Note:

Single Sign-On Server and Portal From Different Versions cannot interoperate

Due to the interdependency of the Oracle9iAS Single Sign-On Server and Oracle9iAS Portal with Oracle Internet Directory (OID) in Oracle9i Application Server Release 2 (9.0.2), you must not associate Oracle9iAS PortalRelease 9.0.2 with an Oracle9iAS Single Sign-On Server Server (Login Server) from Oracle9i Application Server Release 1 (1.0.2.2) or earlier. Similarly, you must not associate earlier releases of Oracle9i Application Server Portal with the current release of Oracle9iAS Single Sign-On Server.

To allow Oracle9iAS Portal and Oracle9iAS Single Sign-On Server instances to be associated together, they must both be upgraded to Oracle9i Application Server Release 2. The upgrade scripts will be made available in the first maintenance release of Oracle9i Application Server Release 2.


Oracle9iAS Portal is a partner application to the Oracle9iAS Single Sign-On Server. As such, it needs to be associated with an Oracle9iAS Single Sign-On Server for authentication services. When Oracle9iAS Portall is installed it is automatically associated with the Oracle9iAS Single Sign-On Server in the associated infrastructure installation.

What was formerly called the ssodatan script, in previous versions of Oracle9iAS Portal, has been obsoleted and replaced by running the Oracle9iAS Portal Configuration Assistant (OPCA) in the SSOPARTNERCONFIG mode. When you install Oracle9iAS Portal, the step previously done by ssodatan, is done automatically. However, after installation, there may be various reasons for associating the Oracle9iAS Portal with a different Oracle9iAS Single Sign-On Server, or needing to re-run the association because of a change in the hostname, port or protocol of the Oracle9iAS Single Sign-On Server.

The function performed by the script previously called ssodatax, is now performed by the following mode of OPCA:

SSOPARTNERCONFIG mode usage Example:

ptlasst.csh -i typical -mode SSOPARTNERCONFIG -s portal -sp portal -c 
myhost.domain.com:1521:mySID -sdad portal -o orasso -odad orasso -host 
myApache.domain.com -port 7777 -silent -verbose -sso_c 
myhost.domain.com:1521:mySID -sso_h myApache.domain.com -sso_p 7777 -pa orasso_
pa -pap orasso_pa -ps orasso_ps -pp orasso_ps -pd portal_dblink -p_tns orasso_ps 
-s_tns portal -iasname myiASInstance.host

where

Table B-1 OPCA SSOPARTNERCONFIG mode parameters
Parameter Description Default value
-i install_type

Installation Type.

CUSTOM

-s portal_schema

Oracle Database schema for Oracle9iAS Portal database objects.

portal

-sp portal_password

Password for Oracle9iAS Portal schema.

portal_schema

-c portal_connect

Mandatory connect string to connect to the Oracle9iAS Portal repository.

hostname:port:sid

-sdad portal_dad

DAD for the Oracle9iAS Portal schema.

portal_schema

-o sso_schema

Oracle Database schema for Oracle9iAS Single Sign-On Server objects.

orasso

-odad sso_dad

DAD for Oracle9iAS Single Sign-On Server objects.

sso_schema

-host portal_host

Mandatory hostname of the HTTP server for Oracle9iAS Portal.

N/a

-port portal_port

Port of the HTTP server for Oracle9iAS Portal.

7777

-silent

Run mode for the OPCA.

N/a

-verbose

Log mode for the OPCA.

N/a

-sso_c  sso_connect

Connect string to connect to the Oracle9iAS Single Sign-On Server repository.

N/a

-sso_h  sso_host

Hostname of the HTTP server for the Oracle9iAS Single Sign-On Server.

N/a

-sso_p  sso_port

Port of the HTTP server for the Oracle9iAS Single Sign-On Server.

N/a

-pa papp_schema

SSO Partner Application Registration Schema

sso_schema_PA

-pap papp_password

Oracle9iAS Single Sign-On Server PA Schema Password

papp_schema

-ps pstore_schema

Password Store Schema.

sso_schema_PS

-pp pstore_password

Password Store Password.

ptore_schema

-pd pstore_dblink

Database link from Oracle9iAS Portal schema to Password Store.

portal_schema_DBLINK

p_tns pstore_tns

TNS connect string to Password Store.

N/a

-s_tns portal_tns

TNS connect string to Portal.

N/a

Whereas the old ssodatax required you to setup the partner application entry in the SSO server and then invoke the script with the site_id, site_token and encryption_key obtained from partner application registration, the SSOPARTNERCONFIG mode of ptlasst.csh(OPCA) no longer requires partner application registration to be a two-step process.

The Oracle9iAS Single Sign-On Server now provides a schema ORASSO_PA (default) for accessing the partner application registration procedure. You will need to get the password to this schema and an appropriate connect string to the Oracle9iAS Single Sign-On Server instance to register the Oracle9iAS Portal entry.

Note that if the Oracle9iAS Single Sign-On Server hostname changes, you will also need to run ssocfg.sh on the Oracle9iAS Single Sign-On Server.

See also:

Oracle9iAS Single Sign-On Administrator's Guide for more details on running the ssocfg.sh script.

B.2 Oracle9iAS Web Cache configuration scripts

This section shows how instead of running OPCA in the MIDTIER mode to adjust Oracle9iAS Web Cache specific settings, such as the Oracle9iAS Web Cache host, or Oracle9iAS Web Cache invalidation port, you can choose to run Oracle9iAS Web Cache configuration scripts to configure Oracle9iAS Portal to work with Oracle9iAS Web Cache. Furthermore, it describes how you can disable Oracle9iAS Web Cache and how you can manage the invalidation message processing job by using the script cachjsub.sql:

Using cachseed.sql

Using cachset.sql

Managing the Invalidation Message Processing Job Using cachjsub.sql

B.2.1 Using cachseed.sql

With the cachseed.sql script you can modify all the Oracle9iAS Web Cache specific configuration parameters. cachseed.sql is located in the ORACLE_HOME/portal/admin/plsql/wwc directory. The script takes 6 arguments that are listed in the table below:

Table B-2 cachseed.sql arguments
argument description

hostname

Oracle9iAS Web Cache hostname. For example webdbsvr1.us.oracle.com.

invalidationport

Oracle9iAS Web Cache invalidation port. For example 3002.

adminport

Oracle9iAS Web Cache administration port. For example 3001.

password

Oracle9iAS Web Cache invalidator password For example invalidator.

enable_wc_caching

Flag to turn Oracle9iAS Web Cache caching on or off in Oracle9iAS Portal. For example off

portal_dad

The dad name used to access the portal. For example moc

Example of running cachseed.sql

@cachseed.sql webdbsvr1.us.oracle.com 3002 3001 invalidator off moc

B.2.2 Using cachset.sql

The script cachset.sql is used to turn the use of Oracle9iAS Web Cache to on or off. The script can be found in the ORACLE_HOME/portal/admin/plsql/wwc directory.

To use cachset.sql connect to SQL*Plus as the schema owner and run cachset.sql as follows:

SQL>@cachset.sql

At the prompt enter on to enable the use of Oracle9iAS Web Cache and off to disable it.

B.2.3 Managing the Invalidation Message Processing Job Using cachjsub.sql

Oracle9iAS Portal uses caching to improve its performance. One type of caching used is the invalidation based caching. In this type of caching Oracle9iAS Portal Caches various objects (pages, portlets, etc) for a set amount of time. When these objects are requested they are retrieved from the Cache, if available, otherwise they are regenerated from the Oracle9iAS Portal repository. The Cache for these objects will expire when the maxcache time has been reached, or when the objects are explicitly invalidated (expired) via invalidation messages.

Oracle9iAS Portal uses invalidation messages when it needs to expire objects in the Cache. invalidation messages are categorized as hard and soft invalidations. Hard invalidations take effect immediately, i.e. the objects which they intend to invalidate expire from Cache immediately. Soft invalidations take effect when they are processed by the invalidation processing job. The frequency by which the invalidation job executes is configurable. This is done via the cachjsub.sql script. Follow the following steps to change the execution frequency of the invalidation processing job:

  1. Locate the following directory:

    ORACLE_HOME/portal/admin/plsql/wwc

  2. On the database where the Portal schema is installed, log on to SQL*Plus with the appropriate user name and password for that schema. For example:

    sqlplus portal/portal
    
    
  3. Enter the following command to update the execution frequency of the invalidation job:

    SQL> @cachjsub.sql <start_time> <start_time_fmt> <interval_mins>
    
    

    cachjsub.sql takes three parameters:

    • start_time is either when the first job should be run or 'START'.

    • start_time_fmt is the date format to be applied to the value of start_time.

    • interval_mins is how many minutes each run is scheduled apart.

    Note: If 'START' is provided for 1st parameter, the 2nd parameter is ignored and it will default the start time to the current time.

    Example1:

    SQL> @cachjsub.sql START null 120
    
    

    Example2:

    SQL> @cachjsub.sql '02-22-2003 7:30' 'MM-DD-YYYY HH:MI' 1440
    
    

B.3 Using oidprovtool to Create a Subscription Profile

Oracle9iAS Portal needs to subscribe to OID, in order to be aware of any changes in OID data.

One of the steps in setting this up is running a tool named oidprovtool. It will be located in:

ORACLE_HOME/bin

See also:

For the complete overview of what needs to be done to set up a subscription profile, refer to Section 2.7.1, "Setting up a Subscription Profile using oidprovtool".

The following table contains the valid parameter values for running the oidprovtool for creating the subscription profiles as required by Oracle9iAS Portal.

Table B-3 oidprovtool parameters
Parameter Value Example

operation

create

create

ldap_host

oid_host

portaloid

ldap_port

oid_port

389

ldap_user_dn

oid_admin_dn

cn=orcladmin

ldap_user_password

oid_admin_password

welcome1

application_dn

portal_application_dn

orclApplicationCommonName=PORTAL,cn=Portal,cn=Products,cn=OracleContext

organization_dn

subscriber_dn

"dc=mycompany,dc=com"

interface_name

portal_schema.WWSEC_OID_SYNC

PORTAL.WWSEC_OID_SYNC

interface_type

PLSQL

PLSQL

interface_connect_info

synchronization_interval_in_seconds

portaldbhost:1521:s901dev8:PORTAL:portalpassword

schedule

HOST:PORT:SID:USER_ID:PASSWORD

60

event_subscription

"USER:subscriber_dn:DELETE"

"USER:dc=mycompany,dc=com:DELETE"

event_subscription

USER:subscriber_dn:DELETE

"GROUP:dc=mycompany,dc=com:DELETE"

event_subscription

USER:subscriber_dn:MODIFY(orclDefaultProfileGroup,userpassword)

"USER:dc=mycompany,dc=com:MODIFY(orclDefaultProfileGroup,userpassword)"

event_subscription

GROUP:subscriber_dn:MODIFY(uniqueMember)

"GROUP:dc=mycompany,dc=com:MODIFY(uniqueMember)"

Please note that the parameter values, or parts thereof, that are in italics, must be replaced by their value. All other parts, including quotation marks, must be entered as is in the call to oidprovtool. Thus using the above examples of values the complete call is as follows (please treat this as a single continuous line):

oidprovtool operation=create ldap_host=portaloid ldap_port=389 ldap_user_
dn=cn=orcladmin ldap_user_password=welcome1 application_
dn=orclApplicationCommonName=PORTAL,cn=Portal,cn=Products,cn=OracleContext 
organization_dn="dc=mycompany,dc=com" interface_name=PORTAL.WWSEC_OID_SYNC  
interface_type=PLSQL interface_connect_
info=portaldbhost:1521:s901dev8:PORTAL:portalpassword schedule=60 event_
subscription="USER:dc=mycompany,dc=com:DELETE" event_
subscription="GROUP:dc=mycompany,dc=com:DELETE" event_
subscription="USER:dc=mycompany,dc=com:MODIFY(orclDefaultProfileGroup,userpasswo
rd)" event_subscription="GROUP:dc=mycompany,dc=com:MODIFY(uniqueMember)"

See also:

For a complete list of all the possible options for oidprovtool, refer to the Oracle Internet Directory Administrator's guide in the Oracle9i Application Server documentation library.

B.4 Disabling the IP Check of Cookie Validation

As part of the process of validating the session cookie of a user's request (even if that user is PUBLIC) Portal performs a comparison between the IP address stored in the cookie with the IP address of the current client. Only if the two value are the same will Oracle9iAS Portal consider the request legitimate.

When a proxy exists between the user's client and the portal the IP address stored in the session cookie is that of the proxy, and not that of the client.

Some proxy systems make use of multiple servers each with different IP addresses. In these circumstances it is conceivable that the original request from a user's client (the request that causes the session cookie to be created) is routed through one proxy server and that a subsequent request is routed through another, separate, proxy server. In these cases, the IP addresses compared by Oracle9iAS Portal will differ and the request will raise a security violation during the IP checking step and access to the page will be denied.

Depending on the network configuration into which the Oracle9i Application Server is installed, it may be necessary to disable IP checking in cookie validation.

To change the state of IP checking in cookie validation, you need to use SQL*Plus to update data in both the portal schema and the SSO schema as detailed in the table below.

Table B-4 Enabling and Disabling the IP Check
Portal Schema SSO Schema

Enable

IP Checking

update wwsec_enabler_config_info$

set url_cookie_ip_check = 'Y';

commit;

update wwsec_enabler_config_info$

set url_cookie_ip_check ='Y';

update wwsso_ls_configuration_info$

set cookie_ip_check = 'Y';

commit;

Disable

IP Checking

update wwsec_enabler_config_info$

set url_cookie_ip_check = 'N';

commit;

update wwsec_enabler_config_info$

set url_cookie_ip_check ='N';

update wwsso_ls_configuration_info$

set cookie_ip_check = 'N';

commit;

B.5 Using the secupoid.sql script

By default, Oracle9iAS Portal connects to OID using LDAP without SSL. If the OID server is configured for an SSL port, though, Oracle9iAS Portal can be configured to use LDAP over SSL, also known as LDAPS.

See Also:

Oracle Internet Directory Administrator's Guide for a detailed description on how to configure OID for an LDAPS port.

To configure Oracle9iAS Portal to use SSL to connect to OID, you must run the secupoid.sql script. This script allows you to change the following Oracle9iAS Portal configuration parameters related to OID:

When you install Oracle9iAS Portal, it is automatically the associated with an OID server. However, you may want to change some settings, such as whether to use SSL, after installation. To change to an SSL connection for OID, simply run the secupoid.sql script in the PORTAL schema to specify the LDAPS port instead of the LDAP port, and indicate that you want to use SSL.

B.5.1 Running the secupoid.sql script

The section that follows illustrates a sample execution of secupoid.sql from SQL*Plus.

In the example, OID was initially configured to run LDAP on port 389. Later, an LDAPS port was activated on 636. Since the server name does not change, we retain the old value, update the port, and indicate that we want to use SSL by setting the Use SSL? value to Y. When you run the script, it displays the current configuration and lets you replace any of the configurable settings. The script also allows you to update Oracle9iAS Portal's OID Cache after running it. Since activating SSL does not change any of the OID information cached by Oracle9iAS Portal, it is not usually necessary to refresh the Cache in this case.

SQL> @secupoid 
Current Configuration 
-------------------- 
OID Host: oid.domain.com 
OID Port: 389 
Application DN: 
orclApplicationCommonName=PORTAL,cn=Portal,cn=Products,cn=OracleContext 
Application Password: 3E8C2D1B87CB61011757239C5AA9B390 
Use SSL? N 

PL/SQL procedure successfully completed. 

Updating OID Configuration Entries 
Press [Enter] to retain the current value for each parameter 
For SSL Connection to LDAP, specify "Y"es or "N"o 
------------------------------------------------ 
Enter value for oid_host: 
Enter value for oid_port: 636 
Enter value for app_password: 
Enter value for use_ssl_to_connect_to_ldap: Y 
Enter value for refresh_with_new_settings: N 

PL/SQL procedure successfully completed. 

No errors.

After executing the script, Oracle9iAS Portal is configured for LDAPS access of OID.

See also:

B.6 Using the secjsdom.sql script

If you have your OID and Oracle9iAS Portal servers residing in different domains, you must explicitly set the JavaScript domain for Oracle9iAS Portal such that it can resolve user and group lists of values.

For example, suppose that your installation has Oracle9iAS Portal configured to use a different Oracle HTTP Server than DAS. In this situation, you need to have a common domain so that the values can be transferred from the list of values displayed by DAS to the page displayed by Oracle9iAS Portal.

To create a single domain in this case, do the following:

  1. Login to SQL*Plus as PORTAL.

  2. Run the following SQL script:

    secjsdom.sql <domain_name>

Performing this procedure enables you to run OID lists of values from Oracle9iAS Portal in either Netscape or MicroSoft Internet Explorer. When using lists of values, a transit window is displayed in addition to the list of values itself. The transit window is required to pass values to Oracle9iAS Portal without forcing pages to reset their domain.

See also:

Oracle9i Application Server Security Guide in the Oracle9i Application Server documentation library.

B.7 Modifying the Scope of the Portal Session Cookie

In cases where you want access to the same portal from two middle-tiers at the same time, or if you want to open the portal cookie domain as required by the PL/SQL Adapter functionality you need to define the scope of the Oracle9iAS Portal session cookie to be sent to all the middle-tier servers involved in the architecture. By default, the session cookie is scoped to the host from which it was generated which is typically the root path.

For example, if the cookie was generated from www.oracle.com, then the cookie domain is www.oracle.com. However, let's say that another server, portal.oracle.com is also a middle-tier server that needs to get access to that session cookie, then the cookie domain would need to be widened so that the portal.oracle.com server can also see the cookie.

Follow these steps to modify the scope of the portal session cookie:

  1. Locate the following directory:

    ORACLE_HOME/portal/admin/plsql/wwc 
    
    
  2. On the database where your Oracle9iAS Single Sign-On Server schema is installed, log on to SQL*Plus with the appropriate username and password. For example:

    sqlplus nodea/nodea
    
    
  3. Enter the following command:

    SQL> @ctxckupd
    Oracle Portal
    Current Settings for Portal Session Cookie:
    Cookie Domain : Only send cookie back to originating host:port
    Enter the domain for the session cookie: .oracle.com
    Settings changed to
    Cookie Domain : .oracle.com
    SQL>
    
    

    This allows you to set the cookie domain for the session cookie. In the example above, the cookie domain is set to .oracle.com.


    Note:

    If you want to use different listeners or keep the session cookie throughout different domains, specify a Cookie Domain to be the host name only. For example, if you access Oracle9iAS Portal from two machines:

    • machine1.us.oracle.com:3000

    • machine2.us.oracle.com:4000

    When running ctxckupd.sql, set the cookie domain to .us.oracle.com.


    See also:

    Section 4.2.3, "Setting the Cookie Domain".

B.8 Managing the Session Cleanup Job

Oracle9iAS Portal and Oracle9iAS Single Sign-On Server perform session management similar to other web-based applications. Sessions are tracked using cookies. Session information is stored in a table in the Portal and Oracle9iAS Single Sign-On Server schema. When a user logs out, the session information is marked inactive. A DBMS job subsequently cleans up the inactive rows.

The session table accumulates a number of rows that are flagged as active. When a user shuts down the browser instead of logging out, the row is "active", even though it is not actually in use. The cleanup job cleans up the active rows that are older than a specified duration.

When Oracle9iAS Portal is installed, a DBMS job is installed to perform session cleanup of the session table, WWCTX_SSO_SESSION$. The cleanup job is set to run every 24 hours. The first scheduled cleanup occurs 24 hours after the installation of the job.

When the job runs, it deletes all inactive sessions, and all sessions marked active (WWCTX_SSO_SESSION$.ACTIVE = 1), that are older than 7 days (WWCTX_SSO_SESSION$.SESSION_START_TIME < sysdate - 7).

These default settings can be modified by running some job management scripts in the Portal schema to manage Portal sessions, or in the Oracle9iAS Single Sign-On Server schema to manage Oracle9iAS Single Sign-On Server sessions. They utilize the same session management infrastructure.

Follow these steps to obtain the current cleanup job information:

  1. Locate the following directory:

    ORACLE_HOME/portal/admin/plsql/wwc
    
    
  2. On the database where the Portal or Oracle9iAS Single Sign-On Server schema is installed, log on to SQL*Plus with the appropriate user name and password for that schema. For example:

    sqlplus portal/portal
    
    
  3. Enter the following command to get the current job information:

    SQL> @ctxjget
    The session cleanup job is job ID 7381
    dbms_job.isubmit(job=>7381,what=>'begin execute immediate''begin
    wwctx_sso.cleanup_sessions(p_hours_old => 168); end;''; exception when
    others then null; end;',next_date=>to_date('2001-04-17:14:07:20',
    'YYYY-MM-DD:HH24:MI:SS'),interval=>'SYSDATE + 24/24',no_parse=>TRUE);
    
    PL/SQL procedure successfully completed.
    
    

The command results in the display of the currently installed job information, as returned by the DBMS_JOB package. It indicates which procedure is executed, what parameters are passed to it, and when the next invocation is to occur. This particular example indicates that the job is to cleanup active sessions which are a week old (168 hours). It also indicates that the next scheduled job execution is on 4/17/2001 at 5:14 pm, and the job should run every 24 hours thereafter.

If the job execution needs to be modified, either to adjust the age of sessions that should be deleted, or to increase or decrease the frequency of cleanup, you can run the ctxjsub.sql script to submit modified execution parameters.

Follow these steps to submit modified job execution parameters:

  1. Locate the following directory:

    ORACLE_HOME/portal/admin/plsql/wwc
    
    
  2. On the database where the Portal or Oracle9iAS Single Sign-On Server schema is installed, log on to SQL*Plus with the appropriate user name and password for that schema. For example:

    sqlplus portal/portal
    
    
  3. Enter the following command to submit new cleanup job information:

    @ctxjsub <hours_old> <start_time> <time_format> <interval_hours>
    
    

Table B-5 lists the ctxjsub parameters.

Table B-5 ctxjsub parameters
Parameter Description

hours_old

The age of an active session that should be deleted.

start_time

The time that the next job should run.

time_format

The time format string that specifies how start_time is formatted.

interval_hours

The amount of time, in hours, between runs of the cleanup job.

For example:

SQL> @ctxjsub 200 '04/17/2001 10:00' 'MM/DD/YYYY HH24:MI' 12
Created path for job id.
DBMS_JOB id = 7381
Cleanup job updated. Job ID = 7381

PL/SQL procedure successfully completed.

The cleanup job submission script can be run any number of times to modify the execution parameters. Each invocation updates the job information associated with the job ID for the cleanup job. This job ID is maintained in the preference store so that the job information is updated instead of submitting multiple jobs.

You can also specify a start_time of 'START', in which case, the time_format parameter is ignored, but you still need to pass it a value (such as 'NOW'). The result is to run the job <interval_hours> hours from now:

SQL> @ctxjsub 168 START NOW 24

This submits the job as it does in the installation.

If you want the cleanup job to execute immediately, then obtain the job ID by calling ctxjget.sql. Once you know the job ID, you can execute the job by issuing the following command in the product schema:

SQL> exec dbms_job.run(7381);

In the preceding example, 7381 is the job ID returned by the call to ctxjget.sql. When you execute a job in this manner, the next automated invocation of the job occurs at interval_hours after this manual invocation. To run the job on the original schedule, you need to resubmit the start_time desired using ctxjsub.sql.

B.9 Timing and Caching Statistics

All Oracle9iAS Portal pages can be run in a special mode in which timing and caching information is displayed. If you want to see this debug information on every page you can set the Parallel Page Engine Parameter showPageDebug to true in the web.xml file.

See also:

Section 6.2.1.1, "Setting PPE Configuration Parameters" for information on how to configure the PPE settings.

If you just want to see the debug information for a few select pages and portlets, you can run a page with this debugging information enabled by adding "&_debug=0", or "&_debug=1" to the end of the Oracle9iAS Portal page url. For example if you want to see the timing statistics for the page http://abc.com/servlet/page?_pageid=21, you would append an ampersand (&) and "_debug=0", or "_debug=1" to the page url like this:

http://abc.com/servlet/page?_pageid=21&_debug=0

or:

http://abc.com/servlet/page?_pageid=21&_debug=1

The difference between "&_debug=0" and "&_debug=1" is that with the first option, the debug=0 parameter is not passed to either the portlets or the page meta data. The Cache statistics are therefore reflected in the most accurate way. In the second option, "&_debug=1", the parameter debug=1 is passed through to the portlet itself, which can affect the caching information. Since the parameter is passed to the portlets, it can be used by the portlet developers to display portlet-specific debugging information. For instance if you had a portlet, and you wanted to know how long a particular query takes, or if you wanted to debug a specific issue, you could write some debugging code to print data to the browser when the debug=1 parameter is passed in.

The following statistics are available when the portal page is run in debug mode:

The following image shows a page that is running in the "_debug=0" mode:

Figure B-1 Portal Page Running in Debug Mode

Text description of cg_dbug.gif follows.

Text description of the illustration cg_dbug.gif

B.9.1 Portlet Statistics

In the above example you can see a number of Portlet related statistics listed under each portlet. Each Portlet has a unique internal reference identification number. This number is used in the "Information for Portlet" summary. For the portlet in the top left corner of the above image you can see that this number is 6256.

For each portlet the following statistics are listed:

B.9.1.1 Portlet Timing information

B.9.1.2 Portlet Caching information

B.9.2 Page Statistics

Every page has a unique internal reference identification number, similar to the portlets on the page, shown in the image above.

For the page the following statistics are listed:

B.9.3 Additional Summary Statistics


Go to previous page Go to next page
Oracle
Copyright © 2002 Oracle Corporation.

All Rights Reserved.
Go To Documentation Library
Home
Go To Product List
Solution Area
Go To Table Of Contents
Contents
Go To Index
Index