Configure LDAP user registries

 

Configure LDAP user registries

 

+
Search Tips   |   Advanced Search

 

To access an LDAP user registry using a WAS administrative ID, know...

The LDAP admin user is referred to as a WAS security server ID, server ID, or server user ID.

The server ID and password are the ID and password used to log into the administrative console after security is turned on.

When security is enabled in WAS, the server security ID and password are authenticated with the registry during WAS startup. If authentication fails, the server does not start. If WAS server user ID or password need to change in the registry, make the changes when all WAS servers are up and running.

 

Procedure

  1. In the administrative console, click Security > Global security.

  2. Under User registries, click LDAP.

  3. Enter a valid user name in the Server user ID field.

    You can either enter the complete distinguished name (DN) of the user or the short name of the user, as defined by the user filter in the Advanced LDAP settings panel. For example, enter the user ID for Netscape browsers. This ID is the security server ID, which is only used for WebSphere Application Server security and is not associated with the system process that runs the server. The server calls the local OS registry to authenticate and obtain privilege information about users by calling the native application programming interfaces (API) in that particular registry.

  4. Enter the password of the user in the Server user password field.

  5. Select the type of LDAP server to use from the Type list. The type of LDAP server determines the default filters that are used by WAS. These default filters change the Type field to Custom, which indicates that custom filters are used. This action occurs after you click OK or Apply in the Advanced LDAP settings panel. Choose the Custom type from the list and modify the user and group filters to use other LDAP servers, if required.

    IBM Tivoli Directory Server users can choose IBM Tivoli Directory Server as the directory type. Use the IBM Tivoli Directory Server directory type for better performance. For a list of supported LDAP servers, see the Supported hardware, software, and APIs Web site.

  6. Enter the fully qualified host name of the LDAP server in the Host field. You can enter either the IP address or domain name system (DNS) name.

  7. Enter the LDAP server port number in the Port field. The host name and the port number represent the realm for this LDAP server in the WAS cell. So, if servers in different
    cells are communicating with each other using Lightweight Third Party Authentication (LTPA) tokens, these realms must match exactly in all the cells.

    The default value is 389. If multiple WASs are installed and configured to run in the same single sign-on domain, or if the WebSphere Application Server interoperates with a previous version of the WebSphere Application Server, then it is important that the port number match all configurations. For example, if the LDAP port is explicitly specified as 389 in a version 5.x configuration, and a WAS at version 6.0.x is going to interoperate with the version 5.x server, then verify that port 389 is specified explicitly for the version 6.0.x server.

  8. Enter the base distinguished name (DN) in the Base distinguished name field. The base DN indicates the starting point for searches in this LDAP directory server. For example, for a user with a DN of cn=John Doe, ou=Rochester, o=IBM, c=US, specify the base DN as any of the following options assuming a suffix of c=us): ou=Rochester, o=IBM, c=us or o=IBM c=us or c=us. For authorization purposes, this field is case sensitive by default. Match the case in your directory server. If a token is received (for example, from another cell or Lotus Domino) the base DN in the server must match exactly the base DN from the other cell or Domino. If case sensitivity is not a consideration for authorization, enable the Ignore case for authorization option.

    In WAS, the distinguished name is normalized according to the Lightweight Directory Access Protocol (LDAP) specification. Normalization consists of removing spaces in the base distinguished name before or after commas and equal symbols. An example of a non-normalized base distinguished name is o = ibm, c = us or o=ibm, c=us. An example of a normalized base distinguished name is o=ibm,c=us.

    To interoperate between WAS Version 5 and later versions, enter a normalized base distinguished name in the Base Distinguished Name field. In WAS, Version 5.0.1 or later, the normalization occurs automatically during runtime.

    This field is required for all LDAP directories except the Lotus Domino Directory. The Base Distinguished Name field is optional for the Domino server.

  9. Optional: Enter the bind DN name in the Bind distinguished name field. The bind DN is required if anonymous binds are not possible on the LDAP server to obtain user and group information. If the LDAP server is set up to use anonymous binds, leave this field blank. If a name is not specified, the application server binds anonymously. See the Base Distinguished Name field description for examples of distinguished names.

  10. Optional: Enter the password corresponding to the bind DN in the Bind password field.

  11. Optional: Modify the Search time out value. This timeout value is the maximum amount of time that the LDAP server waits to send a response to WAS client before stopping the request. The default is 120 seconds.

  12. Ensure that the Reuse connection option is selected. This option specifies that the server should reuse the LDAP connection. Clear this option only in rare situations where a router is used to send requests to multiple LDAP servers and when the router does not support affinity. Leave this option selected for all other situations.

  13. Optional: Verify that the Ignore case for authorization option is enabled. When you enable this option, the authorization check is case insensitive. Normally, an authorization check involves checking the complete DN of a user, which is unique in the LDAP server and is case sensitive. However, when you use either the IBM Directory Server or the Sun ONE (formerly iPlanet) Directory Server LDAP servers, enable this option because the group information that is obtained from the LDAP servers is not consistent in case. This inconsistency affects the authorization check only. Otherwise, this field is optional and can be enabled when a case sensitive authorization check is required. For example, you might select this option when you use certificates and the certificate contents do not match the case of the entry in the LDAP server.

    You can also enable the Ignore case for authorization option when you are using single sign-on (SSO) between WAS and Lotus Domino. The default is enabled.

  14. Optional: Select the SSL enabled option if you want to use Secure Sockets Layer communications with the LDAP server.

    If you select the SSL enabled option, select the appropriate SSL alias configuration from the list in the SSL configuration field. For more information on setting up LDAP for SSL, see Configuring Secure Sockets Layer for the Lightweight Directory Access Protocol client .

  15. Optional: In the SSL configuration field, select the Secure Sockets Layer configuration to use for the LDAP connection. This configuration is used only when SSL is enabled for LDAP. The default is DefaultSSLSettings. To modify or create a new SSL configuration, click Security > SSL.

  16. Click OK. The validation of the user, password, and the setup do not take place in this panel. Validation is only done when you click OK or Apply in the Global Security panel.

    • If you are enabling security for the first time, complete the remaining steps and go to the Global Security panel. Select LDAP as the active user registry.

    • If security is already enabled, but information on this panel changes, go to the Global Security panel and click OK or Apply to validate your changes. If your changes are not validated, the server might not start.

 

Results

This set of steps is required to set up the LDAP user registry. This step is required as part of enabling security in the WebSphere Application Server.

 

What to do next

  1. If you are enabling security, complete the remaining steps as specified in Enabling security for the realm .

  2. Save, stop, and restart all WAS servers (deployment managers,
    nodes and Application Servers) for changes in this panel to take effect. If the server comes up without any problems the setup is correct.




 

Sub-topics


Lightweight Directory Access Protocol settings

Advanced Lightweight Directory Access Protocol user registry settings

Configuring Lightweight Directory Access Protocol search filters

Updating LDAP binding information

Using specific directory servers as the LDAP server

Locating a user's group memberships in Lightweight Directory Access Protocol

 

Related concepts


csec_customauth.html

Local operating system user registries

 

Related tasks


Configuring Secure Sockets Layer for the Lightweight Directory Access Protocol client

Enabling security for all application servers

Enabling security for the realm

Selecting a user registry