Security configurations
- Last Updated: April 10, 2026
- 3 minute read
- OpenEdge
- Version 13.0
- Documentation
A security model in PAS for OpenEdge is not a mode or a switch. It is a predefined set of security‑related configuration properties and default values that determine how a PAS for OpenEdge product installation and its server instances are secured.
Security configurations are established during product installation, applied or overridden during PAS for OpenEdge instance creation, and can be further customized after instance creation to meet deployment‑specific security requirements.
This topic explains how security configurations are defined, how they are selected during instance creation, and how administrators can tailor them for their environment.
-Z option, as shown in the following command.
|
The initial security model is set during PAS for OpenEdge installation based on the
licenses entered (for example, Production/Development/Lite). If you do not specify
-Z when creating an instance, the new instance inherits the PAS for
OpenEdge installation’s security model.
A PAS for OpenEdge instance is either a development or a production instance.
The About development and production instances and About licensing and installation guides
describe the differences between the security models. The -Z switch on the create action determines the security
model. You cannot change the selected security configuration baseline after creating an
instance. However, administrators can modify individual security‑related configuration
properties and permissions after instance creation to meet deployment‑specific security
requirements.
Create a development instance
|
-Z devcreates a development instance.-fdeploys monitoring applications.Note: The-foption installs remote administration and monitoring web applications, including the Tomcat Manager (manager.war) and the OpenEdge Manager (oemanager.war). These web applications provide an alternative to local JMX access to the same functionality. If you use-f, you must secure the monitoring applications.For more information on securing monitoring applications, see Secure the Tomcat Manager and OpenEdge manager web applications.
-psets the HTTP port number.-Psets the HTTPS port number.-ssets the shutdown (stop) port for the instance. On Windows, you must specify a shutdown port. On UNIX systems, shutdown ports are optional.Note: When a shutdown port is not required in your environment, you can disable it by setting the value to-1.
Create a production instance
To create a PAS for OpenEdge production instance:
|
To create a PAS for OpenEdge production instance that secures root application access:
|
-Z prodcreates a production instance.-Z pascreates a production security model instance where the default Tomcat ROOT application is not oeabl.war. Instead, noaccess.war is installed as the Tomcat ROOT application.Note: The primary use case for noaccess.war is to replace the default, required ROOT web application on the PAS for OpenEdge Tomcat server. This provides a web application that responds to any request with a400 Bad Requestbecause it is not associated with any ABL application. To start the instance, you must deploy a valid ABL application. This makes the PAS for OpenEdge instance a secured, blank canvas onto which existing ABL applications using OpenEdge Application Archive (OEAR) files can be deployed.For more information about OpenEdge Archive files, see Create an OpenEdge Application Archive using tcman export.
For more information, see the noaccess.README file included in the noaccess.war.
-fdeploys monitoring applications.Note: The-foption installs remote administration and monitoring web applications, including the Tomcat Manager (manager.war) and the OpenEdge Manager (oemanager.war). These web applications provide an alternative to local JMX access to the same functionality. If you use-f, you must secure the monitoring applications.For more information on securing monitoring applications, see Secure the Tomcat Manager and OpenEdge manager web applications.
-psets the HTTP port number.-Psets the HTTPS port number.-ssets the shutdown (stop) port for the instance. On Windows, you must specify a shutdown port. On UNIX systems, shutdown ports are optional.Note: When a shutdown port is not required in your environment, you can disable it by setting the value to-1.