This document contains step by step instructions for configuring Portal V6.1 with multiple Active Directory federated ldaps and multiple realms.
The examples in this document assume the MyFoo portal is being configured.
For MyFoo set...
For EBIZ set...
For CORP set...
For example...
./ConfigEngine.sh wp-create-realm -DWasPassword=wasadminfile
...you should see the CorpDir realm as an option
If an attribute is defined in WebSphere Portal but not in the LDAP server, we can do one of the following...
...and check for missing attributes in...
...to create...
...and set...
federated.ldap.attributes.nonSupported=businessAddress, businessCategory, carLicense, countryName, departmentNumber, description, employeeNumber, homeAddress, jpegPhoto, labeledURI, localityName, pager, roomNumber, businessCategory, description
federated.ldap.attributes.nonSupported.delete=
federated.ldap.attributes.mapping.ldapName=stateOrProvinceName
federated.ldap.attributes.mapping.portalName=st
federated.ldap.attributes.mapping.entityTypes=PersonAccount, Group
On testc-prtdm-01 backup is...
On testc-prtap-0a backup is...
There was no space left in either /opt or /tmp/backup
federated.ldap.id=ExtDir
federated.ldap.host=testc-ldsap-01.mycompany.com
federated.ldap.port=7389
federated.ldap.bindDN=cn=myportalsvc,ou=service accounts,ou=operations,dc=myexternal,dc=ad
federated.ldap.bindPassword=Passw++++
federated.ldap.ldapServerType=ADAM
federated.ldap.baseDN=dc=myexternal,dc=ad
federated.ldap.et.group.searchFilter=
federated.ldap.et.group.objectClasses=group
federated.ldap.et.group.objectClassesForCreate=group
federated.ldap.et.group.searchBases=dc=myexternal,dc=ad
federated.ldap.et.personaccount.searchFilter=
federated.ldap.et.personaccount.objectClasses=user
federated.ldap.et.personaccount.objectClassesForCreate=user
federated.ldap.et.personaccount.searchBases=dc=myexternal,dc=ad
federated.ldap.gm.groupMemberName=member
federated.ldap.gm.objectClass=group
federated.ldap.gm.scope=nested
federated.ldap.gm.dummyMember=
<config:attributes name="userPrincipalName" propertyName="uid"> <config:entityTypes>PersonAccount</config:entityTypes> </config:attributes>
...to...
Search for ExtDir, then after the <config:attributeConfiguration> add the lines above, so that they are right above the defaultAttribute=cn definition.
Output may be written to...
...you should see the ExtDir realm as an option
Security | Secure administration, applications, and infrastructure
Realm name | CorpDir | ||||||||||||
Primary administrative user name | cn=waswpadminfoo,ou=FooUsers,ou=Portal Users,ou=Users,ou=Operations,dc=mycompany,dc=com | ||||||||||||
Server user identityAutomatically generated server identity | |||||||||||||
Ignore case for authorization | |||||||||||||
Repositories in the realm |
|
Go to...
Secure administration, applications, and infrastructure > CSIv2 outbound authentication
...and set CorpDir in Trusted Target Realms
At this point the default File Based Realm is the default realm. So the WAS and Portal admins are still wasadminfile / wasadminfile. To change the default realm from File Based Realm to the ExtDir realm created above...
The WAS and Portal admin users we want to use are waswpadminfoo and wpadminfoo respectively. They can be found via Apache Directory Studio by going to...
For MyFoo users...
For EBIZ users...
For CORP users...
For MyFoo Test, use...
For EBIZ...
For CORP...
Run...
At this point the File based Repository (Out of box security configuration) is the default repository. Any New User or Group will be saved in the default repository. In order to create New user and group in LDAP repository instead of default file based repository perform the following step. Perform the following steps to update the user registry where new users and groups are stored: