OERealm user account configurations
- Last Updated: February 11, 2026
- 2 minute read
- OpenEdge
- Version 13.0
- Documentation
In Tomcat, a Realm acts as a link between a web application and its user database. The OpenEdge Realm (OERealm) authentication manager provides a hybrid solution that enables Tomcat’s Java server process to run object-oriented ABL code. This setup allows an OpenEdge application server to serve as the source of user account information during authentication.
An OERealm implementation consists of the following components:
- OpenEdge Realm (OERealm) Client—This component includes the Spring Security
authentication provider and user account service objects. These objects communicate
with the application server to retrieve user account details, which are then passed
to the Spring Security authentication process.
The OERealm client performs the following steps:
- Connects to the application server's OERealm ABL Service Interface.
- Sends a request to locate the user account and obtain its unique numeric ID.
- Retrieves user account details in this order:
- Granted roles
- Account enabled state
- Account locked state
- Account expiration status
Note: If the account does not exist or is disabled, locked, or expired, the client stops and makes no further requests to the application server.
- OERealm AppServer ABL Service Interface—This is an ABL class running on the
Progress Application Server (PAS) for OpenEdge instance. It handles requests from
the OERealm client and implements the
IHybridRealminterface to return the expected account details.The class performs the following actions in order:
- Searches for the user account by name
(
userid[@domain]). - Returns the user account attributes.
- Validates the user account password. Optionally, it authorizes the OERealm client and enables it to receive user account information.
- Searches for the user account by name
(
Implementation Process
To implement the OERealm security model, complete these steps:
- Create the OERealm ABL Service Interface along with all required classes.
- Update the Spring Security configuration for each web application that will use OERealm security.
- Add one or more domains to the databases connected to your application.
If you do not have a PAS for OpenEdge instance available, you can create a simple one using PASMAN:
- Open a
PROENVsession which will place you into the standardWRKDIRlocation. - Run
pasman create -v -f -p 8890 -P 8891 -s 8894 RealmExampleto create a PAS for OpenEdge instance. - Run
prodb UserDB emptyto create an empty database for user accounts. - Run
proserve UserDBto serve the database for mufti-user access. - Open the
RealmExample/conf/openedge.propertiesfile with a text editor.Add the following line to the[AppServer.SessMgr.RealmExample]section:agentStartupParam=-T "${catalina.base}/temp" -db "${catalina.base}/../UserDB" - Start the PAS for OpenEdge instance with
pasman oeserver -start -I RealmExample
You can now access the RealmExample PAS for OpenEdge instance at
http://localhost:8890 and use the UserDB
database for the remaining OERealm setup steps. Before proceeding, verify that the
server link works and displays the expected status page.