Features Overview
Features New to
- Option to specify multiple profile servers to handle gateway startup
Features Inherited from Prior Patch Consolidations
- Option to Configure Gateway To NetletProxy Socket Timeout
- Gateway Charset Detection Heuristics
- Rewriter support for Delegated Administrator
- Support for Multiple Hosted Domains for Personal Address Book
- Rewriter support for Microsoft™ Exchange 2003 Outlook Web Access
> patches provided on top of 6.2 release stream
> patches provided on top of 6.0 and 6.1 not included in 6.2
> backports of important fixes provided in a future release stream
For a list of Portal patches that are obsoleted by
refer to the included patch
is not a standalone installation and does not include
Portal Server 6.2. Portal Server 6.2 must be installed prior to upgrading
to or installing
.
can
be installed on top of previous patches as it is cumulative. Refer to the section titled New Portal Patching Methodology
for additional information.
Back to top
Pre-installation Considerations
In addition to the profile and flatfile changes listed in the
Template Modifications Required section of the this document, there
are also internal changes made that may directly affect
how you use, test, or evaluate the product. Most of these behavioral
changes tend to be directly related to the rewriter component, but there are
other parts of the product that may be affected, as well. As such, it is
important that this patch, as with any other, be test thoroughly on a
development or QA system prior to being put in to production. Additionally,
because of the nature of Portal 6x distribution and the customization
requirements for the product, special attention should be given to JSP files
that must be modified by the patch installer in order to fix defects, and/or
for the product to continue functioning normally.
Noticeable Behavioral Changes after Installing
- The correct client IP address is now available again as an HTTP header "X-PS-GW-ClientIP"
Noticeable Behavioral Changes after Installing Prior Patch Consolidations
- Netlet Keep-Alive Interval will no longer cause a Netlet session termination when the interval is reached.
- HTTP Location header will now be handled correctly by the Gateway.
- Form data containing escaped values can now be rewritten.
Back to top
Installation Information
These installation instructions provide steps to install
For other document information about Sun Portal Server 6.2 software products,
visit:
http://docs.sun.com/db/coll/S1_PortalServer_61?q=portal
For Portal Server software packages, visit:
http://www.sun.com/downloads
System Requirements
This section describes the system requirements for
System Requirements for Portal
|
Component |
Description |
Operating Environment |
updates Portal Server 6.2
software, and runs in the Solaris™ 8 and Solaris™ 9
operating environments. |
Memory |
Each Portal component should have a minimum of 1GB of main memory. This
minimum requirement applies to proof of concepts (POCs), demo/test environments,
and production systems alike. |
OS Patches |
No OS patches besides those required by the Portal Server base install are needed by
|
|
|
Installation Overview
Please familiarize yourself completelly with the release notes prior to
attempting either installation of, or upgrade to,
The following directories and files are included in
:
-
NOTE: The release notes are now stored in the patch directory itself so that
they are able to be included with the rest of the patch on SunSolve.
Installation Instructions
NOTES:
- If the Portal Server installation contains
both a server node and one or more platform nodes,
then
must be applied on the
server node first, then each additional platform
node as well. The patch must also be applied to
any installed gateway nodes following completion of
application to the Server and platform nodes.
-
must have the following releases applied prior to patch installation:
- Portal Server 6.2
- Portal Server 6.x Patch Consolidations are
cumulative. That means that any later patch consolidation
for the same minor version (dot release) will contain prior
patch consolidations for the same minor version. For example,
PS6.2PC2, contains the entire delta between PS6.2 and PS6.2PC1
in addition to the new delta between PS6.2PC1 and PS6.2PC2.
PS6.2PC2 can be installed on PS6.2PC1 or on PS6.2.
Patch consolidations cannot be applied on differing
minor or major product versions. For instance, PS6.1PC1 cannot
be applied on PS6.0 or iPS3.0.
- Running different release levels on different nodes is
highly discouraged and not supported by Sun. Each node
must be upgraded to the same revision in the order previously
outlined.
- In addition to the required Solaris patches, Mozilla.org's Rhino
JavaScript engine is also required if you have a Gateway
node in place and would like end users to be able to use
automatic proxy configuration files in conjunction with the Portal
Server Netlet functionality. Rhino 1.5R1, which has been tested and
certified for use by Portal Server Quality Assurance, is available
for download at http://www.mozilla.org/rhino/,
or from the third party product distribution.
STEPS:
-
In a terminal window, become root.
-
Download
and install Rhino Version 1.5R1 on the server node if needed for automatic
proxy configuration support by the Netlet. Rhino must be installed to the
JRE being used by the Portal. In 6.2, this would be /usr/j2se/jre.
|
# unzip rhino15R1.zip
# cp rhino/js.jar /usr/j2se/jre/lib/ext/js.jar
# chmod 444 /usr/j2se/jre/lib/ext/js.jar
|
|
-
Unzip the downloaded patch binary
-
Be sure the server and platform nodes on which you are currently installing are running and use the
Solaris[tm] patchadd command to apply the patch.
|
# root@ps-server: /etc/init.d/amserver startall
|
|
starting auth helpers ...
done.
checking for directory server ...
directory server already running
done
starting web server ...
iPlanet-WebServer-Enterprise/6.0SP5 B10/31/2002 16:22
[LS ls1] http://ps-server.int.sun.com, port 80 ready to accept requests
startup: server started successfully
iPlanet-WebServer-Enterprise/6.0SP5 B10/31/2002 16:22
[LS ls1] http://ps-server.int.sun.com, port 8088 ready to accept requests
startup: server started successfully
done.
|
|
# root@ps-server: patchadd
|
|
-
Apply the patch using patchadd to other installed nodes on separate machines including any Portal proxies
or Gateway nodes.
Back to top
Template Modifications Required
Every attempt is made by the patch installer to both preserve customized template information and
automate the update of that information. However, since the contents of the files cannot
be accurately predetermined, any modified template files are backed up in the same directory as their
updated counterparts with the patch name postfixed to the template name. For example,
/etc/opt/SUNWps/desktop/default/MyFrontPageTabPanelContainer \
/Netlet/display.template might be backed up
to /etc/opt/SUNWps/desktop/default/MyFrontPageTabPanelContainer/ \
/Netlet/display.template.pre
.
The backup files are also copied back to their original location upon patch removal. To help avoid
potential content-related customization problems, refer to the
Tips for Customizing Templates section of this document. The
following template files, .properties files, jsps, xml files, and platform
files are modified by this patch consolidation:
Template and Flatfile Modifications Made by
|
Name |
Component |
Change |
N / A |
Name |
Component |
Change |
Template and Flatfile Modifications Made by Portal 6.2 Patch Consolidation 4:
|
Name |
Component |
Change |
/etc/init.d/gateway <install_dir>/SUNWps/bin/gateway |
Gateway |
Modified Gateway start script to handle additional logic for the version
subcommand. See Checking the Current Install Level for additional details. |
<install_dir>/SUNWps/bin/version |
Platform Server |
Modified Portal version script to handle historical patch application logic. See
Checking the Current Install Level for additional details. |
Name |
Component |
Change |
Back to top
Tips for Customizing Templates
Because the Portal Server itself is so customizable, you should follow some precautions
to insure that any customizations made to the Portal Server are preserved after
a product upgrade. First, set up a customized template directory
if you have not already done so. While this directory could be an entire subset of the default
template directory, it is advisable to only copy over those template files that you will be
customizing. This particular scheme would then use the default directory as a 'base' for all templates
and would help insure that customized templates are not accidentally overwritten when the default
templates are modified.
NOTE: Files in the default template directory should should
never be customized.
To create a customized template directory:
|
- Create a directory at the same level as the /etc/opt/SUNWps/desktop/default/ directory with
a new name such as mytemplates. In that directory, only copy the templates you need to
modify in their proper directories. The other templates will be retrieved as needed from the default directory
using Portal's own filelookup mechanism.
- Edit the templates in the mytemplates directory according to your own preference.
- Log into the administration console.
- Select the appropriate services configuration screen. Fox example, select View: Services to administrate the
desktop service globally. Alternately, select an organization, and then View: Services to administrate the
desktop service for that organization only.
- Expand the link next to Desktop under the Portal Server Configuration subheading on the left view pane
- Modify the Desktop Type field located on the right view pane from default to mytemplates.
- Select Save
|
|
As a general rule of thumb, avoid modifying templates that have only a functional purpose
rather than a look and feel purpose. One example of a template that should not need
modifications is the NetletProvider/display.template . This template contains only JavaScript
necessary for the launching of the Netlet. The contents of the Netlet Pop-up window should instead
be customized by modifying the associated .properties file. The reason for this is that there
could be a functional change in the product that would overwrite a customization done specifically to that
particular template file. This example also exhibits why it is important to only keep customized
files in the customized template directory.
Back to top
Checking the Current Product Install Level
and subsequent patch consolidations make changes to both the gateway, and version scripts necessary to print additional information about the current install level. In previous versions of Portal, this information had to be gathered
from a variety of sources including the package versions, patchadd -p output, or from a flatfile that was not updated by patches themselves. Portal patches will now update the version files when they are installed and again when they are backed out.
To get the version information for the Gateway node, from node itself as root, type:
# /etc/init.d/gateway version
Mon Nov 17 13:48:15 PST 2003 Sun ONE Portal Server Secure Remote Access 6.2
Mon Apr 26 14:38:05 PST 2004
To get the version information for the Portal Server node, from the node itself as root, type:
# <install_dir>/SUNWps/bin/version
Thu Jun 19 14:29:46 PDT 2003 Portal Server 6.1
Mon Apr 26 14:30:18 PST 2004
To get the version information for the Identity Server node, from the node itself as root, type:
# /etc/init.d/amserver version
Sun One Identity Server 6.1
An RFE has been filed to modify the Identity Server version information to match that which is available in Portal Server. The First line of the version output contains the major version information that may also include the product build date. Each remaining line of output represents a patch that has been applied to the major version. The comma separated list in order includes the actual patchID (currently a Solaris patch ID), the patch name, and the patch install date. All of this information is important for supportability purposes and to help Portal administrators in product maintainance.
Back to top
Enabling Exchange 2003 Support Through the Rewriter
This section covers the rewriter integration with Microsoft Outlook Web Access that is
delivered as a part of Microsoft Exchange 2003. For integrations with other versions of
Microsoft Exchange Server refer to the Sun Blueprints online article titled
Sun ONE Portal Server and Microsoft Exchange Integration Cookbook.
Follow the steps bellow in enable Microsoft Exchange 2003 support through the rewriter.
- Associate the new Exchange rulest to include the Exchange Server
As a part of the patch installation, an additional ruleset has been added to the
Portal Service in the Identity Server. A new rule association can be created from
the Rewriter tab of the Gateway profile Service Configuration. For instance, to create
the association for the default Gateway profile:
- Login to the Identity Administration Console
- Select the Service Configuration Tab in the upper pane
- Expand the link next to Gateway under the SRA Configuration section of the left pane
- Select default from the list of profiles
- Select the Rewriter Tab from the right pane
- In the URI to RuleSet Mappings list add an entry similar to the following:
*://*ex-server.domain.com|exchange_2003_owa_ruleset where ex-server.domain.com
is the fully qualified named of the Exchange Server that will be accessed via the Portal
Gateway.
- Select Save
- Restart the Identity Server and then the Gateway node
- Disable NTLM Authentication on the Exchange Server
NTLM Authentication must be disabled on the Exchange Server if Internet Explorer browser
clients will be used. NTLM is a Windows domain based proprietary authentication protocol
that is not supported by the Gateway reverse proxy. HTTP Basic Authentication can be used instead
and the Portal Server can cache the authentication credentials to achieve SSO functionality
for remote users. For information on enabling HTTP Basic Authentication Caching refer to the SRA
Administrator's Guide. To disable NTLM authentication in Microsoft Exchange 2003 perform the
following steps:
- Launch the Microsoft Exchange System Manager
- From the left hand pane expand Servers
- Expand the virtual server that Exchange was deployed to
- Expand Protocols -> HTTP -> Exchange Virtual Server
- Right select Exchange and choose properties
- Select the Access tab in the Exchange propertiees window
- Select the Authentication button
- In the authentication methods window be sure that Basic authentication is selected, and NTLM authentication is
not selected
- Select OK
- Select Apply and OK
Back to top
Fixing Problems With Portlet Channels
Patch
fixes the following problems with portlet channels.
- Bug# 5016148: Value collision when number of portlet channels on the same page are setting the same attribute.
- Bug# 5023785: Portlet-mode in portlet.xml is case-sensitive.
For the portlets to work properly after the patch is installed,
the portlet application needs to redeployed. Do this by performing the following steps for each portlet application:
- Undeploy the application using pdeploy
<install_dir>/SUNWps/bin/pdeploy undeploy -u "uid=amAdmin,ou=People,dc=red,dc=iplanet,dc=com" -w <password> -p <password> -g <NameofPortletApplication>
- Deploy the application again using pdeploy
<install_dir>/SUNWps/bin/pdeploy deploy -u "uid=amAdmin,ou=People,dc=red,dc=iplanet,dc=com" -w <password> -p <password> -g <NameofPortletApplication.war>
- Restart the server
/etc/init.d/amserver startall
Back to top
Enabling Delegated Administrator Support Through the Rewriter
This section covers the rewriter integration with Delegated Administrator that ships with Sun
Messaging Server. The integration includes a fix for BugID #5032856 mentioned in the patch README
in addition to a boilerplate rewriter ruleset to use for the integration. The ruleset is uploaded
to the Identity Server as a part of the patch installation process, and needs to be mapped to the
appropriate machine host in order to be affective. To map the new iDA ruleset, do the following:
- Login in to the Identity Administration Console as amadmin
- Select the Service Configuration tab from the top view pane
- Expand the link next to Gateway under the SRA Configuration subheading in the left view pane
- Select the appropriate profile that will be used to access Delegated Administrator from the right view pane
- Select the Rewriter Tab under the Edit Gateway Profile heading
- In the URL to RuleSet Mappings field create a mapping for the Delegated Administrator Host
EX: http://mailhost.subdomain.domain.com:88*|ida_ruleset
Since Messaging Express and Delegated Administrator may be installed on the same host, be sure to
include the port number the service is listening on in the ruleset mapping.
- Select Add
- Select Save
- Select the Proxies tab
- Be sure that the Delegated Administrator server domain name is listed in the Proxies for Domains and Subdomains field. If not, add it and select save.
- Restart the Gateway
Back to top
Configuring Personal Address Book For Multiple Domains
This section covers details on how to configure Personal Address Book (PAB) with multiple hosted domains. This patch has a fix for bug# 4942807 which allows to configure PAB to authenticate users to different domains. Before this fix the users were always authenticated to the default domain and therefore if two users in different domains had same user id, users were able to see address book of the user in the default domain. This patch uses a domain attribute to distinguish between the users of different domains and the users authenticate to the domain they belong to. We need to add an attribute "domain" to the user's SSOAdapter template for PAB to specify which domain this particular user belongs to. This can be done using the following steps. These steps are necessary to ensure proper functioning of PAB with different domains.
- Login to IS admin console
- Select Service Configuration Tab
- Click the arrow next to SSOAdapter
- In Global section, select the SSO Adapter template you are using for your PAB configuration
EX: Template with configName=SUN-ONE-ADDRESS-BOOK
- Change the template to add a string "&merge=domain"
EX: By Default the value of Template for SUN-ONE-ADDRESS-BOOK is
default|ldap://[SERVER-NAME:PORT]/?configName=[SUN-ONE-ADDRESS-BOOK]&pabSearchBase=[PAB-SEARCH-BASE] \
&userSearchBase=[USER-SEARCH-BASE]&aid=[ADMIN-ID]&adminPassword=[ADMIN-PASSWORD] \
&imapHost=[IMAP-HOST]&imapPort=[IMAP-PORT]&clientPort=[CLIENT-PORT] \
&enableProxyAuth=false&proxyAdminUid=[PROXY-ADMIN-UID] \
&proxyAdminPassword=[PROXY-ADMIN-PASSWORD]&type=AB-TYPE \
&subType=sun-one&ssoClassName=com.sun.ssoadapter.impl.LDAPABSSOAdapter\
&encoded=password&default=ssoClassName&default=host&default=port\
&default=pabSearchBase&default=userSearchBase&default=aid&default=adminPassword\
&default=imapHost&default=imapPort&default=clientPort&default=type\
&default=subType&default=enableProxyAuth&default=proxyAdminUid\
&default=proxyAdminPassword&merge=uid&merge=password&default=enablePerRequestConnection\
&enablePerRequestConnection=false&default=userAttribute&userAttribute=uid
Change it to
default|ldap://[SERVER-NAME:PORT]/?configName=[SUN-ONE-ADDRESS-BOOK]&pabSearchBase=[PAB-SEARCH-BASE]\
&userSearchBase=[USER-SEARCH-BASE]&aid=[ADMIN-ID]&adminPassword=[ADMIN-PASSWORD]\
&imapHost=[IMAP-HOST]&imapPort=[IMAP-PORT]&clientPort=[CLIENT-PORT]\
&enableProxyAuth=false&proxyAdminUid=[PROXY-ADMIN-UID]\
&proxyAdminPassword=[PROXY-ADMIN-PASSWORD]&type=AB-TYPE\
&subType=sun-one&ssoClassName=com.sun.ssoadapter.impl.LDAPABSSOAdapter\
&encoded=password&default=ssoClassName&default=host&default=port\
&default=pabSearchBase&default=userSearchBase&default=aid&default=adminPassword\
&default=imapHost&default=imapPort&default=clientPort&default=type\
&default=subType&default=enableProxyAuth&default=proxyAdminUid\
&default=proxyAdminPassword&merge=uid&merge=password&merge=domain&default=enablePerRequestConnection\ <-- "change is in here"
&enablePerRequestConnection=false&default=userAttribute&userAttribute=uid
- Click Add and Save button
- Make sure that new template is added.
- Remove the old one by selecting the template and click remove and save button
- Add the String "&domain=" to the SSO Adapter Configurations at the organization level, role or user level depending on your setup.
NOTE: It is important to add this to the lowest level which has the SSOAdapter configuration templates setup else the changes wont take affect. However if it was not configured for the users and they were using the organization or role level template then you need to do it only at those levels.
EX: If you have two domains : domain1.Sun.com and domain2.sun.com
Steps to configure them at org level are
1. Select the first organization (domain1.sun.com)
2. From the View choice list, select services.
3. Select SSOAdapter
4. Select the template for the PAB.
EX: default|undef:///?configName=sunOneAddressBook&configDesc=SUN-ONE-ADDRESS-BOOK
5. Add the domain at the end.
EX: default|undef:///?configName=sunOneAddressBook&configDesc=SUN-ONE-ADDRESS-BOOK&domain=domain1.sun.com
6. Click add and save.
7. Repeat the steps for second domain and make sure to change the domain to domain2.
- Restart the server
- Login to admin console again and verify that the changes are present
Back to top
Enabling Gateway Charset Detection Heuristics
This patch introduces a new feature in gateway where the gateway is able to recognize the encoding to use for translating files which dont have HTTP headers for encoding or Meta Tags for Content Type. Solution uses the opensource libraries from mozilla to do the character detection and those bits needs to be downloaded and installed separately from the patch. Follow the steps below to enable this feature.
NOTE: Perform the following steps after installing the patch
- Download the thirdparty bits shipped with Jave Enterprise System 2 for portalserver
- Go to http://wwws.sun.com/software/download/allproducts.html
- Click on Sun Java Enterprise System 2004Q2
- In product section, there is a subsection for Accessory CD, volume2 select the link for
"Sun Java System Portal Server Secure Remote Access 6.2: Rhino, jCIFS"
- Save the file as sun_java_ent_sys_r2_ps_6.3_thirdparty_acc.zip on the Gateway node.
- Add the new charset package
- Become root
# su -
- unzip the downloaded file.
# unzip sun_java_ent_sys_r2_ps_6.3_thirdparty_acc.zip
- Change directories to the newly created directory "jchardet"
# cd jchardet
- Add the SUNWjchdt package by using the Solaris™ pkgadd command
# pkgadd -d . SUNWjchdt
- Confirm the default directory (/usr/share/lib), or select your own to be specified later in the Gateway start script
- Change the gateway script to include the chardet.jar file
- Change directories to the /etc/init.d/ directory
# cd /etc/init.d/
- Backup the original gateway script
# cp gateway gateway.prechardet
- Change the gateway start script to include the chardet.jar jar in the Java CLASSPATH. The Following diffs show the procedure done
for the default chardet install location:
*** gateway.prechardet Wed Jul 7 16:01:41 2004
--- gateway Wed Jul 7 16:11:34 2004
***************
*** 31,36 ****
--- 31,37 ----
GETTEXT=/usr/bin/gettext
JSS_NSS_NSPR_LIBPATH=/usr/lib/mps/secv1
JSS_JAR=/usr/share/lib/mps/secv1/jss3.jar
+ CHARDET_JAR=/usr/share/lib/chardet.jar
***************
*** 172,178 ****
# Classpath is w.r.t. working directory that is $PS_HOME
GW_CLASSPATH="lib:locale:lib/gateway.jar:lib/rewriter.jar:lib/certadmin.jar:lib/ssl.jar:lib/x509v1.jar"
! GW_CLASSPATH="$IS_CLASSPATH:$JCE_CLASSPATH:$JSS_JAR:$GW_CLASSPATH"
if [ -z "$CLASSPATH" ] ; then
CLASSPATH="$GW_CLASSPATH"
--- 173,179 ----
# Classpath is w.r.t. working directory that is $PS_HOME
GW_CLASSPATH="lib:locale:lib/gateway.jar:lib/rewriter.jar:lib/certadmin.jar:lib/ssl.jar:lib/x509v1.jar"
! GW_CLASSPATH="$IS_CLASSPATH:$JCE_CLASSPATH:$JSS_JAR:$CHARDET_JAR:$GW_CLASSPATH"
if [ -z "$CLASSPATH" ] ; then
CLASSPATH="$GW_CLASSPATH"
- Restart the server and gateway to enable the new feature.
Back to top
Configuring the Network Socket Timeout Between the Gateway and the Netlet Proxy
This patch includes a new option to configure a fixed timeout for the network socket that is opened between the Gateway and Netlet Proxy if the Netlet Proxy is in use. This option was included to reduce socket depletion resulting from sockets on the Netlet Proxy node remaining indefinitely in an ESTABLISHED state.
For example, prior to this fix, if a Telnet session was opened via the Netlet and there was no activity for 2-4 minutes, the Telnet session would timeout as a result of the idle timout being reached. However, the socket opened between Gateway and Netlet Proxy would remain in an ESTABLISHED state. The same behavior would result from a user explicitly exiting the Telnet session as well.
The new option included with this patch gives portal administrators the ability to explicitly set a timeout for how long the abandoned socket should remain open. The default value of this timeout is 10 minutes. So, if there is no activity between the Gateway and Netlet Proxy socket for 10 minutes, the socket will be closed. If this value needs to be changed, an entry for gateway.netletproxy.socket.timeout can be added to the platform.conf file on the Gateway with the new value specified in milliseconds.
Example:
To change the value to five minutes, the following step should be performed on the Gateway instance(s) which require modification.
- Change directory to /etc/opt/SUNWps
- Backup the platform.conf.<gateway_instance> file; where gateway_instance is the instance you want to configure this option for.
- Edit the platform.conf.<gateway_instance> file and add the following entry:
gateway.netletproxy.socket.timeout=300000
- Restart the gateway Instance
NOTE:
If the socket timeout is set too high, the socket depletion could be significant enough to cause Netlet connections to hang.
Back to top
Eliminating the Specific Portal Server Requirement During Gateway Failover
The Gateway normally requires a specific Portal Server to be available when the Gateway starts up. This Portal Server which the Gateway uses is defined in the Gateway's platform.conf file in an entry called gateway.dsame.agent. This entry's value creates a single point of failure for each Gateway instance that will prevent it from properly restarting should the specified Portal Server be temporarily unavailable.
To rememdy this problem, multiple entries can be created in each gateway instance platform.conf file in order of preference. For instance, to define two Portal Servers to use during Gateway startup edit the /etc/opt/SUNWps/platform.conf.<gateway_instance> file and change:
gateway.dsame.agent=http://host1:80/portal/RemoteConfigServlet
to:
gateway.dsame.agent.0=http://host1:80/portal/RemoteConfigServlet
gateway.dsame.agent.1=http://host2:80/portal/RemoteConfigServlet
You will also need to add the additional hosts to the /opt/SUNWam/lib/AMCOnfig.properties file.
Change:
com.iplanet.am.naming.url=http://host1:80/amserver/namingservice
to:
com.iplanet.am.naming.url=http://host1:80/amserver/namingservice http://host2:80/amserver/namingservice
And:
com.iplanet.am.notification.url=http://host1:80/amserver/notificationservice
to:
com.iplanet.am.notification.url=http://host1:80/amserver/notificationservice http://host2:80/amserver/notificationservice
This change will take effect the next time the Gateway instance is started.
Back to top
|