WAS v8.5 > Secure applications > Authenticate users > Select a registry or repository > Configure LDAP user registries

Use specific directory servers as the LDAP server

This article provides information about the directory servers supported as LDAP servers in WebSphere Application Server. We can use other directory servers by using the custom directory type in the list and by filling in the filters required for that directory.

To improve performance for LDAP searches, the default filters for IBM Tivoli Directory Server (TDS), Sun ONE, and Active Directory return results containing all relevant information about the user (user ID, groups, and so on). By using these results WAS does not have to call the LDAP server multiple times.

If we use IBM TDS, select the Ignore case for authorization option. This is required because when the group information is obtained from the user object attributes, the case is not the same as when we get the group information directly. perform a case insensitive check and verify the requirement for the Ignore case for authorization option.


Set up Microsoft Active Directory as the LDAP server.

  1. Determine the full distinguished name (DN) and password of an account in the administrators group. For example, if the Active Directory administrator creates an account in the Users folder of the Active Directory Users and Computers Windows control panel and the DNS domain is ibm.com, the resulting DN has the following structure:

      cn=<adminUsername>, cn=users, dc=ibm, dc=com

  2. Determine the short name and password of any account in the Microsoft Active Directory.

  3. Use the dmgr console to set up the information needed to use Microsoft Active Directory.

    1. Click...

        Security > Global security > User account repository > Standalone LDAP registry > Configure

    2. Set up LDAP with Active Directory as the type of LDAP server. Based on the information that is determined in the previous steps, we can specify the following values on the LDAP settings panel:

        Primary administrative user name Name of a user with administrative privileges defined in the registry. This user name is used to access the dmgr console or used by wsadmin.
        Type Specify Active Directory
        Host Domain name service (DNS) name of the machine that is running Microsoft Active Directory.
        Base distinguished name (DN) Domain components of the DN of the account chosen in the first step. For example: dc=ibm, dc=com
        Bind distinguished name (DN) Full distinguished name of the account chosen in the first step. For example: cn=adminUsername, cn=users, dc=ibm, dc=com
        Bind password Password of the account chosen in the first step.

    3. Click OK and Save to save the changes to the master configuration.

  4. Click...

      Security > Global security > User account repository > Available realm definitions > drop-down list > Standalone LDAP registry > Configure

  5. Select either the Automatically generated server identity or Server identity stored in the repository option. If you select the Server identity stored in the repository option, enter the following information:

      Server user ID or administrative user on a v6.0.x node Short name of the account chosen in the second step.
      Server user password Password of the account chosen in the second step.

  6. Optional: Set ObjectCategory as the filter in the Group member ID map field to improve LDAP performance.

    1. Under Additional properties, click Advanced Lightweight Directory Access Protocol (LDAP) user registry settings .

    2. Add ;objectCategory:group to the end of the Group member ID map field.

  7. Click OK and Save to save the changes to the master configuration.

  8. Stop and restart the administrative server so the changes take effect.


Related concepts:

Standalone LDAP registries
Configure LDAP user registries
Locating user group memberships in a LDAP registry
Advanced LDAP user registry settings
Standalone LDAP registry settings


+

Search Tips   |   Advanced Search