Oracle database configuration |
Oracle is one of the most popular and powerful database management systems. Oracle database has complete data management capabilities and complete distributed processing capabilities. iPortal supports the use of Oracle database to store portal data and security information.
If you've already installed the Oracle database, after create the database instance, tablespace, add and authorize the user, you can directly configure the portal data storage and security information storage. If you didn't install Oracle yet, please refer to: Oracle installation and configuration.
Note: In iPortal, it's recommended that you use different Oracle users to store portal data and security information separately.
Before enabling the Oracle database, you need to add Oracle's JDBC driver package to iPortal. See the process as follows:
It's recommended to configure the portal data storage before staring iPortal(before creating the initial administrator account). The configuration information is in the iportal.xml configuration file in the installation directory (%SuperMap iPortal_HOME%\webapps\iportal\WEB-INF). For details, see: iPortal configuration file description. When using an Oracle database, you only need remove or delete the default SQLite database connection pool configuration information and add the Oracle database connection pool configuration information. The sample configuration is as follows:
<dbType>ORACLE</dbType>
<driverClass>oracle.jdbc.driver.OracleDriver</driverClass>
<jdbcUrl>jdbc:oracle:thin:@localhost:1521:iportal</jdbcUrl>
<maxPoolSize>30</maxPoolSize>
<initialPoolSize>5</initialPoolSize>
<minPoolSize>5</minPoolSize>
<maxIdleTime>3000</maxIdleTime>
<maxWait>300000</maxWait>
<username>orcluser1</username>
<password></password>
You can configure the iPortal security information storage after the iPortal is started. Log in to iPortal as the administrator, enter Management > Security, you can perform the security information configuration operations on the "Security Config" page. For details, see: Security information storage.