473,398 Members | 2,125 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,398 software developers and data experts.

Weblogic 8.0 and IIS 5.0 plug in issue

bob
hi,

I have a computer with Windows 2000 server and IIS 5.0 installed.

I am trying to open a connection with a Weblogic Server 8 SP3 on another
machine.

My iisproxy.dll and iisproxy.ini
are on the folder: C:\WINNT\system32\inetsrv

iisproxy.ini :
WlForwardPath=/IhmActivation
Debug=ALL
WebLogicHost=toto
WebLogicPort=49162
WLLogFile=C:\iisproxy3.log

I have configured iisproxy.dll in IIS 5.0

Based on what I entered in my configuration file iisproxy.ini, if I type the
URL:
http://localhost/IhmActivation/here.do
it should point to
http://toto:49162/IhmActivation/here.do

I get a 401 message:

Going to send headers to the client. Status :401 Unauthorized xxx

The login and password are ok.
So I do not know where the problem comes from.

Does anyone have an idea please ?
Thanks for your help.

This message contains information that may be privileged or
confidential and is the property of the Capgemini Group. It is intended only
for the person to whom it is addressed. If you are not the intended
recipient, you are not authorized to read, print, retain, copy, disseminate,
distribute, or use this message or any part thereof. If you receive this
message in error, please notify the sender immediately and delete all copies
of this message.

Nov 19 '05 #1
0 954

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
by: Benny | last post by:
Hi i am using fop to generate dynamical pdf documents from a servlet, in weblogic 5.1. Fop works very fine but i need to generate barcodes in my documents so i am integrating it with krysalis...
0
by: Per-Christian Engdal | last post by:
Hi, I have built a cocoon.war file, and deployed it on my BEA Weblogic 8.1 Sp2 (Windows 2000) installation. The deployment works without exceptions, but when I try to access cocoon through...
4
by: Accolo1 | last post by:
Help we are looking for this person, do you know them? William wjohnson@accolo.com Title: BEA WebLogic Portal Guru Job #: 03-04468 Check the pulse of your career! Evolve our eCommerce web...
0
by: bob | last post by:
hi, I have a computer with Windows 2000 server and IIS 5.0 installed. I am trying to open a connection with a Weblogic Server 8 SP3 on another machine. My iisproxy.dll and iisproxy.ini are...
1
by: WebServiceSecurity | last post by:
The issue involves the following technologies: - 1. .NET 2.0 Framework 2. WSE2.0 (WS-Security) 3. X.509 certificates 4. BEA Weblogic 8.1.5
0
by: manauwaralam | last post by:
javax.naming.NameNotFoundException: While trying to lookup 'weblogic.jdbc.jts.vdmsPool' didn't find subcontext 'jdbc' Resolved weblogic; remaining name 'jdbc/jts/vdmsPool' at...
5
by: swebster | last post by:
Can someone explain the differences between setting cookies on TomCat or a Weblogic webserver? I discovered today during a deployment to Weblogic that a cookie can be set and retrieved in a...
1
by: hussain123 | last post by:
Hi, We have an issue wherein we have an persistent store and are caching the url's visited.Now the problem is when the first url is cached then any subsequent request even though to some other url...
2
by: JAYROO5245 | last post by:
This last weekend 3-28 to 3-30, we upgraded our Hardware to all be on virtual servers. Each of our environments has a single Admin server and a clustered A and B server on three different virtual...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.